|
||||||
|
||
|
Home > Lens software |
|
|
61. | SafeDisk 2.10 (guardcomplete.com) | ||
SafeDisk is 128bit on-the-fly disk encription. Allows to create and use virtual ciphered disks. Supports algorithms AES (RIJNDAEL), BLOWFISH, SQUARE, GOST, SKIPJACK, RSC. Stealth. Built-in protection against keyboard spies. Mode "under enforcement". Locking of access to workstation at Windows loading/idle | |||
Updated: 3, 2005 | Rating: 42 | Author: Andre Belokon | Size: 820 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
62. | SecExFile Home 1.1 (bytefusion.com) | ||
SecExFile brings one-click file protection to the desktop. It integrates with Windows Explorer to make securing your personal or corporate data easy. SecEx File can be configured to email the armoured file once encryption is completed. + Easy to use, password based, intuitive + Strong 128/384 bit SecExMail | |||
Updated: 9, 2005 | Rating: 0 | Author: Bytefusion Sales | Size: 1747 kb | Freeware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
63. | URenameIT 2.3 (particleg.com) | ||
URenameIT is an easy to use, time saving file renamer and internal ID3 tag editor with many advanced features. Transform poorly named files into intelligently named ones with a few simple clicks! URenameIT has an extensive feature set allowing the renaming of individual or multiple files in virtually any | |||
Updated: 9, 2005 | Rating: 0 | Author: ParticleG ParticleG | Size: 1180 kb | Shareware Go to category: Audio & Multimedia > Other Similar programs | |||
64. | USA Shield 2.15 (usa.safeworld.info) | ||
USA Shield is the suite of encryption tools for personal and professional security. It allows you to protect the privacy of your sensitive files and messages by encrypting them with up to three strong cryptographic algorithms. Once the information has been encrypted, it can be stored on insecure media or | |||
Updated: 9, 2005 | Rating: 0 | Size: 527 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
65. | virtualCrypt 3.02 (netindiasolutions.com) | ||
virtualCrypt is a highly sophisticated data protection software and stands far superior in terms of user interface and the encryption technology used as compared to any other data security products available. virtualCrypt allows you to define virtual drives. These drives are like any other normal drives on | |||
Updated: 9, 2005 | Rating: 0 | Author: Sarfraz Jagirdar | Size: 6236 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
66. | XFILEBOX 1.0 (wisehuman.com) | ||
XFILEBOX is a powerful, easy to use utility for managing, protecting, and backuping your important files or folders. XFILEBOX is a wonderful archive manager with built-in compressor that enables you to organize your files more easily, and also a security utility with built-in cipher that enables you to store | |||
Updated: 9, 2005 | Rating: 0 | Author: Xia Mou | Size: 1562 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
67. | ZoomMagic 2.03 (peakstars.com) | ||
ZoomMagic is a powerful tool to magnify any portion of your screen, measure distances or capture a screen area. Targeted users are: designers and developers on the hunt for those lost pixels .. or in the need for a fast screencapture, users with visual impairments or anybody who needs to find the shortest way | |||
Updated: 9, 2005 | Rating: 0 | Author: Peak Stars | Size: 1668 kb | Freeware Go to category: Graphic Apps > Other Similar programs | |||
68. | Gravitational Lensing 1.00 (kwakkelflap.com) | ||
General Theory of Relativity demonstrates that a large mass can deform spacetime and bend the path of light. So, a very massive object, such as a cluster of galaxies can act as a gravitational lens. When light passes through the cluster from an object lying behind it, the light is bent and focused to produce an image or images of the source. The image may be magnified | |||
Updated: 9, 2005 | Rating: 25 | Author: Wouter Dhondt | Size: 74 kb | Freeware Go to category: Home & Hobby > Astrology / Biorhythms / Mystic Similar programs | |||
69. | CryptIt 1.301 (SinnerComputing.com) | ||
Most file encryptors use methods that rely on the theory of computational security, that is difficulty of key factorisation prevents decryption of the file. But this method may not work forever. It used to be considered that a 56 bit key was unbreakable to brute force attacks, but the government of the USA | |||
Updated: 2, 2006 | Rating: 0 | Author: Andrew Glina | Size: 33 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
70. | Armor System5 2.2.2 (ambitware.com) | ||
of encryption keys. Keys are generated automatically based on user's pass-phrase input and optimized for compatibility. Armor System5 will also eliminate all the evidence of the sensitive documents with its build-in Wipe utility. The program can be used with our free ARS5 Viewer/Decryptor for an easy | |||
Updated: 9, 2005 | Rating: 0 | Author: Peter Vlach | Size: 5986 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
|
Home > Lens software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|