|
||||||
|
||
|
Home > Public key software |
Related keywords: public, Public, public records, public address, public kiosks, public access internet terminal, public relations, public key encryption, Public Analysis, public folders |
|
|
61. | Top Secret Crypto Gold 4.10.000 (topsecretcrypto.com) | ||
passwords and pass phrases. Top Secret Crypto Gold includes RSA Key Creation, Public and Secret Key Ring Management procedures, data compression procedures, e-mail and file encryption procedures, One Time Pad Key File and True One Time Pad File creation, a completely | |||
Updated: 9, 2005 | Rating: 16 | Author: MacGregor Phillips | Size: 3321 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
62. | Screen Privacy 1.2 (pictures-soft.com) | ||
Privacy allows you to hide and restore windows by pressing a secret key. It protects your privacy and prevent your information from being seen by anyone else. Screen Privacy allows you to work calmly and do not worry about uninvited visitors. While your application are hidden, they are still working | |||
Updated: 9, 2005 | Rating: 0 | Author: Alex Shubin | Size: 851 kb | Shareware Go to category: Desktop > Other Similar programs | |||
63. | SDATimer 1.73 (dasp.at.tut.by) | ||
is multifunctional digital countdown timer, clock and stopwatch. The key features are: Calendar with Sunrise,Sunset time, Moon Phase. Cool interface with skins support, easy to use. Mp3 files support. Easy to set time - only click by digits, or by using time presets. Original AutoHide feature | |||
Updated: 9, 2005 | Rating: 0 | Author: Spitsyn Dmitry | Size: 794 kb | Shareware Go to category: Desktop > Clocks & Alarms Similar programs | |||
64. | SecureFile 2.0 (securefile.tripod.com) | ||
program that allows you to encrypt and decrypt files using symmetric key and asymmetric key mechanism. It creates a self-decryption archive which can be decrypted at the other end without any dependencies. It incorporates powerful Blowfish algorithm and certificate ( public key/ | |||
Updated: 9, 2005 | Rating: 0 | Author: Chandra Sekhar Achary | Size: 714 kb | Shareware Go to category: System Utilities > File Compression Similar programs | |||
65. | ShyFile - File and Email Security 6.24 (shyfile.net) | ||
of it, i.e. opening it and prompting the user to enter a matching key phrase. Its user friendly interface is very intuitive - no need to study the manual. ShyFile also encrypts single or multiple binary files as well as whole folders with all its subfolders in a single run, which require a free demo version of ShyFile to decode though. ShyFile exclusively makes use of its own | |||
Updated: 9, 2005 | Rating: 16 | Author: John Bettels | Size: 4419 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
66. | PC Accelerator 2005 Edition 1.1 (smartalec2000.com) | ||
and intelligent memory defragmentation - Manual adjustments for key functions. - Save favorite configurations to a file. - Built-in optimization wizard to help you fine-tune your system to the max. - Support for all the latest network protocols and equipment, including wireless connections. Brand new integrated PCPerformance control center with the following features | |||
Updated: 9, 2005 | Rating: 79 | Author: Alexander Wong | Size: 3614 kb | Shareware Go to category: System Utilities > System Maintenance Similar programs | |||
67. | PrivacyKeyboard 6.1 (anti-hack.biz) | ||
PrivacyKeyboard for Microsoft Windows 2000/XP is the FIRST product of its kind in the world that can provide every computer with strong protection against ALL types of keylogging programs (keyloggers) and keylogging hardware devices (hardware keyloggers), both known and unknown, currently in use or presently | |||
Updated: 9, 2005 | Rating: 0 | Author: Raytown Corporation LLC | Size: 2909 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
68. | Private Desktop 1.91 (tropsoft.com) | ||
comes in... Private Desktop will allow you to escape to your "public" desktop with the push of a button. Private Desktop allows you to keep a second password protected desktop containing all your private applications. Access to this desktop can be completely customized: its toolbar icon can be made either very small or invisible, hotkeys can be specified to remove you from the | |||
Updated: 9, 2005 | Rating: 0 | Author: Silvio Kuczynski | Size: 237 kb | Demo Go to category: System Utilities > Other Similar programs | |||
69. | Puffer 4.02 (briggsoft.com) | ||
email with other Puffer users via the 2048-bit Diffie-Hellman key exchange function. Compress and encrypt your data files into zip-style PUF archives. Use steganography to hide data among the pixels of image files. Distribute self-decrypting archives to non-Puffer users. Permanently erase data with wipe functions. Data file and e-mail encryption utility for Win 95 to XP. Uses | |||
Updated: 9, 2005 | Rating: 0 | Author: Kent Briggs | Size: 1056 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
70. | NETObserve 2.98 (exploreanywhere.net) | ||
a network) and moderate, administrate, and monitor the machine's activity. NETObserve's remote administration features include file system browsing, file transferring, registry key editing, startup process moderating, favorite place viewing, open port and connection records, real-time access and moderating of windows, processes, desktop, and more! NETObserve also | |||
Updated: 9, 2005 | Rating: 16 | Author: Bryan Hammond | Size: 1127 kb | Shareware Go to category: Network & Internet > Remote Computing Similar programs | |||
|
Home > Public key software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|