MetaFiler 2.0
Metafiler lets you create file metadata and store it with the file. The information moves with the file and independent of the file name so…
Byteria Heroes: Krieg in der Ferne 5.0
 
   
   
     
Example:  Download Accelerator
 
• New       • TOP       • Most popular       • All soft       • Advertising       • Add program       • Support       • Link to us       • About       • Board      
audio & multimedia  business  communications  desktop  development  education  games & entertainment  graphics apps  home & hobby  network & internet  security & privacy  servers  system utilities  web development  A B C D E F G I J K L M N O P Q R S T U V W X Y Z
0 1 2 3 4 5 6 7 8 9

Home > Strong software

Related keywords: strong encryption, strong disk encryption, strong name, strong password

Home
Software
New soft
TOP-10
Best 1000
All Soft
Audio & Multimedia
Business
Communications
Desktop
Development
Education
Games & Entertainment
Graphic Apps
Home & Hobby
Network & Internet
Security & Privacy
Servers
System Utilities
Web Development

Number of references on page:10 | 20 | 30 | 50 | 100
Language: Any | English | German | French | Italian | Japanese | Portuguese | Spanish
License: Any | Freeware | Shareware | Demo | Adware | Commercial | Data Only
Installation: Any | Install and Uninstall | Install Only | No Install Support | Uninstall Only
Operational system: Any | Windows 95 | 98 | ME | NT | 2000 | XP | CE | Unix | Palm | Mac


Search result:
programs found: 309.

31.Tunnelier 4.12 (bitvise.com) free  Tunnelier download
HTTP proxy for dynamic forwarding; forwards Windows file shares; has strong auto-reconnect features; an FTP-to-SFTP protocol bridge; support for single-click Remote Desktop forwarding for graphical server access. Supports public key user authentication, as well as transparent authentication with…
Updated: 2, 2006 | Rating: 1238 | Author: Bitvise Limited | Size: 4380 kb | Freeware
Go to category: Network & Internet > Other
Similar programs
32.wodSSH.NET 2.1.9.0 (weonlydo.com) free  wodSSH.NET download
layer is a secure low level transport protocol. It provides strong encryption, cryptographic host authentication, and integrity protection. Using wodSSH.NET is easily - just put it on your form (or initialize new instance on the fly), set Protocol type and issue Connect method - and just wait for things to happen. You connect to SSH servers, which are standard today in remote…
Updated: 2, 2006 | Rating: 0 | Author: Kresimir Petric | Size: 1076 kb | Shareware
Go to category: Servers > Telnet Servers
Similar programs
33.wodSSH 2.3.7.0 (weonlydo.com) free  wodSSH download
layer is a secure low level transport protocol. It provides strong encryption, cryptographic host authentication, and integrity protection. Using wodSSH is easily - just put it on your form, set Protocol type and issue Connect method - and just wait for things to happen. When in secure mode - you can connect to SSH servers, which are standard today in remote console…
Updated: 2, 2006 | Rating: 42 | Author: Kresimir Petric | Size: 1231 kb | Shareware
Go to category: Network & Internet > Remote Computing
Similar programs
34.wodSSHServer 1.3.0.0 (weonlydo.com) free  wodSSHServer download
as well as old TELNET server protocol. SSH protocol provides strong encryption of data, and authentication of users over insecure networks, such as Internet. Using it is really easy. Add it to your form (or create instance on the fly), use internal methods to generate pair of keys for the server (or import existing ones from other SSH servers) and start the server. From that…
Updated: 2, 2006 | Rating: 0 | Author: Kresimir Petric | Size: 1368 kb | Shareware
Go to category: Servers > Telnet Servers
Similar programs
35.Windows Security Officer 6.8.1.1 (1securitycenter.com) free  Windows Security Officer download
operating system. It has the capability of providing extremely strong, secure control of who can access a personal computer resources, and exactly what they can do and when they can do it while they have access to those resources. If a user's time limit has been set and it has been reached, the computer shuts itself off and that user can not log-on again until their permitted time…
Updated: 2, 2006 | Rating: 0 | Author: Eugene Mihailov | Size: 1578 kb | Shareware
Go to category: System Utilities > Other
Similar programs
36.Tray Safe 4.3 (traysafe.com) free  Tray Safe download
Safe password manager comes with a variety of enhancements, like strong password generator, network mode (client/server passwords, network password sharing). Plus, it can run directly from a removable USB drive, so you can keep and carry it with you. If you are looking for a password keeping solution and are willing to try only the best applications available, Tray Safe password…
Updated: 2, 2006 | Rating: 0 | Author: F-Group Software | Size: 3069 kb | Shareware
Go to category: Security & Privacy > Password Managers
Similar programs
37.DevSolutions Crypt 1.0.1 (devsolutions.net) free  DevSolutions Crypt download
to encrypt/decrypt data or files using the latest industry standard strong encryption algorithms.It can be used to encrypt/decrypt strings,memory buffers,Blobs,Files and streaming data. For strong symmetric encryption algorithm,it supports the new Rijndael Algorithm , which is a Federal…
Updated: 2, 2006 | Rating: 22 | Author: Customer Cell | Size: 651 kb | Shareware
Go to category: Development > Active X
Similar programs
38.Windows Security Officer 6.8.1.1 (mybestsoft.com) free  Windows Security Officer download
operating system. It has the capability of providing extremely strong, secure control of who can access a personal computer resources, and exactly what they can do and when they can do it while they have access to those resources. If a user's time limit has been set and it has been reached, the computer shuts itself off and that user can not log-on again until their permitted time…
Updated: 2, 2006 | Rating: 0 | Author: Eugene Mihailov | Size: 1578 kb | Shareware
Go to category: System Utilities > Other
Similar programs
39.Win Spy Software Pro 8.6 (win-spy.com) free  Win Spy Software Pro download
Remote Websites Visited and Time Spent on the Net reports. Stronger Folder Hider Utility. Win Spy Software 8.6 Pro is a Complete Stealth Monitoring Software that can both monitor your Local PC and Remote PC. Win Spy Software also includes Remote Install. Win Spy Software will capture anything the user sees or types on the…
Updated: 2, 2006 | Rating: 346 | Author: Ben Nelson | Size: 2246 kb | Shareware
Go to category: Desktop > Other
Similar programs
40.Where Is It? 3.71 (whereisit-soft.com) free  Where Is It? download
and well thought-out, Explorer-like user interface, combined with strong searching and reporting capabilities, massive archive file support (zip, arj, rar, ace, cab, lha/lzh, arc, tar, gzip, z, sfx, and others that can be presented in catalog as virtual folders), multi-language support, automated description and thumbnails importing through extendable plugins from more than 70…
Updated: 2, 2006 | Rating: 13133 | Author: Robert Galle | Size: 4065 kb | Shareware
Go to category: System Utilities > File & Disk Management
Similar programs

Sort programs by: relevance | date | alphabet | popularity
Result Page: « Previous | | 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | Next »


301 Moved Permanently

301 Moved Permanently


nginx

Home > Strong software

SQLDBCompare V2.2
The powerful database schema/data comparison and synchronization tool for SQL Server database. It compares either an individual object or…
PDF2TXT(PDF to Text) 3.1
PDF2TXT converts PDF documents to text format,Fast,Accurate,Free Trial. PDF2TXT converts pdf to txt files, it needn't Acrobat software, it…
Aerial Antics Demo 1.0
Aerial Antics is a fast and furious Arcade game. Testing your skills in your attempt to win a place in the Aerial Antics flying circus. 50…

Copyright © 2004 - 2010 allworldsoft.com Contact Page