English version 去汉语版本 Русская версия Deutsche Version

Download software tagged by identity based encryption

The most popular program: Quick Slide Show 2.00
Download Quick Slide Show 2.00
more info
We recommend: FileVista 1.0
Download FileVista 1.0
more info
ID Badges Designing Utility 8.8.0.9 by Business Barcodes.net
2024-02-17
ID Badge is a small card or tag that is typically worn or carried by individuals to provide visual identification and verification of their identity. ID badge offer a range of benefits, including enhanced security, access control and id verification
10_best_home_based_business_art.exe 1.0 by 10 best home based business
2009-04-08
10 best home based business article software, money making opportunities 10 best home based br, Best Management Position 2009 for team members in life path pro( lifepath ). Very useful in home based internet marketing business, -the 10 best home bas !
0_best_home_based_business_blog.exe 1.0 by 10 best home based business
2009-04-15
10 best home based business blog keyword tool, money making opportunities 10 best home based blog keyword tool freeware, for team members in life path pro( lifepath ). Very useful in home based internet marketing business, -the 10 best home !
10_best_home_based_business_clo.exe 1.0 by 10 best home based business
2009-04-16
10 best home based business cloaker tool freeware, money making opportunities 10 best home based cloaker tool freeware, for team members in life path pro( lifepath ). Very useful in home based internet marketing business, -the 10 best home baesed !
Window Security Toolkit 2012 by Digital Millenium Inc
2012-07-05
Protect your Computer from Unauthorized access with Advanced Security Features and File/Data Encryption for Windows XP/Vista/7.
Cryptocx v5 5.1.6 by Easybyte Software Corporation
2005-10-25
Cryptocx is a PGP and AES compatible encryption component designed for use in any modern development environment. Cryptocx encrypts and decrypts data using standards compliant algorithms to make sure that your data is completely secured.
Encryption Workshop 3.0 Build 40423 by Newera Software Technology Inc.
2005-10-25
Currently nine strong symmetrical block ciphers are implemented: BLOWFISH, GOST, RC 4, DES, Skipjack, TWOFISH, TEA and XOR. Any type of file can be encrypted/decrypted, not only ZIP files.
1-2- Free Steganography 2.1 by Security Software Zone
2006-05-30
1-2- Free Steganography Invisible Secrets allows you to encrypt and hide files in other files (carriers) which are not suspect of encryption (JPG, PNG, BMP).
R-Guard 2.2 by R-tools technology Inc.
2006-03-28
R-Guard is a reliable data security tool for advanced access right control, encryption and audit, which extends them much beyond the scope of the standard Windows security services.
0.036