BIGSPEED Peer-to-Peer SDK 3.0
The security is provided in two different modes: symmetric encryption with shared secret key and asymmetric encryption with 1024-bit public/private keys.
- Audio & Multimedia
- Business
- Communications
- Desktop
- Development
- Education
- Games
- Graphics
- Home & Hobby
- Network & Internet
- Screen Savers
- Security & Privacy
- Servers
- System Utilities
- Web Development
- AnyMP4 DVD Ripper for Mac
- FoneLab Data Retriever
- Recupero File Cancellati
- AnyRec Video Repair
- Aiseesoft Mac FoneLab
- SSuite NetSurfer E-Gamer x64
- USB Disk Undelete
- Verwijderde Bestanden...
- Business Purchase Order
- Secure Eraser
- Atlantis Word Processor
- FrontSketch
- Apeaksoft DVD Creator for Mac
- UltraFileSearch Std
- Pen Drive Recovery Free
- ADRC Data Recovery Tools
- avast! Antivirus
- Revo Uninstaller
- Java Runtime Environment
- AVG Anti-Virus Free Edition
- GOM Media Player
- RegSeeker
- IrfanView
- CPU-Z
- Malwarebytes Anti-Malware
- Spybot Search & Destroy
- Skype
- µTorrent
- Ai File Extension Editor
- Remove Drm From Pdf Files
- Download Word Templates For...
- Assault Cube Sounds
- Download Song As Zip File
- Rankquest Watchseo
- Free Becker Cpa
- Creative Smiley Faces Text
- Portable Photo Editor Free...
- Screen Capture Master
- Bat Merge
- Daz Iso Compressor
- Destroy Recycle Bin Windows
- Decode Firefox Cache File
- Link Directory Script
Symmetric Download
-
26Freeware
-
27Free Morphing 2.1.28
- You can create symmetric sequence. - You can save resulting movies as animated GIF, AVI and so on.Freeware -
28Matrix ActiveX Component 3.1
Advanced edition additionally supports QR and Singular Value (SVD) decompositions, Eigenvalue and Eigenvector computation for symmetric and non symmetric real or complex matrices.$49.00 -
29Polar Crypto Light Free 2.5
It uses public and private RSA keys for encryption/decryption (256-bit symmetric keys for AES) and provides general process information. Whether you are a beginner or a professional in software development, and you need simple but unbreakable encryption, ...Freeware -
30Xceed Encryption Library 1.1
Supports AES (US Advanced Encryption Standard) symmetric encryption algorithm (Rijndael) and Twofish, the runner-up for AES. Also offers RSA algorithm with unlimited key sizes.$299.95 -
31Cryptosystem ME6 9.89
Cryptosystem ME6 is a Windows program which uses a symmetric key encryption system to encrypt information in either a single file or in multiple files (at once) so that it cannot be read by those not knowing the key. Data is encrypted using a key which ...$29.75
Buy -
32Encryption Toolkit 2003 Trial
The Encryption Toolkit supports both 40 and 128 bit symmetric key encryption. The COM encryption Interface simplifies encryption from Visual Basic, Embedded Visual Basic, Visual C++, and Embedded Visual C++. The Nickellie Encryption Toolkit includes ...$64.95 -
33AGEphone for Windows Mobile
AGEphone funcitons include: # High quality sound, low delay buffering# The world's smallest and lightest VoIP stack# UPnP, STUN Support for NAT Traversal# Possibility to simultaneously use multiple Services# Support of Multi-network interfaces (NIC), including VPN# Click to Call Function# DND(Do not Disturb) # Hold# VAD (Voice Activity Detection) with fade-out# Voice Jitter Absorption# Call History# Number Auto Complete# Different skins# Address Book, Outlook Support# Speed Dial Function# Inband/RFC2833 DTMF send# Call Melodies# Multiple Codecs# Voice RecordingAGEphone is based on and fully complies to the following international standards:# RFC3261: SIP: Session Initiation Protocol# RFC2327: SDP: Session Description Protocol# RFC1889: RTP: A Transport Protocol for Real-Time Applications# RFC2833: RTP Payload for DTMF Digits, Telephony Tones and Telephony Signals# RFC3489: STUN - Simple Traversal of User Datagram Protocol (UDP) Through Network # Address Translators (NATs)# RFC3581: An Extension to the SIP for Symmetric Response Routing# ...$50.00 -
34Elecard AVC PlugIn 2.3
* Optimized for symmetric multiprocessing (Hyper-Threading Technology, multiple CPU and multiple cores). * GPU hardware acceleration support. * Closed Captions decoding.$40.00
Buy -
35Efficient Labels 3.95
Variety of label element changes: scale, move, rotation, symmetric projection and so on. 3. Direct editing of all elements' properties. You can edit an element's font, font color, foreground color, background color, and line width, type and color, ...$199.00
Buy -
36TreeMaker 5.0
You can also place various constraints on the flaps, forcing them to be corner, edge, or middle flaps, and/or setting up various symmetry relationships (forcing pairs of flaps to be symmetric about a line of symmetry of the paper, for example). Once ...Freeware -
37MAXA Key Exchanger 1.0
This key can then be used to encrypt/decrypt their communications using a symmetric key cipher, e.g. MAXA Crypt.Freeware -
38SecEx Security Express 1.6
SecEx is a network file manager and secure terminal emulator that allows encrypted file transfer between your PC and network servers running Secure Shell. SecEx seamlessly interoperates with either SSH1 or SSH2 servers on both Unix and Windows operating ...$79.95 -
39ASPEncrypt 2.4
AspEncrypt is an Active Server component that brings security to your applications through encryption. With AspEncrypt, you can encrypt data, send S/MIME-based secure mail, compute one-way hash values, generate and verify digital signatures, issue and ...$300.00 -
40Ferro Backup System 6.4.0
Thanks to techniques used such as differential backup, compression at desktop level, symmetric multiprocessing, Ferro Backup System enables you, in a very short time, to make copies of files from all computers connected to the local area network. ...$132.00
Buy -
41ToDo2x2 1.0
) - use items encryption for sensible data (standard AES symmetric algorithm) - exchange items with other people having ToDo2x2 - drag a file into an item to have a link to the file itself - use/create custom skins - available languages: english, german, ...Freeware -
42Processor Affinity Manager 1.0
Processor affinity is a modification of the native central queue scheduling algorithm in a symmetric multiprocessing operating system. Each task (be it process or thread) in the queue has a tag indicating its preferred / kin processor. At allocation ...Freeware -
43Chilkat MIME 3.0
Create an manipulate MIME and S/MIME messages. -Navigate the MIME message tree structure via the NumParts property and GetPart(index) method. - Retrieve header field names and values. - Add header fields to a MIME message. -Add a detached (clear-text) ... -
44Issac-Web 5.9
Main features: - Real-time encryption of data being transmitted and received between the web server and browser using a one-time use symmetric key - Heighten security by using both the public key algorithm and symmetric key algorithm - Supports national ... -
45Linear Algebra 2.0
Performs computations associated with matrices, including solution of linear systems of equations (even least squares solution of over-determined or inconsistent systems and solution by LU factors), matrix operations (add, subtract, multiply), finding the determinant, trace, inverse, adjoint, QR or LU factors, eigenvalues and eigenvectors, establish the definiteness of a symmetric matrix, perform ...$15.00 -
46AccuracyRatio 1.6
AccuracyRatio accommodates two-sided, single-sided, symmetric and asymmetric tolerance limits and features a full reporting capability. AccuracyRatio is based on methods reported in NASA Reference Publication 1342, U.S. Navy R&D reports on the ...$795.00 -
47LICM 10.9
The application is freeware and very easy to use software for all www.Brandergy.com members and LinkedIn users at large. This group is especially for users of the LinkedIn Contacts Management Application developed by Arnnei Speiser of Mega AS Consulting ...Freeware -
48QMSYS GUM Enterprise 4.7
-GUF Method for nonlinear models - this method is provided for nonlinear models with symmetric distribution of the result quantities. In this method, a series of numerical methods are used – e.g. nonlinear sensitivity analysis, second and ...$14.38 -
49Chilkat Crypt ActiveX 4.4
It has symmetric encryption like AES, Blowfish, Twofish, RC2, ARC4, DES, 3DES, PBES1, PBES2 and hash algorithms like SHA-1, SHA256, SHA384, SHA512, MD2, MD4, MD5, HAVAL, RIPEMD128, RIPEMD160, RIPEMD256 and RIPEMD320. This tool also has public key encryption ...$149.00 -
50Chilkat PFX ActiveX 2.0
PFX provides the ability to import certificates and private keys from a PFX file onto a computer. Main Features: - Choose whether a warning dialog should be displayed whenever the private key is accessed. - Mark the private keys as re-exportable. - ...$99.00