Home | Submit a file  |  New  |  Categories  |  Our awards  |  Link to us  |  RSS Feeds

Popular search phrases :: A :: algorithm
Display: short descriptions | full descriptions
  • Get Photoshop Restore Toolbox if you encounter data corruption problems in Adobe Photoshop documents and there are no other copies of corresponding PSD file to be used as backup. The highest efficiency of image restoration program is achieved by the usage of intelligent data recovery algorithms, restoring the structure of PSD files of any size, version and root cause of damage. Check it out on any PC and evaluate the efficiency of PSD restore.
  • PST Viewer Tool is a comprehensive solution for viewing the contents of corrupted Outlook PST files and recovering their data. . The unique algorithm in the core of the program makes recovery possible even in the most serious cases of data corruption. PST Viewer Tool features a step-by-step wizard that guides the user through the file analysis, viewing and recovery process to minimize the overall time and effort required to get the job done.
  • Crypt-o is a Client/Server password manager with many advanced features like strong data encryption, customizable databases, multi-user access, flexible permissions system, form filling, portable mode, Web access. Crypt-o is a secure Client/Server solution for creating custom databases, which is designed for use in enterprise networks. The data is reliably stored in Firebird SQL Server database and encrypted using AES algorithm with 256-bit key.
  • esProc is a new Big Data computing solution, which is particularly suitable for multiple data sources and complex business logic applications. With professional Big Data script offered by esProc, users do not have to realize basic algorithms and achieve higher developing efficiency, more flexible computation and better performance. esProc has a complete computational system, supporting parallel computation and HDFS. It could play a role as a database computational middleware with higher performance but lower cost. esProc has a complete computational system with support of multi-node parallel computation and also can be used as Big Data computation middleware to bear the computing pressure from database, HDFS or Local File and return the result to applications. esProc is excellent with complex logic computation and external storage computation, but it cannot replace Database. It also can store temporary data tables which occupy expensive database hardware resources in cheap PC and implement external sto ...
  • Finds lost password to RAR/WinRAR 3.x-5.x archives. Uses optimized algorithms for maximum performance on Intel and AMD CPUs. Uses GPU computations on modern AMD and NVIDIA video cards supporting ATI Stream and NVIDIA CUDA. Offers effective features for more flexible and high-quality password recovery: automatic password search, a macro language for creating password mutation rules for a dictionary-based attack.
  • Securely send emails to others on your network or on the internet. Messages are encrypted using the latest encryption algorithms and technology. Only the sender and receiver can decrypt and read an email.
  • AFP Printer Driver for Windows installs a virtual printer that allows users to create AFP overlays, documents, page segments, and medium overlays from any Windows application that supports printing. After you print your document to the AFP Printer, you will be prompted by a Save As dialog to specify the name and location of the AFP file to be generated. If you wish to bypass the dialog, you can simply make the AFP Printer work in the server mode. Major Features Create AFP document, page segment, medium overlay, and overlays from any Windows application Store all client users' AFP documents, page segments and overlays into a folder of your choice on the server Launch any external program to perform specific task on the server after an AFP file is created Upload AFP documents to a FTP server when finish Copy AFP files to a specific folder or remote location when finish Mail AFP documents when finish Print AFP files to a non-IPDS printer when finish Convert AFP to PDF files when finish Sup ...
  • Check CorelDraw Restore Toolbox to fix the corruption of corresponding CDR files, caused by damages, file system failures, viruses and, finally, user mistakes. It is the most efficient data recovery tool for corrupted illustrations so you may keep this data in safety by applying intelligent algorithms of this software and starting the analysis by means of CorelDraw Restore Toolbox and evaluating its results.
  • Recover Adobe PDF files, Microsoft Office documents and OpenOffice ODS and ODT files from healthy, formatted, corrupted and inaccessible storage media. Magic Office Recovery uses a set of highly advanced data recovery algorithms from Magic's partition recovery tool, ensuring that the documents can be reliably recovered from repartitioned hard drives, formatted partitions, corrupted and inaccessible disks.
  • Dennisse Stock Analyzer is a professional stock market analysis and algorithmic trading system development for serious trader. With realtime data connection to stock exchanges around the world via Google & Yahoo finance, this software allows user to analyse and simulate your trading strategy in order to see whether your investment growth steadily. Furthermore, it's equipped with a handy and powerful C# compiler to build your own strategy.
  • Designed to help you with processing and converting your mailing lists. It is able of excluding duplicated emails, correcting misspelled addresses using unique algorithms, filtering lists by varied criteria, merging lists, and making exclusions from emails lists using an additional list. MLW can supplement mailing lists with address owner names using information from other lists, delete emails owner names from lists, and also many other things.
  • ENC Encryption Software is easy-to-use program designed for reliable protection any files, using high-speed on-the-fly algorithm of encrypting.Why do you need encryption software?Practically each user of computer keeps confidential information on it. For example, personal data, credit card number, documents for working, personal pictures, movies and more.
  • Transferring sensitive data via e-mail or removable drives is not safe. Max File Encryption is a powerful yet easy-to-use encryption/steganography software that will help you protect your confidential information. With Max File Encryption, you can encrypt files of any type, hide files and also create self-decrypting packages. The program uses the strong and ultra-secure Blowfish encryption algorithm that ensures your data safety.
  • SecureBridge Standatd is a non-visual component library for Delphi and C++ Builder. It can protect any TCP network traffic using SSH or SSL secure transport layer protocols to provide authentication for client. It is a solution for developing applications using such various IDEs as RAD Studio, Delphi and C++Builder on Windows, Mac OS X, and now with support for RAD Studio XE4, NEXTGEN compiler. SecureBridge Standatd key features: * RAD Studio XE4 support * NEXTGEN compiler support * Mac OS X development support * Win64 development support * Support for SSH, SSL, and TLS protocols * Fast and customizable SSL client * Support for most SSH2-compatible clients and servers including OpenSSH * Fast and customizable SSH client * Fast and customizable SFTP client * Does not require external modules * Protection against diverse crypto attacks * Integration with Indy, MyDAC, and PgDAC * Support for SHA1 and MD5 hashing algorithms * Authentication by password or by public key * Compatible with any T ...
  • Corruption issues in the Word document are generated due to set of reasons such as virus and spyware attacks, corrupt storage media, abnormal shutdown of MS Windows and others. User can easily get rid of Word corruption by converting Word documents in a secured file format i.e. PDF. Kernel for Word to PDF lets user to convert several Word documents in PDF file. Word to PDF converting software convert several doc/docx files of MS Word to PDF at a time. It is powered with sophisticated algorithms and therefore fully capable of converting large MS Word information in PDF file. Kernel for Word to PDF export all items of a Word document such as forms, OLE data, tables, texts, images, graphs, hyperlinks and many more. It also lets user to protect output PDF file with a password, encryption and local restriction. Word to PDF converting software keeps structure, properties and formatting of the converted Word files intact in the output file. It saves exported data of a doc/docx file in a specific page format in the ...
  • 1st Email Address Verifier (EAV) is a program that verifies the validity of e-mail addresses in mailing lists.The program works on the same algorithm as ISP mail systems do. Mail servers addresses for specified address are extracted from DNS. The program tries to connect with found SMTP-servers and simulates sending a message, but does not send the message out. EAV disconnects as soon as mail server informs whether this address exist or not.
  • 1st File Undelete is a professional-grade file recovery tool priced just right. Combining sophisticated data recovery algorithms with carefully thought user interface, 1st File Undelete is just the right tool for the home user to recover files that were deleted or lost due to a disk corruption. 1st File Undelete recovers erased files of all types, and undeletes documents, archives and digital pictures with full previews.
  • Duplicate File Finder will find all duplicate files on your computer or inside a selected folder regardless of the file names comparing the file content. The applications will compare the binary data of your files and will find duplicates even if they are using different file names.It uses an optimized Byte-by-Byte comparison algorithm
  • Bandizip is All-In-One Free Zip Archiver. It's Lightweight, Fast, and Free archiving software and it works with WinZip, 7-Zip, WinRAR and other archive formats. Bandizip has very fast Zip algorithm for compression & extraction. It supports for ZIP, 7Z, RAR, ALZ, EGG, TAR, BH, LZH, GZ, BZ2, ISO, CAB, WIM, XZ, ARJ, and Z archives files and users can create self-extracting files (.EXE) and multi-volume (split) archives files
  • Easy and advanced encryption, decryption and hash ActiveX component for ASP or AS Support encryption and decryption of file, string, memory buffer Support calculation of hash on string, file or memory buffer Support digital signature creation and validation Support state of art crypto algorithm like RC2, RC4, MD2, MD4, MD5, SHA, SHA256, SHA384, SHA512, DES, 3DES, 3DES2, AES128, AES192, AES256 Import and export key in plain or raw bits
  • Professional utility to make impossible recovery of already deleted files and folders. Includes several modern security algorithms and military standarts, which makes process the most effective. The program also works with removable storage.
  • A high-speed, reliable Zip library with affordable price which lets you add zip/unzip functionality to your .NET applications with only few lines of code. * Features * Creating and modifying ZIP files easily * .NET Technology * Supports many .NET Platforms * Supports event-driven (Asynchronous) and blocking (Synchronous) Design * Flexibility * Fully Documented * Complete Zip & unzip samples in VB.NET, C#, and ASP.NET * Royalty-free * Creating and modifying ZIP files easily The ZIP component offers a comprehensive set of classes for compressing and decompressing archive files, providing the developer with everything that he needs to incorporate zip and unzip functionality in an application as listed below: * WinZip, PKZIP, and UNIX gZip compatible * Classic Pkzip encryption or AES encryption * 128-bit, 192-bit, and 256-bit AES encryption standard * Supports for the Zip64 zip file format * Supports BZip2 compression algorithm ...
  • Free Text Encrypt is a freeware secure text encryption software. It uses the Advanced Encryption Standard (AES) specification to protect your confidential data. The AES encryption algorithm secures the sensitive and unclassified information from illegal access. Free Text Encrypt will encrypt your document and convert into a text form that can be copied and pasted into any text editor, or e-mailed.
  • Once the PDF files get corrupt or damaged you get encountered with different error messages. Nevertheless, now you just don?t have to worry because Kernel for PDF Repair software can instantly repair damaged PDF files in almost every condition. In fact, the software has got excellent ability of recreating PDF files without facing difficulty. Adding to that, this PDF file fixer also retain the properties, structure and formatting intact. Moreover, the utility is also competent of restoring the PDF files that seems inaccessible of removable storage media like pen drives, CDs, DVDs, flash drive and Floppy diskettes. In case you presume that to operate this tool, you would require expertise, then you are wrong. This is because, the tool is well integrated with GUI that makes it a very user friendly application. Along with that, user operating this tool can also enjoy the liberty saving the repaired PDF files with its original name. In addition, the utility is also well integrated with advanced algorithm that enab ...
  • Chronos Atomic Clock Synchronizer is a utility for people who need their computers to use exact time. The program connects to various atomic clock timeservers and synchronizes your internal clock with time provided by these servers. Key benefits: connects on many atomic clock time servers; you can add any time server needed; improved algorithm to calculate differences between servers; calculates delays and synchronize on less than 0.1 seconds.

Page 6 of 10
1 2 3 4 5 6 7 8 9 10


Legal disclaimer | Privacy policy

© 2004-2016 IT Shareware