|
||||||
|
||
|
Home > Brute software |
Related keywords: brute force, brute force attack |
|
|
81. | GreatCrypt 2.0 (miraxus.com) | ||
of the Security Officer is taken on by the user themselves. With it's zero learning curve and powerful features, it is the ideal product for all users. Using GreatCrypt you can be absolutely sure that nobody ever will have an access to your personal, commercial and confidential information. GreatCrypt contains many advanced features to help you better secure your files. Use all | |||
Updated: 9, 2005 | Rating: 124 | Author: Bagrat Mirakian | Size: 638 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
82. | EF Commander OS/2-PM 2.33 (efsoftware.com) | ||
EF Commander for OS/2 is a complete file manager for the OS/2 desktop. If you've ever used and liked Norton Commander, you'll like this dual-windowed program, which comes complete with bubble and online help. You can search directory trees and directories and perform actions, including Run, on files. You can If you've ever used and liked Norton Commander, you'll like this dual-windowed program. Multilingual. Shareware, FREE Updates | |||
Updated: 9, 2005 | Rating: 0 | Author: Emil Fickel | Size: 479 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
83. | Excel Password Recovery 1.0L (intelore.com) | ||
protected with password for open. The program supports the "brute-force" attack, dictionary-based attack and dramatically fastest "Booost-Up" attack. The program automatically saves password searching state and can resume an interrupted attack (after a stop, crash, etc.) Excel Password Recovery is a program to recover lost or forgotten passwords to the Microsoft Excel | |||
Updated: 9, 2005 | Rating: 242 | Author: Mr Intelore | Size: 609 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
84. | DB Maker 2.0 (internet-soft.com) | ||
DataBase Maker allows you to extract specific data from HTML and TXT documents and create text databases. The program lets you analyze and search a selected document for specified data, and convert the unstructured results into a text file for further processing in a spreadsheet application like Microsoft | |||
Updated: 9, 2005 | Rating: 42 | Author: DB Maker | Size: 537 kb | Shareware Go to category: Network & Internet > Search/Lookup Tools Similar programs | |||
85. | DCPP 2.7 (securstar.com) | ||
transparent data protection. DCPP allows you to secure your disk(s) (including removable media) with a powerful and proven encryption algorithm (AES-256) at the sector level, ensuring that only authorized users may access it. The encryption algorithm used by DCPP is a trusted, validated algorithm | |||
Updated: 9, 2005 | Rating: 0 | Author: Wilfried Hafner | Size: 5411 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
86. | DriveCryptPlusPack 1.0c (securstar.de) | ||
allows you to secure your disk(s)(including removable media) with a powerful and proven encryption algorithm(AES-256) at the sector level, ensuring that only authorized users access it. The encryption algorithm is a trusted,validated algorithm chosen by the National Institute of Standards and Technology(NIST) and slated to be the cryptographic standard for years to come. AES-256 is a | |||
Updated: 9, 2005 | Rating: 0 | Author: Wilfried Hafner | Size: 2779 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
87. | dsCrypt 1.10 (members.ozemail.com.au) | ||
widely accepted algorithm - BruteHalt and exceptional resistance to brute-force password search - inherent resistance to brute-force key search - Secure PassPad and immunity to keylogger-infested environments - disclosed implementation and source code - secure use of system resources - verified data and file processing - efficient user interface and operation - speedy | |||
Updated: 9, 2005 | Rating: 0 | Author: Dariusz Stanislawek | Size: 25 kb | Freeware Go to category: System Utilities > File & Disk Management Similar programs | |||
88. | ASHE - A Scripted Hex Editor 2.0 (grandriversoftware.com) | ||
ASHE - A Scripted Hex Editor is a hex editor with a built-in scripting language. Through the user interface you can view basic data types in hex, binary or decimal. From an 8 byte viewport, data is sliced into 8 single characters, four 16 bit integers (signed and unsigned are displayed), two 32 bit integers | |||
Updated: 9, 2005 | Rating: 53 | Author: Mark Manning | Size: 4866 kb | Shareware Go to category: System Utilities > Text/Document Editors Similar programs | |||
89. | bed 0.2.23 (bed.dse.nl) | ||
Menu driven binary editor. Dataformats are ascii, unsigned (base 2-36: bin,oct,dec,hex,etc) and signed integers, float, bitflags, bitfields, labels, ebcdic and time_t. Different sizes and byte ordenings are possible. Datatypes can be used in structures. Contains copy, past, undo, redo, search, replace | |||
Updated: 9, 2005 | Rating: 16 | Author: Jaap Korthals Altes | Size: 380 kb | Freeware Go to category: System Utilities > Text/Document Editors Similar programs | |||
90. | BitZipper 4.1 SR-1 (bitzipper.com) | ||
of BitZipper's dominant strengths is its built-in support for ACE, ARC, ARJ, BH, CAB, GZ, JAR, LHA, LZH, RAR, TAR, TGZ, UUE, WAR, XXE, Z, ZIP and ZOO files; no third-party products are needed. You can access almost every compressed file with just this one tool. No need for additional software applications; no wasted expense. Another one of BitZipper's strengths is that it | |||
Updated: 9, 2005 | Rating: 124 | Author: Brian Rasmusson | Size: 2714 kb | Shareware Go to category: System Utilities > File Compression Similar programs | |||
|
Home > Brute software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|