|
||||||
|
||
|
Home > Cast software |
Related keywords: simple cast, DIE CAST |
|
|
41. | DigiSecret 2.0 (tamos.com) | ||
any form of cryptanalysis by the best mathematicians in the world: CAST (128-bit key), Blowfish (448-bit key), Twofish (256-bit key), and Rijndael (also known as AES, 256-bit key). The program provides the option to choose the interface language: English, German, French, Spanish, or Russian. An application for strong file encryption, compression, and file sharing (peer to peer). It | |||
Updated: 9, 2005 | Rating: 0 | Author: Andrew Riedel | Size: 2573 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
42. | Geomancy 2.0.0 (tarot-deutung.de) | ||
houses plus 3 non-astrological. The programm user "sows" or casts figures and gets afterwards his readings. How does it work? You must not wait till the opening animation has finished. If you want to skip it, just click on the blue window. You can launch a programme part if you click on one of four buttons in the middle of the main window. You should put your question before | |||
Updated: 9, 2005 | Rating: 202 | Author: Mario Krsnic | Size: 2035 kb | Shareware Go to category: Home & Hobby > Astrology / Biorhythms / Mystic Similar programs | |||
43. | Gold Diamond Calculator Suite 4.0 (goldcalculator.com) | ||
Silver Calculator, Troy Oz Conversion Tool and the Lost Wax Casting Conversion Calculator. Computes Gold, Diamonds, Silver, Sterling, Platinum, Wax, and Casting in Kilos, Oz, Dwt, grams, grains and pure ounces. Saves all calculations to file and will print. A Must For All Jewelry Professionals, Pawnbrokers, Jewelers, Refineries, Investors and Laymen. The latest Runtime | |||
Updated: 9, 2005 | Rating: 0 | Author: Joe Locascio | Size: 1853 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
44. | Masker 7.0.6 (softpuls.com) | ||
MASKER encrypts files using strong encryption algorithms. (CAST 128-bit, BLOWFISH, RIJNDAEL 256-bit, TWOFISH) The encrypted files will then be hidden within a carrierfile. MASKER is able to compress files in order to reduce size of the carrier file. As a carrier file you can use: image files (bmp, gif, jpg, tif); audio files (wav, mid, snd, mp3); program files (exe, dll | |||
Updated: 3, 2006 | Rating: 16 | Author: Evgeny Zaretskiy | Size: 2399 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
45. | PlexCrypt Compression-Encryption 3.1 (plexobject.com) | ||
The encryption uses secured algorithms such as AES, Blowfish, CAST, DES, ElGamal, IDEA, IES, RC4, RC6, RSA, Rijndael, Serpent Skipjack, Twofish, etc. It allows users to encrypt multiple files and folders automatically. PlexCrypt allows users to digital sign documents and folders and use that signature to verify that original document has not been maliciously or accidently | |||
Updated: 3, 2005 | Rating: 42 | Author: Shahzad Bhatti | Size: 9000 kb | Demo Go to category: Network & Internet > Other Similar programs | |||
46. | PowerKey 2.0 (gals1.chat.ru) | ||
online. PowerKey uses encryption types, which comply with U.S. export restrictions. It allows you to perform block encryption of files and folders with any of the 8 well-known crypto algorithms (Blowfish, Cast, 3Des, Des, Gost, RC2, Rijndael, Twofish). At first, the data is compressed using zip method with ratio 0..9 (available on selection) to speed up the encryption | |||
Updated: 9, 2005 | Rating: 0 | Author: Nick Nifontov | Size: 1062 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
47. | Virtual Personality+ 4.01 (triplebit.com) | ||
even your own mother. You can cause your voice to mimic any from a cast of 24 different personalities, representing voice sources of boys, girls, men or women. Each of the 24 personality-icons on the screen can be linked to a different name and/or voice, simply by a mouse click. You are also advised | |||
Updated: 9, 2005 | Rating: 0 | Author: Izack Lesher | Size: 1728 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
48. | Wasp Static Error Checker 3.2 (waspsoft.com) | ||
may be statically detected: null pointer exception, impermissible cast, array index out of bounds, division by zero, etc. The following kinds of weak points may be detected: uninitialised variable, unreachable branch in conditional or switch statement, unreachable loop body or catch clause, assignment of variable whose value is never used, unreachable main exit of method | |||
Updated: 9, 2005 | Rating: 0 | Author: Vladimir Shelekhov | Size: 975 kb | Shareware Go to category: Web Development > Java & JavaScript Similar programs | |||
49. | wodCrypt 1.2.7.0 (weonlydo.com) | ||
common crypto algorithms, such as AES DES, TripleDES Blowfish Cast RC2 RC4 RC5 for symmetric encryption and decryption, RSA DSA for making and verifying signatures, and MD5 SHA1 for creating hashes. Working with Blobs wodCrypt works with Blobs - Binary Large Objects (it doesn't have to be big, of course) when it comes to data manipulation. Blob is our | |||
Updated: 2, 2006 | Rating: 82 | Author: Kresimir Petric | Size: 1189 kb | Shareware Go to category: Development > Other Similar programs | |||
50. | Tooth and Claw 2.1 (glipsentertainmentinc.com) | ||
other. Also at your disposal is an arsenal of spells, which are cast using karma, the energy accumulated from the worship of converted humans. As play progresses, ronin will begin to appear on the map. These are masterless monsters that may be converted to any player's team, in the same fashion in which humans may be converted. Spells and spell charges will also be | |||
Updated: 9, 2005 | Rating: 0 | Author: Gregory L. Lipscomb | Size: 13000 kb | Shareware Go to category: Games & Entertainment > Action Similar programs | |||
|
Home > Cast software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|