ExamShout: 70-642 1.0
Revolutionary study system for: Exam 70-642: TS: Windows Server 2008 Network Infrastructure, Configuring The Microsoft Certified Technology Specialist (MCTS) on Windows Server 2008 credential is intended for IT professionals who work in the complex ...
- Audio & Multimedia
- Business
- Communications
- Desktop
- Development
- Education
- Games
- Graphics
- Home & Hobby
- Network & Internet
- Screen Savers
- Security & Privacy
- Servers
- System Utilities
- Web Development
- FoneLab Data Retriever
- Informachine File Manager
- Migrate Access Database to...
- Disk Media Recovery Software
- Pocket PC Device Forensic Tool
- HTMeLd
- ChequeSystem Cheque...
- Flash Card Recovery Software
- Aiseesoft FoneLab iPhone...
- SSuite Office Premium HD+
- AnyMP4 Blu-ray Creator
- FAT Volume Data Recovery
- Restore Deleted Mac Files
- UltraFileSearch Std Portable
- MSMassEmailSenderPro
- ADRC Data Recovery Tools
- avast! Antivirus
- Revo Uninstaller
- Java Runtime Environment
- AVG Anti-Virus Free Edition
- GOM Media Player
- RegSeeker
- IrfanView
- CPU-Z
- Malwarebytes Anti-Malware
- Spybot Search & Destroy
- Skype
- µTorrent
- Ai File Extension Editor
- Remove Drm From Pdf Files
- Download Word Templates For...
- Assault Cube Sounds
- Download Song As Zip File
- Rankquest Watchseo
- Free Becker Cpa
- Creative Smiley Faces Text
- Portable Photo Editor Free...
- Screen Capture Master
- Bat Merge
- Daz Iso Compressor
- Destroy Recycle Bin Windows
- Decode Firefox Cache File
- Link Directory Script
Pki Public Key Infrastructure Download
-
26$4.99
-
27Cryptography | Comp. Sc. Engg. 1
Some of topics Covered in this application are: 1) Basics of Cryptography 2) Conventional cryptography 3) Key management and conventional encryption 4) Keys 5) Pretty Good Privacy 6) Digital signatures 7) Digital certificates 8) The OSI Security Architecture 9) Network Security 10) Types of attacks 11) Denial of service attack 12) Smurf Attack 13) Distributed Denial of Service Attacks 14) Security Mechanism 15) A Model for Network Security 16) Symmetric Ciphers 17) Classical SubstitutionTechniques 18) Classical Transposition Techniques 19) Rotor Machines 20) Steganography 21) Block Cipher Principles 22) The Data Encryption Standard 23) Differential Cryptanalysis Attack 24) Cipher and Reverse Cipher 25) Security of DES 26) The Strength of DES 27) Differential and Linear Cryptanalysis 28) Block Cipher Design Principles 29) Finite Fields 30) The Euclidean Algorithm 31) Finite Fields of The Form GF(p) 32) Polynomial Arithmetic 33) Finite Fields Of the Form GF(2n) 34) The AES Cipher 35) Substitute Bytes Transformation 36) Evaluation Criteria For AES 37) ShiftRows Transformation 38) AddRoundKey Transformation 39) AES Key Expansion Algorithm ...$1.00 -
28Chilkat RSA ActiveX 3.2
The Chilkat RSA ActiveX component can be used in applications and websites to encrypt files, strings, and byte arrays using public/private key pairs. RSA Component has: Public/private key generation; Encrypt with either public or private key; Decrypt ...$149.00 -
29Chilkat PFX ActiveX 2.0
Main Features: - Choose whether a warning dialog should be displayed whenever the private key is accessed. - Mark the private keys as re-exportable. - Store public/private key pairs in the local machine keyset. - Import certificates into the local ...$99.00 -
30PGP Keywords 1.0 B9461 1.0
PGP is an encryption system that uses both private and public keys. Public keys are 160 bits or 40 hex bytes. There are very hard to transmit by voice over the telephone. So a system similar to the tango foxtrot scheme that the military uses was invented.Freeware -
31ACOS5 SDK 2.1
It is specially designed for public-key based applications and RSA public-key cryptographic operations, which is essential in smart card PKI, digital signature and high level security requirements. ACOS5 provides a 32KB EEPROM for secure data storage.$119.00 -
32Aloaha PDF Crypter 5.0
The Aloaha FileCrypter encrypts any document with a list of public keys stored in the users address book or certicate store. These encrypted files can only be decrypted if the recipient has at least one valid private key of the recipient list installed ...$72.12 -
33Appnimi MD2 Decrypter 1.0
In appropriate infrastructure it works at a speed of more than 1 million words/second. One of the fastest true MD2 Decrypter available in the market. Above all it is FREE. The MD2 Message-Digest Algorithm is a cryptographic hash function developed ...Freeware -
34Chilkat MIME 3.0
Create an manipulate MIME and S/MIME messages. -Navigate the MIME message tree structure via the NumParts property and GetPart(index) method. - Retrieve header field names and values. - Add header fields to a MIME message. -Add a detached (clear-text) ... -
35Chilkat XML ActiveX 9.3
Chilkat XML ActiveX is a free, powerful and easy-to-use XML parser.This software utility allows you to Load/save XML files to an in-memory document object model,you can compress nodes or entire sub-trees using in-memory Zip compression,Add name/value ...Freeware -
36Chilkat Charset ActiveX 10.2
With this program, you can convert text data from one character encoding to another. It works identically on all computers, regardless of locale or internationalization settings. It provide many option such: drop non-convertible characters, substitute ...Freeware -
37Chilkat MHT ActiveX 5.2
Chilkat MHT ActiveX is a small DLL that converts HTML to self-contained .MHT web archives. With this program, you can also convert HTML into a self-contained email with all referenced images embedded within the email. You can download HTML from a URL, ...$149.00 -
38PGP KeyRing 1.6.2
Which key rings have you certified, and which key owners have vouched for the key rings you currently hold? What trust have you accorded to them, and what relevance does it have? Decide for yourself. * Create, certify, revoke, and delete key rings * ...$1.99 -
39ABC Backup Pro 5.10
5, 5, SSL (FTPS), SSL, Secure FTP (SFTP provides safe authorization using password or public-key based authentication), SSH (Secure Shell) - integrity and privacy of data transfer using SSH protocols. A built-in task scheduler helps you to build a queue ...$49.95
Buy -
40HIME: Huge Integer Math and
RSA public key, AES, RC4 secret key encryption, MD5, SHA-512 hash function, random number generation (Blum-Blum-Shub, RSA), Diffie-Hellman, compression, securely erase files. Every programming language that can access a dll can use HIME: C, C++, C#, ...$59.00 -
41CommuniCrypt Standard Edition 1.14
It works like a messenger or a chat tool, but the complete data transfer between both machines are highly encrypted through Public-Key-Encryption with RSA encryption algorithm (RSAES-OAEP). The key length of public and private key may between 338 and ...$19.00 -
42SecureCRT 7.3.6
Access an array of network devices via SSH1, SSH2, Telnet, Telnet/SSL, Serial, and other protocols, with authentication via password, public key, X.509 certificate, Kerberos v5 via GSSAPI, and keyboard interactive. Ciphers include AES, AES-CTR, Twofish, ...$99.00
Buy -
43Sysax FTP Automation 6.18
It has many useful features such as transfer status monitoring, email notification, file (de)compression, OpenPGP Encryption and Decryption, task scheduling, FTP scripting, public key authentication, client side SSL certificates and detailed log files.$197.00
Buy -
44Softerra LDAP Administrator 2010.1
For example, these systems could be LDAP-based distributed emailing or public key management using various LDAP servers such as Active Directory, Novell Directory Services or Netscape/iPlanet.$200.00
Buy -
45SSH Factory 3.7
Feature Summary: * Includes both SSH and telnet components * Comprehensive API for building and automating tasks * Easy to use language for scripting tasks in plain text files without having to compile Java code * Support for authenticating with servers using public key authentication ...$599.00
Buy -
46Xceed Encryption Library 1.1
Supports traditional secret-key encryption & public-key encryption, and can encrypt/decrypt memory buffers, strings, blobs, streaming data or files. Supports AES (US Advanced Encryption Standard) symmetric encryption algorithm (Rijndael) and Twofish, ...$299.95 -
47Advanced Encryption Package 2005
The latest version has support for RSA algorithm and Public-Private Key cryptography. One key is kept secret and is referred to as the private key while the other is made available to others and is called the public key since anyone can access this ...$49.95 -
48Strong File Encryption Decryption
PrimaSoft Strong File Encryption and Decryption utility is a Windows software that allows you easily and quickly to encrypt and decrypt selected files or folders on your computer using the latest industry standard strong encryption algorithms:AES (US Advanced Encryption Standard, secret-key encryption also known ...$50.00 -
49JSCAPE Load Tester 2.0
Example Uses - Simulate heavy user and/or network load against your file transfer services - Test file transfer services before releasing to a production environment - Identify and resolve stress points in file transfer services before they become a problem Feature Summary - Platform independent with installers for Windows, Linux, Solaris and Mac OS X - Schedule one time and recurring load testing sessions - Store connection details for use in future load testing sessions - Built-in reporting functionality to review test results - Ability to fine tune connection details controlling variables such as latency and number of concurrent connections - Support for public key and client ...$499.00
Buy -
50pCon.configurator 5.7
The pCon.configurator is a highly specialized product configuration system. As a module, the pCon.configurator can be seamlessly integrated with your other applications. The complexity of pCon.configurators functions necessary for processing product ...