Home | Submit a file  |  New  |  Categories  |  Our awards  |  Link to us  |  RSS Feeds

Popular search phrases :: A :: algorithm
Display: short descriptions | full descriptions
  • Do not hesitate recovering Adobe Acrobat files if you encounter data corruption issues affecting the integrity of PDF files. The online PDF fix engine, provided by PDF Fix Toolbox, represents an efficient solution against the damage of specified files, caused by any reason. Please take a closer look at PDF Fix Toolbox and make sure it is the easiest way out against the corruption of Adobe Acrobat documents.
  • If you have lost data to corruption from a computer crash or power outage, do not despair! Excel Repair Toolbox is a powerful, easy-to-use utility which can restore data, functions, and even custom formatting from most Microsoft Excel formats. Excel Repair toolbox uses a specially-designed heuristic search algorithm to ensure that your data is carefully and quickly preserved. Compatible with Windows 98, NT 4.0, 2000, ME, XP, Vista, and Windows 7.
  • Recover lost data from a whole host of multimedia devices, from Digital Still Cameras, Audio Recorders, MP3/WMA Players to PCs, PDAs and mobile phones. Features innovative recovery algorithms and contains advanced data recovery capabilities that allow you to search file types including music files, images, video, documents, mail and more...
  • Get Photoshop Restore Toolbox if you encounter data corruption problems in Adobe Photoshop documents and there are no other copies of corresponding PSD file to be used as backup. The highest efficiency of image restoration program is achieved by the usage of intelligent data recovery algorithms, restoring the structure of PSD files of any size, version and root cause of damage. Check it out on any PC and evaluate the efficiency of PSD restore.
  • PST Viewer Tool is a comprehensive solution for viewing the contents of corrupted Outlook PST files and recovering their data. . The unique algorithm in the core of the program makes recovery possible even in the most serious cases of data corruption. PST Viewer Tool features a step-by-step wizard that guides the user through the file analysis, viewing and recovery process to minimize the overall time and effort required to get the job done.
  • Crypt-o is a Client/Server password manager with many advanced features like strong data encryption, customizable databases, multi-user access, flexible permissions system, form filling, portable mode, Web access. Crypt-o is a secure Client/Server solution for creating custom databases, which is designed for use in enterprise networks. The data is reliably stored in Firebird SQL Server database and encrypted using AES algorithm with 256-bit key.
  • esProc is a new Big Data computing solution, which is particularly suitable for multiple data sources and complex business logic applications. With professional Big Data script offered by esProc, users do not have to realize basic algorithms and achieve higher developing efficiency, more flexible computation and better performance. esProc has a complete computational system, supporting parallel computation and HDFS. It could play a role as a database computational middleware with higher performance but lower cost. esProc has a complete computational system with support of multi-node parallel computation and also can be used as Big Data computation middleware to bear the computing pressure from database, HDFS or Local File and return the result to applications. esProc is excellent with complex logic computation and external storage computation, but it cannot replace Database. It also can store temporary data tables which occupy expensive database hardware resources in cheap PC and implement external sto ...
  • Finds lost password to RAR/WinRAR 3.x-5.x archives. Uses optimized algorithms for maximum performance on Intel and AMD CPUs. Uses GPU computations on modern AMD and NVIDIA video cards supporting ATI Stream and NVIDIA CUDA. Offers effective features for more flexible and high-quality password recovery: automatic password search, a macro language for creating password mutation rules for a dictionary-based attack.
  • Securely send emails to others on your network or on the internet. Messages are encrypted using the latest encryption algorithms and technology. Only the sender and receiver can decrypt and read an email.
  • AFP Printer Driver for Windows installs a virtual printer that allows users to create AFP overlays, documents, page segments, and medium overlays from any Windows application that supports printing. After you print your document to the AFP Printer, you will be prompted by a Save As dialog to specify the name and location of the AFP file to be generated. If you wish to bypass the dialog, you can simply make the AFP Printer work in the server mode. Major Features Create AFP document, page segment, medium overlay, and overlays from any Windows application Store all client users' AFP documents, page segments and overlays into a folder of your choice on the server Launch any external program to perform specific task on the server after an AFP file is created Upload AFP documents to a FTP server when finish Copy AFP files to a specific folder or remote location when finish Mail AFP documents when finish Print AFP files to a non-IPDS printer when finish Convert AFP to PDF files when finish Sup ...
  • Check CorelDraw Restore Toolbox to fix the corruption of corresponding CDR files, caused by damages, file system failures, viruses and, finally, user mistakes. It is the most efficient data recovery tool for corrupted illustrations so you may keep this data in safety by applying intelligent algorithms of this software and starting the analysis by means of CorelDraw Restore Toolbox and evaluating its results.
  • Recover Adobe PDF files, Microsoft Office documents and OpenOffice ODS and ODT files from healthy, formatted, corrupted and inaccessible storage media. Magic Office Recovery uses a set of highly advanced data recovery algorithms from Magic's partition recovery tool, ensuring that the documents can be reliably recovered from repartitioned hard drives, formatted partitions, corrupted and inaccessible disks.
  • Dennisse Stock Analyzer is a professional stock market analysis and algorithmic trading system development for serious trader. With realtime data connection to stock exchanges around the world via Google & Yahoo finance, this software allows user to analyse and simulate your trading strategy in order to see whether your investment growth steadily. Furthermore, it's equipped with a handy and powerful C# compiler to build your own strategy.
  • Designed to help you with processing and converting your mailing lists. It is able of excluding duplicated emails, correcting misspelled addresses using unique algorithms, filtering lists by varied criteria, merging lists, and making exclusions from emails lists using an additional list. MLW can supplement mailing lists with address owner names using information from other lists, delete emails owner names from lists, and also many other things.
  • ENC Encryption Software is easy-to-use program designed for reliable protection any files, using high-speed on-the-fly algorithm of encrypting.Why do you need encryption software?Practically each user of computer keeps confidential information on it. For example, personal data, credit card number, documents for working, personal pictures, movies and more.
  • Transferring sensitive data via e-mail or removable drives is not safe. Max File Encryption is a powerful yet easy-to-use encryption/steganography software that will help you protect your confidential information. With Max File Encryption, you can encrypt files of any type, hide files and also create self-decrypting packages. The program uses the strong and ultra-secure Blowfish encryption algorithm that ensures your data safety.
  • SecureBridge Standatd is a non-visual component library for Delphi and C++ Builder. It can protect any TCP network traffic using SSH or SSL secure transport layer protocols to provide authentication for client. It is a solution for developing applications using such various IDEs as RAD Studio, Delphi and C++Builder on Windows, Mac OS X, and now with support for RAD Studio XE4, NEXTGEN compiler. SecureBridge Standatd key features: * RAD Studio XE4 support * NEXTGEN compiler support * Mac OS X development support * Win64 development support * Support for SSH, SSL, and TLS protocols * Fast and customizable SSL client * Support for most SSH2-compatible clients and servers including OpenSSH * Fast and customizable SSH client * Fast and customizable SFTP client * Does not require external modules * Protection against diverse crypto attacks * Integration with Indy, MyDAC, and PgDAC * Support for SHA1 and MD5 hashing algorithms * Authentication by password or by public key * Compatible with any T ...
  • Corruption issues in the Word document are generated due to set of reasons such as virus and spyware attacks, corrupt storage media, abnormal shutdown of MS Windows and others. User can easily get rid of Word corruption by converting Word documents in a secured file format i.e. PDF. Kernel for Word to PDF lets user to convert several Word documents in PDF file. Word to PDF converting software convert several doc/docx files of MS Word to PDF at a time. It is powered with sophisticated algorithms and therefore fully capable of converting large MS Word information in PDF file. Kernel for Word to PDF export all items of a Word document such as forms, OLE data, tables, texts, images, graphs, hyperlinks and many more. It also lets user to protect output PDF file with a password, encryption and local restriction. Word to PDF converting software keeps structure, properties and formatting of the converted Word files intact in the output file. It saves exported data of a doc/docx file in a specific page format in the ...
  • 1st Email Address Verifier (EAV) is a program that verifies the validity of e-mail addresses in mailing lists.The program works on the same algorithm as ISP mail systems do. Mail servers addresses for specified address are extracted from DNS. The program tries to connect with found SMTP-servers and simulates sending a message, but does not send the message out. EAV disconnects as soon as mail server informs whether this address exist or not.
  • 1st File Undelete is a professional-grade file recovery tool priced just right. Combining sophisticated data recovery algorithms with carefully thought user interface, 1st File Undelete is just the right tool for the home user to recover files that were deleted or lost due to a disk corruption. 1st File Undelete recovers erased files of all types, and undeletes documents, archives and digital pictures with full previews.
  • Duplicate File Finder will find all duplicate files on your computer or inside a selected folder regardless of the file names comparing the file content. The applications will compare the binary data of your files and will find duplicates even if they are using different file names.It uses an optimized Byte-by-Byte comparison algorithm
  • WinDataReflector is a lightweight file synchronization and backup tool that wraps up fast file comparison and transfer algorithms into a simple and clear interface that offers you visual comparison of files and folders before synchronizing and backing them up and support for two way synchronization with fully customizable rules.
  • WinDataReflector is a lightweight file synchronization and backup tool that wraps up fast file comparison and transfer algorithms into a simple and clear interface that offers you visual comparison of files and folders before synchronizing and backing them up and support for two way synchronization with fully customizable rules.
  • Bandizip is All-In-One Free Zip Archiver. It's Lightweight, Fast, and Free archiving software and it works with WinZip, 7-Zip, WinRAR and other archive formats. Bandizip has very fast Zip algorithm for compression & extraction. It supports for ZIP, 7Z, RAR, ALZ, EGG, TAR, BH, LZH, GZ, BZ2, ISO, CAB, WIM, XZ, ARJ, and Z archives files and users can create self-extracting files (.EXE) and multi-volume (split) archives files
  • Easy and advanced encryption, decryption and hash ActiveX component for ASP or AS Support encryption and decryption of file, string, memory buffer Support calculation of hash on string, file or memory buffer Support digital signature creation and validation Support state of art crypto algorithm like RC2, RC4, MD2, MD4, MD5, SHA, SHA256, SHA384, SHA512, DES, 3DES, 3DES2, AES128, AES192, AES256 Import and export key in plain or raw bits

Page 5 of 10
1 2 3 4 5 6 7 8 9 10


Legal disclaimer | Privacy policy

© 2004-2015 IT Shareware