|
||||||
|
||
|
Home > Secret key encryption software |
Related keywords: encryption, secret, file encryption, Encryption, encryption software, encryption system, email encryption, data encryption, hard disk encryption, ENCRYPTION |
|
|
21. | Password Fortress 1.01 (passwordfortress.com) | ||
have to worry about forgetting passwords or losing registration keys again. Password Fortress manages all your private information in a single application. Your sensitive information is protected with strong 256-bit Rijndael encryption and can only be accessed using your secret password. Password Fortress can be configured to store any type of information you like | |||
Updated: 9, 2005 | Rating: 0 | Author: Donovan Dunning | Size: 3799 kb | Shareware Go to category: Security & Privacy > Password Managers Similar programs | |||
22. | Password Officer DeLuxe 5.0 (compelson.com) | ||
accessing. Security coupled with convenience: the strongest possible encryption, secure database of your most valued secrets, automatic logon to applications, servers, information systems, terminals and web pages, quick search, smart-card support. Now you can be more productive and secure | |||
Updated: 9, 2005 | Rating: 0 | Author: COMPELSON Laboratories | Size: 934 kb | Commercial Go to category: System Utilities > Other Similar programs | |||
23. | Hermetic Stego 5.17 (hermetic.ch) | ||
BMP image files, with or without the use of a user-specified stego/encryption key, so that (i) the presence of the hidden file is undetectable (even by forensic software using statistical methods) and (ii) if a user-specified stego key is used then the hidden file can be extracted only by someone, using this software, who knows that stego key. Hermetic Stego | |||
Updated: 9, 2005 | Rating: 42 | Author: Hermetic Systems | Size: 1896 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
24. | Chat Little Black Address Book 1.1 (hirtlesoftware.com) | ||
"tap-dancing" required when you cannot remember a chat partner's details. So, with this in mind this software was created. No more jotting down peronal chat partner information on loose pieces of paper or yellow stickies. Have your database open and ready whenever you go online. Add new chat | |||
Updated: 9, 2005 | Rating: 0 | Author: Tim Hirtle | Size: 5147 kb | Shareware Go to category: Communications > Chat & Instant Messaging Similar programs | |||
25. | Advanced Keylogger 1.7 (eltima.com) | ||
Advanced Keylogger is an invisible surveillance tool that records every keystroke to encrypted user-friendly easy-to-understand logs. Logs can also be automatically sent to any number of specified e-mails. Advanced Keylogger also monitors the internet activity by logging all web-pages the user visits | |||
Updated: 9, 2005 | Rating: 242 | Author: SoftInfinity | Size: 1146 kb | Shareware Go to category: Security & Privacy > Password Managers Similar programs | |||
26. | Sammy Suricate 1.45 (suricate-software.com) | ||
protecting the gems and finding out how suricates taste. The player’s task is to help Sammy escape, avoid the Lions and find the gems, armed with nothing more than Sammy’s wits, speed and wasps. The game comes with a forgiving learning curve. The initial tutorial stages are simple enough for | |||
Updated: 9, 2005 | Rating: 0 | Author: Suricate Software | Size: 9000 kb | Shareware Go to category: Games & Entertainment > Other Similar programs | |||
27. | Spell ID 2.02 (aidsoft.com) | ||
Learn all scales, intervals, triads to 13th chords, cadences, borrowed chords and secondary dominants. Learn the pop chords in 'real' books and sheet music, all with immediate feedback and scoring.The Help file is a complete music theory book. Answer questions by clicking the screen keyboard. See your | |||
Updated: 9, 2005 | Rating: 0 | Author: Gil Trythall | Size: 735 kb | Demo Go to category: Education > Other Similar programs | |||
28. | HIME: Huge Integer Math and Encryption 1.04 (users.skynet.be) | ||
stands for Huge Integer Math and Encryption library. It is a collection of functions for Windows programmers that allows to implement RSA public key encryption, AES (Rijndael) and ArcFour (RC4) secret key encryption and digital signatures using the SHA-1, SHA-256 or | |||
Updated: 9, 2005 | Rating: 949 | Author: E. Van Esch | Size: 747 kb | Shareware Go to category: Development > Components & Libraries Similar programs | |||
29. | ICE License 2.01 (aidsoft.com) | ||
against illegal copy using the power of Elliptic Curvesl Asymmetric Encryption to protect your application. Elliptic Curves encryption system allow transmission of secret information over an open channel without a common secret key previously shared between the ends.ICE | |||
Updated: 9, 2005 | Rating: 0 | Author: Bruno Branciforti | Size: 439 kb | Shareware Go to category: Development > Delphi Similar programs | |||
30. | SpyAnytime PC Spy 2.4 (waresight.com) | ||
is a powerful spy software to secretly track all activities of computer users with just a single click, and it does NOT require you to have advanced computer skills at all. It allows you to monitor and record all areas of computer usage, e.g. keystroke, e-mail, online chat, passwords, Web sites, and take screen snapshots every few seconds like a surveillance camera. Features include | |||
Updated: 9, 2005 | Rating: 520 | Author: Jason H | Size: 1400 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
|
Home > Secret key encryption software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|