Generate Aes Key


Advertisement

GNU Privacy Guard  v.1. 4. 2011

With this software you can generate a key pair (public and private) to digitally encrypt and sign documents, e-mails and a lot more.
First of all, after installing the software, you may want to add the binary folder to your system PATH variable ...

SafePass  v.1.0.2

SafePass encrypts your passwords using the AES (Rijndael) algorithm with a 256-bit key. SafePass simplifies usage of strong and different passwords for all your sites. SafePass is free to use, and it does not contain any ads, spyware, trojans or viruses!





Advertisement

MyKryptofon-Win  v.4.0

myKryptofon is a secure VoIP phone, utilizing AES-256 encryption. myKryptofon runs on Windows PCs and Windows Mobile 5/6 smart phones. It is the only multi-platform communications system on the market today that secures your voice calls, conference calls, ...

SimonTools CyberGhost VPN  v.3.3.1.720

Then a unique 128-bit AES key is produced through which your data transmission takes place. Log in, click "connect," and begin to surf anonymously!

EInstall  v.1 51

Created using this program, self-extracting archives are unpacked during the show license file, a file with the information terminal after installation, create shortcuts to programs on the desktop and menus, add entries in the register windows, launch applications when you install or uninstall the program, it is possible a security key archives, each created ...

MrG File Encryption  v.2.0

You can generate a key.exe for you encoded file, put it in where ever you want, e.g a floppy disk. when you want to decode your file, just run the key.exe. Do remember, the key.exe ia only a key for your encoded file. You can only decode file With both ...

KeyMagic  v.1.5.0.0

As well as map/edit key layout as your own preferred type layout setting.KeyMagic Features
1. Currently, design for Myanmar Burmese on window system.
2. KeyMagic software manager or application, you can manage all your compile/generated keyboard ...

STIMATH  v.1.0

The output from processing the expressions can be written to files or used to generate plots.


Key Features

Mathematical functions for linear algebra, statistics, Fourier analysis, filtering, optimization, numerical

...

AES Pro  v.5 5

AES Pro is the utility program that creates active public keys. Active key is an executable program that contains a public key and the software necessary to encrypt messages and decrypt the answer-back messages. Users can create active public keys that ...

Isecure-key

ISecure-Key is a small application which automates USB disk encryption using the Truecrypt encryption software. It lets you encrypt your USB Stick of any size in a simple and straight forward process so that you can store your confidential data when on ...

Serial Key Generator  v.6.0

Serial Key Generator is application specially designed for software developers to help you protect your applications by serial key registration. Just in a few clicks you are able to generate serial keys and to use them inside your C# .NET, Visual Basic ...

Chilkat AES & RSA Encryption Component  v.2. 2. 2000

Chilkat Crypt .NET is an advanced encryption component that offers both RSA public-key

encryption with digital signatures as well as symmetric encryption algorithms including

AES (Rijndael), Blowfish, and Twofish. It provides the ability ...

AES Home  v.4.0

AES Home is the utility program that creates active AES-files for Windows. Active AES-files are executable programs (EXEs) that contain a AES-file and the software necessary to decrypt the information and encrypt answer messages. Users can create active ...

Serial Key Generator (64 bit)  v.6.0

Serial Key Generator is application specially designed for software developers to help you protect your applications by serial key registration. Just in a few clicks you are able to generate serial keys and to use them inside your C# .NET, Visual Basic ...

Key Control



Tracking Control System Eliminates Lost and Stolen Company Assets

With Key Control, you can easily assign equipemnt to your employees and track them a variety of ways.

At a glance you will know which employees have been assigned ...

Pages : 1 | 2 >
Newest Reviews