|
||||||
|
||
|
Home > Usa flag software |
Related keywords: flag, american flag, usa flag com, flag screensaver, flag saver, us flag |
|
|
31. | SecureWord 1.5 (secureword.com) | ||
Standard of the National Institute of Standards and Technologies of USA, TwoFish- of Counterpane Inc.- a well-known encryption algorithm of an established company. An improved security system. Convenient and easy interface. We designed it with special attention because the ease of your work depends on | |||
Updated: 2, 2006 | Rating: 0 | Author: Pavel Sokolov | Size: 548 kb | Shareware Go to category: Security & Privacy > Password Managers Similar programs | |||
32. | SPac 1.6.0.28 (qsc.co.uk) | ||
wiped from disk. SPac was developed and compiled outside of the USA, has no back doors or escrow keys, and is not subject to US export restrictions. Files are encrypted using the very strong BlowFish (448-bit key) algorithm, and high compression keeps the filesize down. SPac is an easy to use, secure, and powerful application for file encryption and sharing. SPac combines both | |||
Updated: 3, 2005 | Rating: 21 | Author: Ewan McNab | Size: 1552 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
33. | SpyArsenal.com Telephone Spy 3.01 (spyarsenal.com) | ||
compatible, so the memos include all details (such as the caller’s number and name) obtained via the Caller ID mechanism. The number of recorded calls is limited by your hard drive capacity only (you can save the conversations as WAV files for better quality or compress them to MP3 to save space). The program can load at each system startup and automatically record all telephone | |||
Updated: 9, 2005 | Rating: 16 | Author: Oleg Afonin | Size: 1682 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
34. | USA Shield 2.15 (usa.safeworld.info) | ||
USA Shield is the suite of encryption tools for personal and professional security. It allows you to protect the privacy of your sensitive files and messages by encrypting them with up to three strong cryptographic algorithms. Once the information has been encrypted, it can be stored on insecure media | |||
Updated: 9, 2005 | Rating: 0 | Size: 527 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
35. | ZIP Code Distance Wizard 1.10 (pcshareware.com) | ||
within close proximity of a specified ZIP Code. For example, let's say that you are a direct marketer and you want to send out a mass mailing to all addresses within a 50 mile radius of a particular ZIP Code. But how do you know what ZIP Codes are within a 50 mile radius of a specific ZIP Code? Or perhaps you are a sales person who obtains commissions based on sales that occur | |||
Updated: 9, 2005 | Rating: 0 | Author: Philip Kapusta | Size: 1394 kb | Shareware Go to category: Business > Databases & Tools Similar programs | |||
36. | Caterpillar 1.00 (vega.math.spbu.ru) | ||
developed in Russia (St. Petersburg, Moscow) and also in UK and USA (under the name of SSA; that is, Singular Spectrum Analysis). The new book "Analysis of Time Series Structure: SSA and Related Techniques", authors are N. Golyandina, V. Nekrutkin and A. Zhigljavsky, provides a careful, lucid description of SSA general theory and methodology (in English, Chapman&Hall/CRC, see | |||
Updated: 3, 2005 | Rating: 42 | Author: Nina Golyandina | Size: 348 kb | Freeware Go to category: Business > Other Similar programs | |||
37. | CaterpillarSSA 3.30 (gistatgroup.com) | ||
developed in Russia (St. Petersburg, Moscow) and also in UK and USA (under the name of SSA; that is, Singular Spectrum Analysis). The new book "Analysis of Time Series Structure: SSA and Related Techniques", authors are N. Golyandina, V. Nekrutkin and A. Zhigljavsky, provides a careful, lucid description of SSA general theory and methodology (in English, Chapman&Hall/CRC, see | |||
Updated: 9, 2005 | Rating: 42 | Author: Nina Golyandina | Size: 840 kb | Shareware Go to category: Education > Mathematics Similar programs | |||
38. | CryptIt 1.301 (SinnerComputing.com) | ||
was unbreakable to brute force attacks, but the government of the USA now requires all Top Secret data to use keys of at least 192 bits. This bar will keep raising as computing power increases. (It is argued by some though that this will never happen due to the laws of physics!) CryptIt is designed to use conventional XOR encryption on keys that are the same size as the file to be | |||
Updated: 2, 2006 | Rating: 0 | Author: Andrew Glina | Size: 33 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
39. | SSH client for windows SSHPro 2.9 (labtam-inc.com) | ||
Furthermore, SSHPro has been developed entirely outside of the USA, and can be sold anywhere in the world (apart from places where people aren't allowed to own cryptographic software). Features include: Compatible with SSH protocol version 2 Ciphers: 3DES, IDEA, Blowfish, DES, RC4 Authentication using password Compression support Connection forwarding, including full | |||
Updated: 2, 2006 | Rating: 0 | Author: Submit Submit | Size: 3136 kb | Shareware Go to category: Network & Internet > Other Similar programs | |||
40. | SecureWord 1.5 (cezeo.com) | ||
Standard of the National Institute of Standards and Technologies of USA, TwoFish- of Counterpane Inc.- a well-known encryption algorithm of an established company. An improved security system. Convenient and easy interface. We designed it with special attention because the ease of your work depends on | |||
Updated: 9, 2005 | Rating: 0 | Author: Pavel Sokolov | Size: 563 kb | Shareware Go to category: Security & Privacy > Password Managers Similar programs | |||
|
Home > Usa flag software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|