|
||||||
|
||
|
Home > Strong software |
Related keywords: strong encryption, strong disk encryption, strong name, strong password |
|
|
31. | Tunnelier 4.12 (bitvise.com) | ||
HTTP proxy for dynamic forwarding; forwards Windows file shares; has strong auto-reconnect features; an FTP-to-SFTP protocol bridge; support for single-click Remote Desktop forwarding for graphical server access. Supports public key user authentication, as well as transparent authentication with | |||
Updated: 2, 2006 | Rating: 1238 | Author: Bitvise Limited | Size: 4380 kb | Freeware Go to category: Network & Internet > Other Similar programs | |||
32. | wodSSH.NET 2.1.9.0 (weonlydo.com) | ||
layer is a secure low level transport protocol. It provides strong encryption, cryptographic host authentication, and integrity protection. Using wodSSH.NET is easily - just put it on your form (or initialize new instance on the fly), set Protocol type and issue Connect method - and just wait for things to happen. You connect to SSH servers, which are standard today in remote | |||
Updated: 2, 2006 | Rating: 0 | Author: Kresimir Petric | Size: 1076 kb | Shareware Go to category: Servers > Telnet Servers Similar programs | |||
33. | wodSSH 2.3.7.0 (weonlydo.com) | ||
layer is a secure low level transport protocol. It provides strong encryption, cryptographic host authentication, and integrity protection. Using wodSSH is easily - just put it on your form, set Protocol type and issue Connect method - and just wait for things to happen. When in secure mode - you can connect to SSH servers, which are standard today in remote console | |||
Updated: 2, 2006 | Rating: 42 | Author: Kresimir Petric | Size: 1231 kb | Shareware Go to category: Network & Internet > Remote Computing Similar programs | |||
34. | wodSSHServer 1.3.0.0 (weonlydo.com) | ||
as well as old TELNET server protocol. SSH protocol provides strong encryption of data, and authentication of users over insecure networks, such as Internet. Using it is really easy. Add it to your form (or create instance on the fly), use internal methods to generate pair of keys for the server (or import existing ones from other SSH servers) and start the server. From that | |||
Updated: 2, 2006 | Rating: 0 | Author: Kresimir Petric | Size: 1368 kb | Shareware Go to category: Servers > Telnet Servers Similar programs | |||
35. | Windows Security Officer 6.8.1.1 (1securitycenter.com) | ||
operating system. It has the capability of providing extremely strong, secure control of who can access a personal computer resources, and exactly what they can do and when they can do it while they have access to those resources. If a user's time limit has been set and it has been reached, the computer shuts itself off and that user can not log-on again until their permitted time | |||
Updated: 2, 2006 | Rating: 0 | Author: Eugene Mihailov | Size: 1578 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
36. | Tray Safe 4.3 (traysafe.com) | ||
Safe password manager comes with a variety of enhancements, like strong password generator, network mode (client/server passwords, network password sharing). Plus, it can run directly from a removable USB drive, so you can keep and carry it with you. If you are looking for a password keeping solution and are willing to try only the best applications available, Tray Safe password | |||
Updated: 2, 2006 | Rating: 0 | Author: F-Group Software | Size: 3069 kb | Shareware Go to category: Security & Privacy > Password Managers Similar programs | |||
37. | DevSolutions Crypt 1.0.1 (devsolutions.net) | ||
to encrypt/decrypt data or files using the latest industry standard strong encryption algorithms.It can be used to encrypt/decrypt strings,memory buffers,Blobs,Files and streaming data. For strong symmetric encryption algorithm,it supports the new Rijndael Algorithm , which is a Federal | |||
Updated: 2, 2006 | Rating: 22 | Author: Customer Cell | Size: 651 kb | Shareware Go to category: Development > Active X Similar programs | |||
38. | Windows Security Officer 6.8.1.1 (mybestsoft.com) | ||
operating system. It has the capability of providing extremely strong, secure control of who can access a personal computer resources, and exactly what they can do and when they can do it while they have access to those resources. If a user's time limit has been set and it has been reached, the computer shuts itself off and that user can not log-on again until their permitted time | |||
Updated: 2, 2006 | Rating: 0 | Author: Eugene Mihailov | Size: 1578 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
39. | Win Spy Software Pro 8.6 (win-spy.com) | ||
Remote Websites Visited and Time Spent on the Net reports. Stronger Folder Hider Utility. Win Spy Software 8.6 Pro is a Complete Stealth Monitoring Software that can both monitor your Local PC and Remote PC. Win Spy Software also includes Remote Install. Win Spy Software will capture anything the user sees or types on the | |||
Updated: 2, 2006 | Rating: 346 | Author: Ben Nelson | Size: 2246 kb | Shareware Go to category: Desktop > Other Similar programs | |||
40. | Where Is It? 3.71 (whereisit-soft.com) | ||
and well thought-out, Explorer-like user interface, combined with strong searching and reporting capabilities, massive archive file support (zip, arj, rar, ace, cab, lha/lzh, arc, tar, gzip, z, sfx, and others that can be presented in catalog as virtual folders), multi-language support, automated description and thumbnails importing through extendable plugins from more than 70 | |||
Updated: 2, 2006 | Rating: 13133 | Author: Robert Galle | Size: 4065 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
|
Home > Strong software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|