|
||||||
|
||
|
Home > Public key encryption software |
Related keywords: encryption, file encryption, Encryption, public key, encryption software, encryption system, public, email encryption, data encryption, hard disk encryption |
|
|
31. | Dialer Queen 1.31 (dialerqueen.com) | ||
Dialer Queen does not look as an ugly software monster due to it's excellent skin engine and user friendly interface! So, why choose dialer? Choose Dialer Queen! Key features: * Supports skins * Supports plugins * Supports several ISP's * Supports unlimited phone numbers to dial up * Keeps the detailed statistics for each connection, providing you with handy | |||
Updated: 9, 2005 | Rating: 0 | Author: Oleg Pivovarov | Size: 1456 kb | Shareware Go to category: Network & Internet > Other Similar programs | |||
32. | Email CHAOS 4.52 (safechaos.net) | ||
their digital signature, CHAOS automatically use a copy of their public key to check the digital signature and to make sure that no one has tampered with the contents. It is compact, reliable and simple program for sending protected messages to friends, colleagues and | |||
Updated: 9, 2005 | Rating: 0 | Size: 424 kb | Shareware Go to category: Communications > Other E-Mail Tools Similar programs | |||
33. | i3Connect Merlin 1.1 (i3connect.com) | ||
networks. SECURITY Merlin provides end-to-end security with key features such as LDAP based authentication, PKI encryption, and X.509 Digital ID support. Merlin is also designed to prevent security breaches such as spam and viruses. For those customers who need to archive messages to meet corporate HR policy or regulatory requirements such those from SEC or HIPPA | |||
Updated: 9, 2005 | Rating: 42 | Author: i3Connect, Inc | Size: 379 kb | Commercial Go to category: Communications > Chat & Instant Messaging Similar programs | |||
34. | Order Maven 1.31 (briggsoft.com) | ||
e-mail credit card orders directly back to merchant with built-in public key encryption and SMTP functions. Visually design your forms with the drag and drop interface. Order form generator for online merchants. Create stand-alone Windows executables that can be distributed royalty-free to customers. Collect, encrypt, and e-mail credit card | |||
Updated: 9, 2005 | Rating: 0 | Author: Kent Briggs | Size: 852 kb | Shareware Go to category: Network & Internet > Other Similar programs | |||
35. | PopMessenger 1.61 (leadmind.com) | ||
opportunity to win the race and beat the competition. One of the key factors of successful business operation is well-thought staff communication system. Good managers know that each minute of work time spent in vain means profit loss. That is why building fast and convenient personnel communication environment is so important, these days. Common means of communication, such as | |||
Updated: 9, 2005 | Rating: 0 | Author: LeadMind Development | Size: 1606 kb | Shareware Go to category: Communications > Chat & Instant Messaging Similar programs | |||
36. | Private Shell SSH Client 2.1 (privateshell.com) | ||
not familiar with SSH, you can easily establish connections that use public key authentication and provide ssh tunneling for third-party applications (such as Oracle, MySQL, CVS, VNC, e-mal clients and other software). Private Shell's default configuration allows you to connect to any | |||
Updated: 2, 2006 | Rating: 0 | Author: TB Labs | Size: 2429 kb | Shareware Go to category: Network & Internet > Terminal & Telnet Clients Similar programs | |||
37. | SecEx Secure Shell Client 1.6 (bytefusion.com) | ||
remote files on your local PC - using strong, industry standard encryption. If you are a travelling executive who wants to access files on a corporate server or a system administrator maintaining a remote site, SecEx is your complete remote file management solution. SecEx automatically detects available carrier protocols available on server systems. Newer SSH servers tend to make | |||
Updated: 9, 2005 | Rating: 0 | Author: Bytefusion Sales | Size: 3610 kb | Demo Go to category: System Utilities > Other Similar programs | |||
38. | SecExMail Home 1.51 (bytefusion.com) | ||
e-mail encryption software uses 8192-bit RSA public key encryption and a secure 384-bit cipher, incorporating the AES candidate Twofish algorithm; SecExMail features PGP-style e-mail keys, but without the dependence on e-mail-software-specific plug-ins. The software runs | |||
Updated: 9, 2005 | Rating: 0 | Author: Bytefusion Sales | Size: 2613 kb | Freeware Go to category: Security & Privacy > Anti-Spam & Anti-Spy Tools Similar programs | |||
39. | SecureCRT 4.1.2 (promaxum.com) | ||
RC4, Blowfish, and Twofish ciphers, with password authentication, public-key authentication, and Kerberos v5 authentication via GSSAPI. Port forwarding allows redirecting TCP/IP applications over an encrypted channel. SecureCRT is ideal for connecting to remote systems running UNIX and VMS as well as the many BBSs and databases that are now available via the Internet. Remote | |||
Updated: 9, 2005 | Rating: 0 | Author: VanDyke Software Inc. | Size: 4103 kb | Shareware Go to category: Network & Internet > Terminal & Telnet Clients Similar programs | |||
40. | ShyFile - 6144bit Email and File Encryption 5.13 (shyfile.de) | ||
installation of ShyFile itself to decode. ShyFile offers a depth of encryption of 192 and up to 6144bit since a variable symmetric key length of minimum 32 and up to 1,024 characters is employed, that reaches or even tops military requirements. True 6144bit depth of encryption since no | |||
Updated: 8, 2004 | Rating: 0 | Author: Dr. Bootz GmbH | Shareware Go to category: Security & Privacy > Other Similar programs | |||
|
Home > Public key encryption software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|