|Audio & Multimedia|
|Games & Entertainment|
|Home & Hobby|
|Network & Internet|
|Security & Privacy|
Free, fast calculator to compute hash, checksum, HMAC values for file, text and hex string. Supports popular message digest and check sum algorithms: MD2,MD4,MD5, SHA1,SHA2, RIPEMD160,PANAMA,TIGER, CRC32,ADLER32, and the hash used in eMule/eDonkey (eDonkey2000,ed2k). With this tool you can test for corruption FTP download/upload transfers, compare music,audio,video,game,image files, verify a CD, perform checking of mp3,mpeg,vcd,iso,zip downloads.
See also: hash, message, digest, checksum, crc, hmac, algorithm, file, data, sum, authentication, key, password, encryption, encrypt, 128, bit, check, checking, checker, verify, veriifying, verifier, compare, comparing, comparation, calculate, calculation, test, testing, tester, generator
SHA-1 Password 1.0.292
SHA-1 Password is a password recovery tool that can recover a password if you know its SHA-1 hash. SHA-1 Password features highly configurable and fast recovery engine that can process up to 32,000 hashes simultaneously. Brute-Force Attack, Dictionary Attack, Hybrid Dictionary Attack and Smart Force Attack are supported. The support for the distributed recovery technology allows you to utilize the power of multiple computers.
See also: hash, sha-1, sha, security, password recovery, recover password, sha-1 algorithm, Secure Hash Algorithm, distributed recovery, lost password, forgotten password, crack, break, hack, password, crack password
StorageSafe provides high performance security for USB and IEEE1394 based storage with on-the-fly device encryption, guards against 180,000+ common passwords, and secure file/device erase. Devices are split into custom sized public and private areas. The public area is not encrypted. The private area is encrypted with the 256-bit Advanced Encryption Standard. Protected devices look and feel the same as before.
See also: flash disk, hard disk, FireWire, IEEE 1394, USB, FIPS 140-2, Encryption, Security, Secure Hash Algorithm, AES, Advanced Encryption Standard, Privacy, Secure Erase, 5220.22-M, HIPAA, Sarbanes-Oxley
2D cutting plan design and cutting optimization.
The PaneCutter program is used for automatic cutting plan design for manufacturers of furniture and other products made from sheet materials (wood, metal, glass, etc ..), whose product range is wide or permanently changing.
Due to its sophisticated, recursive algorithm, PaneCutter finds the optimum cutting plan with the least possible waste of raw material.
See also: wooden houses, floors, parquet, logs, MDF & PFL, PAL, blockboard, veneer, plywood, solid panels, furniture, Timber, work, wood, glass, saw, software, Windows, algorithm, demo, download, free download, design, plan, optimum, optimization, optimize, cutting, cut, pane, 2D, PaneCutter, wooden toys, europalets, equipment & tools
The program is intended for creation and optimization of cutting tickets of sheet materials. In the program fast input of the information on orders and materials is provided; automatic and manual formation of cutting tickets; the automatic account of all parameters of cut; print of cutting tickets and specifications
See also: offcuts, offcut, furniture making, woodworking, package, professional, nesting, program, algorithm, yield, parts, sheet, lamber, optimal, optimal cut, software, cut, optimization, layout, Cutting, riltec, siatec, cutting, Look, reducing
PaneCutter hu 1.2
A PaneCutter program a lap alaku alapanyagok (lamináltlap, MDF lap, üveglap, fémlemez, stb.) vágási tervének autómatikus generálására készült, bútorkészit?-, üveges-, és egyébb m?helyek számára, amelyek termékskálája széles vagy állandóan változik.
A PaneCutter kifinomult, rekurzív algoritmusának köszönhet?en megtalálja az optimális vágási tervet a lehet? legkissebb veszteséggel.
See also: algoritmus, vagas, deszka, uveg, equipment & tools, europalets, wooden toys, wooden houses, floors, parquet, logs, MDF & PFL, PAL, blockboard, veneer, plywood, solid panels, furniture, Timber, work, wood, glass, saw, software, Windows, algorithm, demo, download, free download, design, plan, optimum, optimization, optimize, cutting, cut, pane, 2D, PaneCutter, forraskod, lamináltlap, MDF lap, üveglap, fémlemez
Financial analysis and investment software that combines traditional technical analysis with state-of-the-art artificial intelligence technologies. Use any combination of financial indicators in conjunction with advanced neural networks and genetic algorithms to create remarkably effective end-of-day or real-time trading models for stocks, futures and forex. Included is a free Solution Service, which includes 10 neural network models.
See also: intelligence, artificial, AI, algorithm, genetic, commodities, options, futures, online, stocks, investment, investing, trade, analysis, technical, trading, network, neural, intelligent
FastCRC Library 1.50
Fast, highly optimized implementation of popular checksum algorithms: CRC32, CRC16, CRC16C (CRC-CCITT). The library allows to calculate checksums for files, memory blocks, strings, streaming data. Has no external dependencies such as MFC DLL, COM/DCOM or other component. The help file has examples in Visual Basic(VB), C, C++.
See also: validate, vba, java, delphi, com, activex, function, verification, verify, calculation, calculate, sum, checking, check, basic, visual, vb, c++, c, component, .TLB, .LIB, .DLL, CRC-16C, CRC-16, CRC-32, password, key, memory, block, data, string, file, algorithm, crc, checksum, hash
QuickHash Library 3.0
Fast, highly optimized implementation of hash and checksum algorithms: MD2, MD4, MD5, SHA-1, SHA-2(256,384,512), RIPEMD(128,160,256,320), PANAMA, TIGER, CRC-32, CRC-16, CRC-CCITT, ADLER32. The library allows to calculate hashes (message digests), checksums and HMACs for files, memory blocks, strings, streaming data. Has no external dependencies such as MFC DLL, COM/DCOM or other component. The help file has examples in Visual Basic(VB), C, C++.
See also: digital, authentication, sum, checking, check, bit, 128, encrypt, encryption, basic, visual, vb, c++, c, component, .TLB, .LIB, .DLL, CRC16, CRC32, SHA2, SHA1, -5, -4, -2, MD, password, key, memory, block, data, string, file, algorithm, hmac, crc, checksum, digest, message, hash, signature
QuickCrypt Library 2.50
Fast, highly optimized implementation of symmetric (private-key) encryption algorithms: DES, Triple DES (3DES), DESX, BLOWFISH, RIJNDAEL (AES-Advanced Encryption Standard), GOST. Supports 5 modes of operation. Allows to encrypt/decrypt files, memory blocks, strings, streaming data. Supports 2 interfaces: API and C++. Has no external dependencies such as MFC DLL, COM/DCOM or other component. The help file has examples in Visual Basic(VB),C,C++.
See also: api, crypto, cryptoapi, LIB, DLL, basic, visual, vb, c++, c, mode, counter, cipher, key, private, symmetric, standard, decrypting, decryption, decrypt, BLOWFISH, RIJNDAEL, AES, 3DES, Triple, DES, memory, block, data, string, file, algorithm, encrypted, encrypting, encryption, encrypt
Mix Finder 1.01
You want to make a mixture. You have ingredients composed of the same components.The proportions (percentage,content) of the components is different in each ingredient.The composition of the mixture will depend on how much of each ingredient you will add.Exact this -"how much of each ingredient"- the Mix Finder can find for you.Uses an algorithm to solve an inhomogen linear system of eaquations.Finds approximated solutions.
See also: Mix Calculator Finder Mixture Inhomogen Linear Equation System Iteration Algorithm Ingredient Solve
EldoS KeyLord 5.0
EldoS KeyLord lets you arrange confidential information (passwords, account numbers, software registration keys etc.) in a tree, search through it, print it and store it in secure encrypted file. You can store any data including binary files inside of the tree structure. You can configure passwords to expire so that you are notified when it's time to go and change password/acount info. Integration with browser makes access to web sites easier.
See also: office, government, company, business, user, sharing, management, manage, automatically, generator, security, algorithm, encryption, DES, AES, BLOWFISH, IDEA, information, store, safely, data, file, hold, account, encrypt, protection, protect, secure, password, keep, home
Abacre File Encryptor 1.0
Abacre File Encryptor encrypts any files or folders by using 39 advanced encryption algorithms (CAST, Blowfish, Twofish, Rijndael and others). Files maybe encrypted into a single file or individually and compressed during encryption. Secure Password Generator suggests reliable passwords. Use Text Pad to encrypt any text and Wipe Files command to permanently remove files from computer. Rich set of command line parameters and shell integration
See also: algorithm, cipher, cryptographic, strong, privacy, private, documents, decrypting, encrypting, generator, password, windows, free, internet, software, secure, security, delete, wipe, encryption, decode, code, decrypt, encryptor, file, file encryptor, folder, text
Create, edit, read or e-mail encrypted/plain text files with this Notepad-like text editor. It supports 4 encryption/decryption algorithms: BLOWFISH, Triple DES (3DES), RIJNDAEL (AES) and XOR. Use this utility to protect your private info, to store business and credit card data, to encrypt/decrypt a secret document/file, to keep strictly confidential data, to email an encrypted message. It can also be used as a password or electronic key keeper.
See also: support, Unicode, algorithm, standard, keeper, key, data, password, decryption, decrypt, encryptor, encrypting, encription, encryption, encript, encrypt, saved, saving, save, storing, store, writing, write, reading, read, sending, send, msg, messaging, message, emailing, e-mailing
1 Click Encrypt File Folder Encryption 1.4.1
1 Click Encrypt is the encryption utility that brings military strength encryption power at your fingertips, assuring that your files are secured and protected from intruders and spies. It can encrypt or securely hide any type of file, allowing you to relax a bit knowing that it is practically impossible to break the algorithms that where used in our application. Decryption methods are within the same utility that brings the encryption solution.
See also: blow fish, wipe, easy, software, cryptographic, secure, encryption software, data security, cypher key, protect documents, protection, file security, email security, file encryption, encrypt email, encryption, algorithm, disk, transparent, secret, Safe, File, Filesystem, encrypt, privacy, encrypt files, cryptographic library, email encryption, AES, gamma, ghost, cipher key, crypto
An extremely fast utility for your files integrity control. The high accuracy attains through the usage of a cryptographic algorithm, as a matter of fact FastSum is a Windows MD5 Checker. All you have to know is ? how to run FastSum.
You can rectify the errors occurring while data transfer. For example: Network transfers, CD-R and DVD burning, software errors and much more.
See also: compare, xp, fsum, line, command, unix, dvd, verify, calculation, error, cd-rw, cd, check, download, calculate, verification, free, crc, software, windows, file, files, utility, checksum, md5sum, md5, algorithm, fast, fastsum, sfv
This is encryption software for high-level security. It enables you to encrypt, decrypt, and wipe -with the built-in file shredder- files of any type, as well as entire folders and drives, from within Windows Explorer with right-click ease. An included secure text editor allows you to create, encrypt, and decrypt documents in a way that can be sent by any email, messenger, or chat program.
See also: bit, 256, 448, 128, gost, AES, 3des, tripledes, blowfish, rijndael, algorithm, cryptography, email, messages, folders, secure, password, privacy, encrypted, security, encrypt, software, encryption, bits
This is the suite of encryption tools for high-level security. It enables you to encrypt, decrypt, and wipe -with the built-in file shredder- files of any type, as well as entire folders and drives, from within Windows Explorer with right-click ease. An included secure text editor allows you to create, encrypt, and decrypt documents in a way that can be sent by any email, messenger, or chat program.
See also: encryption, software, encrypt, security, encrypted, privacy, password, secure, folders, messages, email, cryptography, algorithm, rijndael, blowfish, tripledes, 3des, AES, gost, 128, 448, 256, bit, bits
Hide files and folders, encrypt them and protect. Masker hides files and folders in inconspicuous places, such as picture, video, sound files or program files . The strong encryption and password protection makes the hidden data inaccessible for unauthorized users! Only you using your password are able to open and extract your hidden files. Use Masker to keep you sensitive, secret files secure hidden and super-protected!
See also: dateien, datei, application, unlock, lock, protect, secure, algorithm, program, free, download, 5.0, 7.0, security, data, disguise, conceal, verschlüsseln, verstecken, comauflage, encrypt, folder, file, folders, files, hide, steganography, masker, verzeichnis, verzeichnisse
WebCab Optimization for Delphi 2.6
Add refined procedures for solving and performing sensitivity analysis on uni and multi dimensional, local or global optimization problems which may or may not have constraints; to your .NET, and COM Applications. Specialized Simplex Linear programming algorithm, including sensitivity analysis with respect to object functions coefficients or linear boundaries using a duality (i.e. Lagrangian) or direct approach.
See also: minimum, maximum, optimization, global, local, dimensional, multi, uni, analysis, sensitivity, solve, VB.NET, COM, i .NET, Delph, optimization algorithm