|
||||||
|
||
|
Home > Public key encryption software |
Related keywords: encryption, file encryption, Encryption, public key, encryption software, encryption system, public, email encryption, data encryption, hard disk encryption |
|
|
81. | MSCCrypto for Windows 2.0 (miraplacid.com) | ||
and stand-alone applications. It includes collection of the best encryption and hashing algorithms: - RSA public key algorithm (512/1024/2048 bits key size) - AES symmetric block algorithm (128/192/256 bits key size) - Blowfish symmetric block algorithm (64 to 448 bits key size) - Cast5 (Cast 128) symmetric block algorithm (128 bits | |||
Updated: 9, 2005 | Rating: 313 | Author: Miraplacid Software Development | Size: 824 kb | Shareware Go to category: Web Development > ASP & PHP Similar programs | |||
82. | Home CHAOS 3.5 (safechaos.net) | ||
type and even whole directory structures. For this it uses strong encryption, encryption acknowledged worldwide to be un-breakable. Encrypt text files, programs and entire folders giving additional security to your | |||
Updated: 9, 2005 | Rating: 0 | Size: 483 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
83. | CrypTalk 1.0 (reymax.com) | ||
is a full-featured secure chat client based on strong public key cryptography. CrypTalk messages can include embedded pictures, data files, etc. Other features include: automatic or manual network computer detection, user groups, blacklists, auto responder, and message templates. Socks 4, 4a, 5 are supported. CrypTalk is a full-featured secure chat client based on strong | |||
Updated: 3, 2005 | Rating: 42 | Author: Max Nukin | Size: 680 kb | Shareware Go to category: Network & Internet > Other Similar programs | |||
84. | PlexCrypt Compression-Encryption 3.1 (plexobject.com) | ||
protects documents and folders based on both asynchronous encryption based on Public-Key-Infrastructu re (PKI) and synchronous encryption based on passwords. The encryption uses secured algorithms such as AES, Blowfish, CAST, DES, ElGamal, IDEA, IES, RC4, RC6, RSA, Rijndael, Serpent Skipjack, Twofish, etc. It allows users to encrypt multiple | |||
Updated: 3, 2005 | Rating: 42 | Author: Shahzad Bhatti | Size: 9000 kb | Demo Go to category: Network & Internet > Other Similar programs | |||
85. | Ghost Installer Studio 3.7.1 (ginstall.com) | ||
Ghost Installer Studio 3.7 offers full support for Microsoft's cutting-edge Visual Studio .NET 2003 as well as Borland's complete line of development tools: Delphi, C++Builder, and JBuilder. New: 11 Project Wizards - more than in any other installation tool - take developers step-by-step through the Setup Design for their Visual Basic.NET, Visual C#.NET, Visual | |||
Updated: 3, 2005 | Rating: 96 | Author: gInstall Corp. | Size: 10503 kb | Demo Go to category: Development > Install & Setup Similar programs | |||
86. | Maxus 3.05 (neurobridge.com) | ||
the hotkeys and even open and close the CD-ROM tray by pressing keys on your keyboard. Maxus also features a skinnable desktop clock that can display the current time or the time passed since the last reboot; the clock also supports voiced time spelling in multiple languages and can synchronize system time with the highest precision atomic clock servers via Internet. Powerful system | |||
Updated: 8, 2004 | Rating: 0 | Author: NeuroBridge | Size: 1366 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
87. | Maxus SE 3.05 (neurobridge.com) | ||
the hotkeys and even open and close the CD-ROM tray by pressing keys on your keyboard. Maxus SE also features a skinnable desktop clock that can display the current time, the time passed since the last reboot or the duration of the current Internet connection; the clock also supports voiced time spelling in multiple languages and can synchronize system time with the highest precision | |||
Updated: 8, 2004 | Rating: 42 | Author: NeuroBridge | Size: 1383 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
88. | Hiding CHAOS 5.6 (safechaos.net) | ||
large hiding capacity (~100% of carrier file). Includes built-in encryption and ability to hide data within specific sub-areas of the image. Chaos uses the newest chaos logic and stream cipher. It has high speed and allows variable-length keys, making it very reliable and easy to use. The program is compact, efficient and user-friendly. The program has comprehensive privacy | |||
Updated: 8, 2004 | Rating: 16 | Size: 458 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
89. | ShyFile - 6144bit Email and File Encryption 5.13 (shyfile.de) | ||
installation of ShyFile itself to decode. ShyFile offers a depth of encryption of 192 and up to 6144bit since a variable symmetric key length of minimum 32 and up to 1,024 characters is employed, that reaches or even tops military requirements. True 6144bit depth of encryption since no | |||
Updated: 8, 2004 | Rating: 0 | Author: Dr. Bootz GmbH | Shareware Go to category: Security & Privacy > Other Similar programs | |||
|
Home > Public key encryption software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|