|
||||||
|
||
|
Home > Strong software |
Related keywords: strong encryption, strong disk encryption, strong name, strong password |
|
|
291. | WinRAR 3.50 (rarsoft.com) | ||
30 percent more than ZIP files. WinRAR's main features are very strong general and multimedia compression, processing of non-RAR archives, intuitive wizard for novice users, long filename support, programmable self-extracting archives (SFX), damaged archive repair, support for parity volumes and missing volume replacement, authenticity verification, embedded file comments, and | |||
Updated: 9, 2005 | Rating: 0 | Size: 990 kb | Shareware Go to category: System Utilities > File Compression Similar programs | |||
292. | StrongDisk Pro 3.0 (strongdisk.com) | ||
disks. All content of these disks is encrypting on-the-fly with strong crypto-algorithms. To mount disk a password and an external key is required. Any files, documents and databases can be kept on and opened directly from encrypted disks. The content of disk is physically stored in a common file. Thus backup can be made easily. You may store this file on hard disk, floppy, CD or any | |||
Updated: 9, 2005 | Rating: 0 | Size: 1914 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
293. | IntraMail 2003.01.20 (homepage.sunrise.ch) | ||
can be protected by a password. The personal messages are always strongly encrypted (with 3 adaptive codes). These short mails are extremely well protected against local hackers and Internet attacks like Trojans or Tunneling-helpers or other applications. Passwords stay encrypted in memory and swap files. Wireless networks and mixed networks can be used very securely. A CHAT-room | |||
Updated: 9, 2005 | Rating: 0 | Author: Jean-Maurice Tellenbach | Size: 2918 kb | Shareware Go to category: Communications > E-Mail Clients Similar programs | |||
294. | Private Encryptor 6.2 (tropsoft.com) | ||
Executables. Registered version has DES, and Blowfish encryption, stronger encryption available as an add on. Features an extremely flexible and easy to use interface. Files/Folders can be Encrypted, Decrypted or Shredded right from the Windows Explorer when you right click. Since the Stealth | |||
Updated: 9, 2005 | Rating: 0 | Author: Silvio Kuczynski | Size: 1540 kb | Demo Go to category: Security & Privacy > Encryption Tools Similar programs | |||
295. | wodSSH 2.3.7.0 (weonlydo.com) | ||
layer is a secure low level transport protocol. It provides strong encryption, cryptographic host authentication, and integrity protection. Using wodSSH is easily - just put it on your form, set Protocol type and issue Connect method - and just wait for things to happen. When in secure mode - you can connect to SSH servers, which are standard today in remote console | |||
Updated: 2, 2006 | Rating: 42 | Author: Kresimir Petric | Size: 1231 kb | Shareware Go to category: Network & Internet > Remote Computing Similar programs | |||
296. | wodSSHServer 1.3.0.0 (weonlydo.com) | ||
as well as old TELNET server protocol. SSH protocol provides strong encryption of data, and authentication of users over insecure networks, such as Internet. Using it is really easy. Add it to your form (or create instance on the fly), use internal methods to generate pair of keys for the server (or import existing ones from other SSH servers) and start the server. From that | |||
Updated: 2, 2006 | Rating: 0 | Author: Kresimir Petric | Size: 1368 kb | Shareware Go to category: Servers > Telnet Servers Similar programs | |||
297. | wodSSH.NET 2.1.9.0 (weonlydo.com) | ||
layer is a secure low level transport protocol. It provides strong encryption, cryptographic host authentication, and integrity protection. Using wodSSH.NET is easily - just put it on your form (or initialize new instance on the fly), set Protocol type and issue Connect method - and just wait for things to happen. You connect to SSH servers, which are standard today in remote | |||
Updated: 2, 2006 | Rating: 0 | Author: Kresimir Petric | Size: 1076 kb | Shareware Go to category: Servers > Telnet Servers Similar programs | |||
298. | Unlimited Checkers 1.1 (naorsoft.com) | ||
AI is NegaScout , A variation of The AlphaBeta Algorithm, is also strong and fast, making it one of the best checkers AIs ever made. The game has 4 difficulty levels making it a good opponent for advanced players as well as beginners. Unlimited Checkers is a Java-based checkers (also known as It features two modes (Regular & Unlimited), good graphics, optional hints | |||
Updated: 9, 2005 | Rating: 0 | Author: Naor Soft | Size: 1855 kb | Freeware Go to category: Games & Entertainment > Board Similar programs | |||
299. | Home CHAOS 3.5 (safechaos.com) | ||
of every type and even whole directory structures. For this it uses strong encryption, encryption acknowledged worldwide to be un-breakable. Encrypt text files, programs and entire folders giving additional security to your | |||
Updated: 9, 2005 | Rating: 0 | Size: 483 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
300. | Tunnelier 4.12 (bitvise.com) | ||
HTTP proxy for dynamic forwarding; forwards Windows file shares; has strong auto-reconnect features; an FTP-to-SFTP protocol bridge; support for single-click Remote Desktop forwarding for graphical server access. Supports public key user authentication, as well as transparent authentication with | |||
Updated: 2, 2006 | Rating: 1238 | Author: Bitvise Limited | Size: 4380 kb | Freeware Go to category: Network & Internet > Other Similar programs | |||
|
Home > Strong software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|