Crypto4 PKI 2.4
Certificate Generator lets you specify algorithms and key length, intended uses of certificates and Certificate Revocation List location. You can save the certificate in CER, PEM (base64-encoded DER), PFX (PKCS#12) and SPC/PVK formats. 2. Certificate ...
- Audio & Multimedia
- Business
- Communications
- Desktop
- Development
- Education
- Games
- Graphics
- Home & Hobby
- Network & Internet
- Screen Savers
- Security & Privacy
- Servers
- System Utilities
- Web Development
- AnyMP4 Video Converter for Mac
- SSuite NetSurfer Browser
- Datarecovery Mac
- Apeaksoft Blu-ray Player
- Best Data Recovery
- AnyRec Blu-ray Player for Mac
- Aiseesoft Mac FoneTrans
- Clyton
- MindOnMap
- 4Easysoft Blu-ray Player
- EasyBilling Invoicing...
- FoneLab Data Retriever
- Informachine File Manager
- Migrate Access Database to...
- Disk Media Recovery Software
- ADRC Data Recovery Tools
- avast! Antivirus
- Revo Uninstaller
- Java Runtime Environment
- AVG Anti-Virus Free Edition
- GOM Media Player
- RegSeeker
- IrfanView
- CPU-Z
- Malwarebytes Anti-Malware
- Spybot Search & Destroy
- Skype
- µTorrent
- Ai File Extension Editor
- Remove Drm From Pdf Files
- Download Word Templates For...
- Assault Cube Sounds
- Download Song As Zip File
- Rankquest Watchseo
- Free Becker Cpa
- Creative Smiley Faces Text
- Portable Photo Editor Free...
- Screen Capture Master
- Bat Merge
- Daz Iso Compressor
- Destroy Recycle Bin Windows
- Decode Firefox Cache File
- Link Directory Script
Public Key Control Download
-
26Freeware
-
27pCon.configurator 5.7
configurator’s crucial control unit. -
28Chilkat MIME 3.0
Create an manipulate MIME and S/MIME messages. -Navigate the MIME message tree structure via the NumParts property and GetPart(index) method. - Retrieve header field names and values. - Add header fields to a MIME message. -Add a detached (clear-text) ... -
29Chilkat XML ActiveX 9.3
Chilkat XML ActiveX is a free, powerful and easy-to-use XML parser.This software utility allows you to Load/save XML files to an in-memory document object model,you can compress nodes or entire sub-trees using in-memory Zip compression,Add name/value ...Freeware -
30Chilkat Charset ActiveX 10.2
With this program, you can convert text data from one character encoding to another. It works identically on all computers, regardless of locale or internationalization settings. It provide many option such: drop non-convertible characters, substitute ...Freeware -
31Chilkat MHT ActiveX 5.2
Chilkat MHT ActiveX is a small DLL that converts HTML to self-contained .MHT web archives. With this program, you can also convert HTML into a self-contained email with all referenced images embedded within the email. You can download HTML from a URL, ...$149.00 -
32Computer Networks 1
Five Key Aspects Of Networking 4. Local area network 5. Metropolitan Area Network 6. Wide Area Network 7. OSI reference Model 8. TCP/IP Reference Model 9. Comparison of the OSI and TCP/IP Reference Models 10. Problems of the TCP/IP Reference Mode 11.$1.00 -
33Cryptography | Comp. Sc. Engg. 1
Some of topics Covered in this application are: 1) Basics of Cryptography 2) Conventional cryptography 3) Key management and conventional encryption 4) Keys 5) Pretty Good Privacy 6) Digital signatures 7) Digital certificates 8) The OSI Security Architecture 9) Network Security 10) Types of attacks 11) Denial of service attack 12) Smurf Attack 13) Distributed Denial of Service Attacks 14) Security Mechanism 15) A Model for Network Security 16) Symmetric Ciphers 17) Classical SubstitutionTechniques 18) Classical Transposition Techniques 19) Rotor Machines 20) Steganography 21) Block Cipher Principles 22) The Data Encryption Standard 23) Differential Cryptanalysis Attack 24) Cipher and Reverse Cipher 25) Security of DES 26) The Strength of DES 27) Differential and Linear Cryptanalysis 28) Block Cipher Design Principles 29) Finite Fields 30) The Euclidean Algorithm 31) Finite Fields of The Form GF(p) 32) Polynomial Arithmetic 33) Finite Fields Of the Form GF(2n) 34) The AES Cipher 35) Substitute Bytes Transformation 36) Evaluation Criteria For AES 37) ShiftRows Transformation 38) AddRoundKey Transformation 39) AES Key Expansion Algorithm ...$1.00 -
34PGP KeyRing 1.6.2
Which key rings have you certified, and which key owners have vouched for the key rings you currently hold? What trust have you accorded to them, and what relevance does it have? Decide for yourself. * Create, certify, revoke, and delete key rings * ...$1.99 -
35Token2Shell/WP 6.1.0.0
- Supports RSA/DSA public key user authentication and Agent Forwarding for SSH connections. - Includes a translucent virtual keyboard for entering special keys such as ESC, TAB, arrow keys and function keys. - Tapping gesture is translated to single/double ...$9.99 -
36Buddy Tracker Pro 1.0.1.0
This way you have full control of the data transfers. Setting up the application is extremely easy and is done in two very clear steps: (1) Create a profile for yourself. (2) Create your buddies. Couldn?t be much simpler!! Your profile has only three ...$1.49 -
37ABC Backup Pro 5.10
5, 5, SSL (FTPS), SSL, Secure FTP (SFTP provides safe authorization using password or public-key based authentication), SSH (Secure Shell) - integrity and privacy of data transfer using SSH protocols. A built-in task scheduler helps you to build a queue ...$49.95
Buy -
38HIME: Huge Integer Math and
RSA public key, AES, RC4 secret key encryption, MD5, SHA-512 hash function, random number generation (Blum-Blum-Shub, RSA), Diffie-Hellman, compression, securely erase files. Every programming language that can access a dll can use HIME: C, C++, C#, ...$59.00 -
39CommuniCrypt Standard Edition 1.14
It works like a messenger or a chat tool, but the complete data transfer between both machines are highly encrypted through Public-Key-Encryption with RSA encryption algorithm (RSAES-OAEP). The key length of public and private key may between 338 and ...$19.00 -
40SecureCRT 7.3.6
Access an array of network devices via SSH1, SSH2, Telnet, Telnet/SSL, Serial, and other protocols, with authentication via password, public key, X.509 certificate, Kerberos v5 via GSSAPI, and keyboard interactive. Ciphers include AES, AES-CTR, Twofish, ...$99.00
Buy -
41Sysax FTP Automation 6.18
It has many useful features such as transfer status monitoring, email notification, file (de)compression, OpenPGP Encryption and Decryption, task scheduling, FTP scripting, public key authentication, client side SSL certificates and detailed log files.$197.00
Buy -
42Softerra LDAP Administrator 2010.1
For example, these systems could be LDAP-based distributed emailing or public key management using various LDAP servers such as Active Directory, Novell Directory Services or Netscape/iPlanet.$200.00
Buy -
43SSH Factory 3.7
Feature Summary: * Includes both SSH and telnet components * Comprehensive API for building and automating tasks * Easy to use language for scripting tasks in plain text files without having to compile Java code * Support for authenticating with servers using public key authentication ...$599.00
Buy -
44Xceed Encryption Library 1.1
Supports traditional secret-key encryption & public-key encryption, and can encrypt/decrypt memory buffers, strings, blobs, streaming data or files. Supports AES (US Advanced Encryption Standard) symmetric encryption algorithm (Rijndael) and Twofish, ...$299.95 -
45Advanced Encryption Package 2005
The latest version has support for RSA algorithm and Public-Private Key cryptography. One key is kept secret and is referred to as the private key while the other is made available to others and is called the public key since anyone can access this ...$49.95 -
46Strong File Encryption Decryption
PrimaSoft Strong File Encryption and Decryption utility is a Windows software that allows you easily and quickly to encrypt and decrypt selected files or folders on your computer using the latest industry standard strong encryption algorithms:AES (US Advanced Encryption Standard, secret-key encryption also known ...$50.00 -
47JSCAPE Load Tester 2.0
Example Uses - Simulate heavy user and/or network load against your file transfer services - Test file transfer services before releasing to a production environment - Identify and resolve stress points in file transfer services before they become a problem Feature Summary - Platform independent with installers for Windows, Linux, Solaris and Mac OS X - Schedule one time and recurring load testing sessions - Store connection details for use in future load testing sessions - Built-in reporting functionality to review test results - Ability to fine tune connection details controlling variables such as latency and number of concurrent connections - Support for public key and client ...$499.00
Buy -
48Onde Screen Rulers for Mac 1.12.16
*Magnifying Detail Window and arrow key control are very helpful. Rulers can be located to cursor's location precisely With Detail window for magnifying, *Arrow key control is used for slight adjustment while rulers can be rotated 45 degrees at one ...$24.95
Buy -
49SafeGuardA® PrivateDisk 1.0
SafeGuard PrivateDisk can be used as a standalone security solution or can be integrated in an existing PKI (public key infrastructure). In company-wide rollouts, SafeGuard PrivateDisk also supports the use of smartcards for strong authentication ... -
50ACOS5 SDK 2.1
It is specially designed for public-key based applications and RSA public-key cryptographic operations, which is essential in smart card PKI, digital signature and high level security requirements. ACOS5 provides a 32KB EEPROM for secure data storage.$119.00