SuggestSoft.com

Cryptography

HardKey License Manager 3.2

No Image HardKey System is easy and powerfull license manager and work with short (10-25 chars) keys. Program based on strong asymetric (public keys) cryptography.






No Image
Adaptive Mailing List 2.0.5

Adaptive Mailing List (AML for short) is a software applicaton the task of which is to distribute email messages among groups (a.k.a. Lists) of recipients. It is created on Microsoft technology (Windows, .NET) in order to be readily available to a majority of computer users in the world. Main Features: Main features which separate AML from the generic Mailing List programs are: Security & Cryptography Adaptive delivery Zero duplicates

email software, mailing list





.NET SSH Shell Telnet Component CS VB.NET ASP 2.0.420.1633: Add executing commands on remote SSH servers capabilities and terminal emulation
.NET SSH Shell Telnet Component CS VB.NET ASP 2.0.420.1633

It helps you to easily integrate Secure Shell (SSH) security into your Internet applications. The Ultimate SSH Shell Telnet Component includes SSH-enabled client communications components supporting strong encryption and advanced cryptography.

ssh exec, net component, execute command, dotnet, terminal emulation



.NET SSH Shell Telnet Component CS VB.NET ASP 3.5.1112.1637: Add executing commands on remote SSH servers capabilities and terminal emulation
.NET SSH Shell Telnet Component CS VB.NET ASP 3.5.1112.1637

It helps you to easily integrate Secure Shell (SSH) security into your Internet applications. The Ultimate SSH Shell Telnet Component includes SSH-enabled client communications components supporting strong encryption and advanced cryptography.

ssh exec, net component, execute command, dotnet, terminal emulation



CyberSafe Files Encryption 2.1.5.1: Protect your sensitive data with CyberSafe Files Encryption Software.
CyberSafe Files Encryption 2.1.5.1

File encryption tools such as CyberSafe Files Encryption software provide you with the ultimate solution to protect your data from prying eyes whether it is being stored on an unprotected computer or sent over insecure communication channels. This software provides three automated modes of data encryption, with the highest level protecting your data with a Public Key value for the Microsoft Cryptography Service.

file encryption software, encryption software, encryption tools, file encryption tools, encryption, files encryption software, file encryption



No Image
ABCCrypto 2.0

ABCCrypto is an ATL COM component for encrypting and decrypting data. It`s incredibly simple to use and works with virtually any format you`ll ever come across. You can encrypt or decrypt variants, BLOB data or files. ABCCrypto uses the standard Windows Cryptography API to ensure consistent behavior across all platforms. It uses RSA Encryption with 40 bit keys for a practical level of security throughout virtually any country in the world.

crypto, component, decryption, encryption



LTFCrypt 1.1: Learn step by step, an easy way to build your own file encryption program in C++
LTFCrypt 1.1

Would you like to use C++ to build your own file encryption program? This real-world example source code package contains a fully functional program that encrypts and decrypts text or binary files. This is an easy way for you to learn how to use Visual C++ with LibTomCrypt, a public domain and an ISO C cryptography library, to build your own file encryption program.

ciphers, tomcrypt, windows, symmetric, file, library, encryption


More Results: 1  2  3  4  5  6  

World IT News