Home | Submit a file  |  New  |  Categories  |  Our awards  |  Link to us  |  RSS Feeds

Popular search phrases :: A :: algorithm
Display: short descriptions | full descriptions
  • AFP Printer Driver for Windows installs a virtual printer that allows users to create AFP overlays, documents, page segments, and medium overlays from any Windows application that supports printing. After you print your document to the AFP Printer, you will be prompted by a Save As dialog to specify the name and location of the AFP file to be generated. If you wish to bypass the dialog, you can simply make the AFP Printer work in the server mode. Major Features Create AFP document, page segment, medium overlay, and overlays from any Windows application Store all client users' AFP documents, page segments and overlays into a folder of your choice on the server Launch any external program to perform specific task on the server after an AFP file is created Upload AFP documents to a FTP server when finish Copy AFP files to a specific folder or remote location when finish Mail AFP documents when finish Print AFP files to a non-IPDS printer when finish Convert AFP to PDF files when finish Sup ...
  • Check CorelDraw Restore Toolbox to fix the corruption of corresponding CDR files, caused by damages, file system failures, viruses and, finally, user mistakes. It is the most efficient data recovery tool for corrupted illustrations so you may keep this data in safety by applying intelligent algorithms of this software and starting the analysis by means of CorelDraw Restore Toolbox and evaluating its results.
  • Recover Adobe PDF files, Microsoft Office documents and OpenOffice ODS and ODT files from healthy, formatted, corrupted and inaccessible storage media. Magic Office Recovery uses a set of highly advanced data recovery algorithms from Magic's partition recovery tool, ensuring that the documents can be reliably recovered from repartitioned hard drives, formatted partitions, corrupted and inaccessible disks.
  • Dennisse Stock Analyzer is a professional stock market analysis and algorithmic trading system development for serious trader. With realtime data connection to stock exchanges around the world via Google & Yahoo finance, this software allows user to analyse and simulate your trading strategy in order to see whether your investment growth steadily. Furthermore, it's equipped with a handy and powerful C# compiler to build your own strategy.
  • Designed to help you with processing and converting your mailing lists. It is able of excluding duplicated emails, correcting misspelled addresses using unique algorithms, filtering lists by varied criteria, merging lists, and making exclusions from emails lists using an additional list. MLW can supplement mailing lists with address owner names using information from other lists, delete emails owner names from lists, and also many other things.
  • ENC Encryption Software is easy-to-use program designed for reliable protection any files, using high-speed on-the-fly algorithm of encrypting.Why do you need encryption software?Practically each user of computer keeps confidential information on it. For example, personal data, credit card number, documents for working, personal pictures, movies and more.
  • Transferring sensitive data via e-mail or removable drives is not safe. Max File Encryption is a powerful yet easy-to-use encryption/steganography software that will help you protect your confidential information. With Max File Encryption, you can encrypt files of any type, hide files and also create self-decrypting packages. The program uses the strong and ultra-secure Blowfish encryption algorithm that ensures your data safety.
  • SecureBridge Standatd is a non-visual component library for Delphi and C++ Builder. It can protect any TCP network traffic using SSH or SSL secure transport layer protocols to provide authentication for client. It is a solution for developing applications using such various IDEs as RAD Studio, Delphi and C++Builder on Windows, Mac OS X, and now with support for RAD Studio XE4, NEXTGEN compiler. SecureBridge Standatd key features: * RAD Studio XE4 support * NEXTGEN compiler support * Mac OS X development support * Win64 development support * Support for SSH, SSL, and TLS protocols * Fast and customizable SSL client * Support for most SSH2-compatible clients and servers including OpenSSH * Fast and customizable SSH client * Fast and customizable SFTP client * Does not require external modules * Protection against diverse crypto attacks * Integration with Indy, MyDAC, and PgDAC * Support for SHA1 and MD5 hashing algorithms * Authentication by password or by public key * Compatible with any T ...
  • Corruption issues in the Word document are generated due to set of reasons such as virus and spyware attacks, corrupt storage media, abnormal shutdown of MS Windows and others. User can easily get rid of Word corruption by converting Word documents in a secured file format i.e. PDF. Kernel for Word to PDF lets user to convert several Word documents in PDF file. Word to PDF converting software convert several doc/docx files of MS Word to PDF at a time. It is powered with sophisticated algorithms and therefore fully capable of converting large MS Word information in PDF file. Kernel for Word to PDF export all items of a Word document such as forms, OLE data, tables, texts, images, graphs, hyperlinks and many more. It also lets user to protect output PDF file with a password, encryption and local restriction. Word to PDF converting software keeps structure, properties and formatting of the converted Word files intact in the output file. It saves exported data of a doc/docx file in a specific page format in the ...
  • 1st Email Address Verifier (EAV) is a program that verifies the validity of e-mail addresses in mailing lists.The program works on the same algorithm as ISP mail systems do. Mail servers addresses for specified address are extracted from DNS. The program tries to connect with found SMTP-servers and simulates sending a message, but does not send the message out. EAV disconnects as soon as mail server informs whether this address exist or not.
  • 1st File Undelete is a professional-grade file recovery tool priced just right. Combining sophisticated data recovery algorithms with carefully thought user interface, 1st File Undelete is just the right tool for the home user to recover files that were deleted or lost due to a disk corruption. 1st File Undelete recovers erased files of all types, and undeletes documents, archives and digital pictures with full previews.
  • Duplicate File Finder will find all duplicate files on your computer or inside a selected folder regardless of the file names comparing the file content. The applications will compare the binary data of your files and will find duplicates even if they are using different file names.It uses an optimized Byte-by-Byte comparison algorithm
  • WinDataReflector is a lightweight file synchronization and backup tool that wraps up fast file comparison and transfer algorithms into a simple and clear interface that offers you visual comparison of files and folders before synchronizing and backing them up and support for two way synchronization with fully customizable rules.
  • WinDataReflector is a lightweight file synchronization and backup tool that wraps up fast file comparison and transfer algorithms into a simple and clear interface that offers you visual comparison of files and folders before synchronizing and backing them up and support for two way synchronization with fully customizable rules.
  • Bandizip is All-In-One Free Zip Archiver. It's Lightweight, Fast, and Free archiving software and it works with WinZip, 7-Zip, WinRAR and other archive formats. Bandizip has very fast Zip algorithm for compression & extraction. It supports for ZIP, 7Z, RAR, ALZ, EGG, TAR, BH, LZH, GZ, BZ2, ISO, CAB, WIM, XZ, ARJ, and Z archives files and users can create self-extracting files (.EXE) and multi-volume (split) archives files
  • Easy and advanced encryption, decryption and hash ActiveX component for ASP or AS Support encryption and decryption of file, string, memory buffer Support calculation of hash on string, file or memory buffer Support digital signature creation and validation Support state of art crypto algorithm like RC2, RC4, MD2, MD4, MD5, SHA, SHA256, SHA384, SHA512, DES, 3DES, 3DES2, AES128, AES192, AES256 Import and export key in plain or raw bits
  • Professional utility to make impossible recovery of already deleted files and folders. Includes several modern security algorithms and military standarts, which makes process the most effective. The program also works with removable storage.
  • A high-speed, reliable Zip library with affordable price which lets you add zip/unzip functionality to your .NET applications with only few lines of code. * Features * Creating and modifying ZIP files easily * .NET Technology * Supports many .NET Platforms * Supports event-driven (Asynchronous) and blocking (Synchronous) Design * Flexibility * Fully Documented * Complete Zip & unzip samples in VB.NET, C#, and ASP.NET * Royalty-free * Creating and modifying ZIP files easily The ZIP component offers a comprehensive set of classes for compressing and decompressing archive files, providing the developer with everything that he needs to incorporate zip and unzip functionality in an application as listed below: * WinZip, PKZIP, and UNIX gZip compatible * Classic Pkzip encryption or AES encryption * 128-bit, 192-bit, and 256-bit AES encryption standard * Supports for the Zip64 zip file format * Supports BZip2 compression algorithm ...
  • Free Text Encrypt is a freeware secure text encryption software. It uses the Advanced Encryption Standard (AES) specification to protect your confidential data. The AES encryption algorithm secures the sensitive and unclassified information from illegal access. Free Text Encrypt will encrypt your document and convert into a text form that can be copied and pasted into any text editor, or e-mailed.
  • AES Encryption component provides a simple interface to encrypt/decrypt files, strings or data from Xbase++ applications. Uses the latest 256-bit AES symmetric encryption algorithm (Rijndael) for strong encryption. Supports CBC and ECB mode, initialization vectors, key generation from and password phrases. Implements buffer padding and does random byte data generation. Works with 32-bit Xbase++. Win32/Win64.
  • AES Encryption component provides a simple interface to encrypt/decrypt files, strings or data from Visual dBase applications. Uses the latest 256-bit AES symmetric encryption algorithm (Rijndael) for strong encryption. Supports CBC and ECB mode, initialization vectors, key generation from and password phrases. Implements buffer padding and does random byte data generation. Works with 32-bit dBASE 7.0, 7.5 and dBASE Plus. Win32/Win64.
  • AES Encryption component provides a simple interface to encrypt/decrypt files, strings or data from Visual FoxPro applications. Uses the latest 256-bit AES symmetric encryption algorithm (Rijndael) for strong encryption. Supports CBC and ECB mode, initialization vectors, key generation from and password phrases. Implements buffer padding and does random byte data generation. Works with 32-bit Visual FoxPro. Win32/Win64
  • AES Encryption component provides a simple interface to encrypt/decrypt files, strings or data from Visual Basic applications. Uses the latest 256-bit AES symmetric encryption algorithm (Rijndael) for strong encryption. Supports CBC and ECB mode, initialization vectors, key generation from and password phrases. Implements buffer padding and does random byte data generation. Works with Visual Basic, VB.NET, VBA and PowerBuilder. Win32/Win64.
  • Once the PDF files get corrupt or damaged you get encountered with different error messages. Nevertheless, now you just don?t have to worry because Kernel for PDF Repair software can instantly repair damaged PDF files in almost every condition. In fact, the software has got excellent ability of recreating PDF files without facing difficulty. Adding to that, this PDF file fixer also retain the properties, structure and formatting intact. Moreover, the utility is also competent of restoring the PDF files that seems inaccessible of removable storage media like pen drives, CDs, DVDs, flash drive and Floppy diskettes. In case you presume that to operate this tool, you would require expertise, then you are wrong. This is because, the tool is well integrated with GUI that makes it a very user friendly application. Along with that, user operating this tool can also enjoy the liberty saving the repaired PDF files with its original name. In addition, the utility is also well integrated with advanced algorithm that enab ...
  • Chronos Atomic Clock Synchronizer is a utility for people who need their computers to use exact time. The program connects to various atomic clock timeservers and synchronizes your internal clock with time provided by these servers. Key benefits: connects on many atomic clock time servers; you can add any time server needed; improved algorithm to calculate differences between servers; calculates delays and synchronize on less than 0.1 seconds.

Page 5 of 10
1 2 3 4 5 6 7 8 9 10


Legal disclaimer | Privacy policy

© 2004-2014 IT Shareware