Home | Submit a file  |  New  |  Categories  |  Our awards  |  Link to us  |  RSS Feeds

Popular search phrases :: A :: algorithm
Display: short descriptions | full descriptions
  • WinBall 2 is the sequel to WinBall, and features 50 new levels. A new twist is the magnesium that randomly changes the trajectory of the ball which is knocked out of bricks for two new added bonuses. In addition, a loss of algorithm bonuses makes the game more interesting. Now the game two modes, normal and complicated with its increased speed and doubling of scores. The simple and intuitive interface remains however, with the configuration and a
  • 1st Email Address Verifier (EAV) is a program that verifies the validity of e-mail addresses in mailing lists.The program works on the same algorithm as ISP mail systems do. Mail servers addresses for specified address are extracted from DNS. The program tries to connect with found SMTP-servers and simulates sending a message, but does not send the message out. EAV disconnects as soon as mail server informs whether this address exist or not.
  • Passwords Base will keep all your passwords in a secure database, so you only have to remember one single master password. The database is encrypted using the best and most secure encryption algorithms. A clickless and intuitive interface makes it easy to manage your passwords.
  • Guardship is the unique .NET protection tool that proves real security for your production software. Unlike Skater .NET obfuscator that makes the unauthorized reverse-engineering more difficult by symbol renaming, control-flow algorithms, encrypting etc., Guardship totally stops MSIL disassemblers. This is the assurance that no one will see your source code.
  • Notepad for safe storage of records. Store passwords from websites or notes without worrying about their safety. The program uses the most popular and powerful encryption algorithm AES. Securepad is lightweight and can be run from a flash drive. The program works with text files.
  • EaseFilter Data Protection SDK provides a comprehensive data protection solutions for the sensitive data.The SDK includes the build in encryption driver engine, it can encrypt and decrypt the files transparently with 256 bit AES algorithm; The SDK includes the file access control driver engine, it can prevent the access to sensitive files by unauthorized users or processes; The SDK also includes the file I/O access monitor driver engine.
  • Apply this data recovery tool and recover or restore all the inaccessible data from your iPhone 5C device. This tool is specially design for the iPhone 5C device that can able to recover all the deleted data from this device with ease. This tool can able to recover data such as videos, audios, images, contacts, text messages, notes, calendar, call history, reminder, camera roll, safari bookmark, message attachments, voice memos and photo stream which you thinking you would lost those data forever. This tool has very strong algorithm but along with it this tool is designed with very simple user interface. Its user interface makes the entire user able to recover their deleted data without any problem. If your data gets deleted from your iPhone 5C then don?t worry simply download iPhone 5C data recovery tool and install this tool in to your computer after installing run it and follow the given steps one by one it takes a few minutes to recover your deleted data from your iPhone 5C device.
  • InboxLock allows users to connect their email accounts and quickly filter new emails by allowing, deleting or blocking emails and senders that are potentially dangerous or unwanted. The unique embedded InboxLock algorithm (or brain) learns on an individual level. It is an infant that only learns when you teach it the difference between right (don't block) and wrong (block). It learns on the fly and will remove or allow emails.
  • Make stunning panoramas with high-resolution images taken by camera, scanner or smartphone, iFotosoft Photo Stitcher for Mac create panoramic photographs in such a simple and fast way, which should be the best alternative of Hugin panorama software for both amateurs and professionals on Mac. The panorama maker supports various general photo formats as well as the RAW files of different camera types, including Canon, Epson, Fuji, Nikon, Olympus, Sony and other popular camera types. It should be the best Nikon Panorama Maker alternative. Different stitching techniques are used to extend the capability of digital camera or other devices. Whether you have to broader the field view multiple times vertically, horizontally or tile, you can even create 360 panoramas in high resolution. Key Features: 1. Auto-select Group can detect and select photos into group intelligently. 2. Perfectly seamless stitch 3 or more pictures into panoramas. 3. Creates 360 segmented panorama in high resolution. 4. Provides 4 classic stitc ...
  • Make stunning panoramas with high-resolution images taken by camera, scanner or smartphone, iFotosoft Photo Stitcher Free for Mac create free panoramas in such a simple and fast way, which should be the best alternative of Hugin panorama software for both amateurs and professionals on Mac. The Free panorama maker supports various general photo formats as well as the RAW files of different camera types, including Canon, Epson, Fuji, Nikon, Olympus, Sony and other popular camera types. It should be the best Nikon Panorama Maker alternative. Different stitching techniques are used to extend the capability of digital camera or other devices. Whether you have to broader the field view multiple times vertically, horizontally or tile, you can even create 360 panoramas in high resolution. Key Features: 1. Auto-select Group can detect and select photos into group intelligently. 2. Perfectly seamless stitch 3 or more pictures into panoramas. 3. Creates 360 segmented panorama in high resolution. 4. Provides 4 classic ...
  • Raise Data Recovery is designated for data recovery from Windows, Linux and Mac file systems (such as NTFS, FAT, ExFAT, HFS+, Ext2, Ext3, Ex4, RaiserFS, JFS, XFS, UFS, UFS2 etc.) and raw recovery technique. The software automatically selects data recovery methods designated for the purposes of your operating system and conveniently recovers lost information from your computer. Raise Data Recovery employs careful algorithms for source analysis and powerful search and recovery mechanisms similar to those used in professional series. At the same time, it does not require special technical knowledge or skills. Raise Data Recovery is a top-level software wrapped in a simple and intuitive wizard-style interface. his style interface makes software use intuitively clear. Additionally Raise Data Recovery will give you tips and guides in the total process of data recovery. You get your data back with no effort in next to one click. The software doesn't require any extra user actions to start the proc ...
  • To protect your privacy, comply with regulations and prevent data breaches, BestCrypt Container Encryption delivers 'on-the-fly' data encryption that's easy to use for virtual drives and selected files or folders. BestCrypt encrypts files on Windows, Mac OS X and Linux with AES and other strong encryption algorithms. By featuring deniable encryption and dynamic containers Jetico's file encryption is the best TrueCrypt alternative. Includes BCWipe
  • Abstract screensaver shows colorful abstract pictures. Abstract drawings - animated abstract image with 3d effect, an abstract flowers. Animated abstract pictures similar on kaleidoscope or Mandala. Selecting quantity of segments in the picture, changing algorithms and detailed elaboration of pictures, receive hundreds new colourful images, receive surprising sequences of abstract pictures with colorful animation.
  • Especially nowadays, it is important to thoroughly protect your accounts. As your e-mail or bank account.
  • SecureBlackbox is a comprehensive component collection that adds support for SFTP, FTPS, SSH, PGP, PDF, XML, S/MIME, SSL/TLS, HTTPS, PKI, ZIP, EDI, Cloud, WebDAV, SAML, Office security to your VCL application. SecureBlackbox primary goal is to provide basic technology for the wide range of applications, hiding the details of low-level protocols and algorithms, used by the parties during secure communications. This is VCL edition.
  • SecureBlackbox is a comprehensive library that adds support for SFTP, FTPS, SSH, PGP, PDF, XML, S/MIME, SSL/TLS, HTTPS, PKI, ZIP, EDI, Cloud, WebDAV, SAML, Office security to your PHP web pages and scripts. SecureBlackbox primary goal is to provide basic technology for the wide range of applications, hiding the details of low-level protocols and algorithms, used by the parties during secure communications. This is PHP edition.
  • BestCrypt Volume for Disk Encryption protects all data on all types of volumes residing on fixed and removable disks, plus supports RAID and GPT partitions, UEFI and Windows 8 computers. Jetico encryption software provides protection from physical threats, such as lost or stolen computers and USB drives. BestCrypt utilizes a wide variety of algorithms (AES, Twofish, Serpent) and the largest possible key sizes with XTS, LRW encryption modes.
  • SecureBlackbox.NET is a comprehensive component collection that adds SFTP, FTPS, SSH, PGP, PDF, XML security, S/MIME, SSL/TLS, HTTPS, PKI, ZIP, EDI, Cloud, WebDAV, SAML, Office security support to your .NET, Mono, .NET CF, Xamarin application. SecureBlackbox primary goal is to provide technology for the wide range of applications, hiding the details of low-level protocols and algorithms, used by the parties during secure conversations.
  • The program encrypts and decrypts text using the algorithm of the Cardano Grille. Read more about the algorithm you can read on Wikipedia page https://en.wikipedia.org/wiki/Cardan_grille.
  • The program encrypts and decrypts text using the algorithm of the Transposition cipher. Read more about the algorithm you can read on Wikipedia page https://en.wikipedia.org/wiki/Transposition_cipher.
  • The Auto FileCrypt tool provides comprehensive encryption solution to protect your sensitive and confidential data. It can integrate with the file system seamless, to encrypt and decrypt the files transparently. Atuo file encryption tool performs real-time I/O encryption and decryption of the files in any block data with 16 bytes. The encryption uses a 256 bits symmetric key to encrypt or decrypt the data with AES encryption algorithm.
  • SecureBlackbox is a comprehensive library that adds support for SFTP, FTPS, SSH, PGP, PDF, XML, S/MIME, SSL/TLS, HTTPS, PKI, ZIP, EDI, Cloud, WebDAV, SAML, Office security to your C++ and Objective C applications. SecureBlackbox primary goal is to provide basic technology for the wide range of applications, hiding the details of low-level protocols and algorithms, used by the parties during secure communications. This is C++ edition.
  • SecureBlackbox for Java is a comprehensive class library that adds SFTP, FTPS, SSH, PGP, PDF, XML security, S/MIME, SSL/TLS, HTTPS, PKI, ZIP, EDI, Cloud, WebDAV, SAML, Office security support to your Java or Android application. SecureBlackbox primary goal is to provide technology for the wide range of applications, hiding the details of low-level protocols and algorithms, used by the parties during secure conversations.
  • The PDF compressor is one of the most convenient software tools you can have. It is virtually easy to install, always updated with new versions, with a batch processing function, it supports flate algorithm to compress, saves space, do not compromise document quality (e.g. font and formatting), and last but not the least - 100% free.
  • Recover files and lost or deleted Microsoft Office documents with a step-by-step wizard. Office Recovery Wizard undeletes Office documents erased from the Recycle Bin, and recovers files lost due to a system failure, disk crash or file system corruption. Powerful recovery algorithms support documents created with Microsoft Office 95-2007, OpenOffice 1 and 2, and StarOffice.

Page 1 of 10
1 2 3 4 5 6 7 8 9 10


Legal disclaimer | Privacy policy

© 2004-2016 IT Shareware