Home Contact Sitemap

N5 Net Software Repository

Your one-stop for all your software needs.

Search N5 Net Software Repository:

Search Files



Only Freeware

Sponsor:

Browse:

Areas Of Interest

Authors Area

Are you a software author? Take a look at our Author Resource Center where you will find marketing tools, software specifically created for promoting your software and a ton of other helpful resources.

Downloading Crypto 4.4a

Your download will begin in a few seconds. If it does not start you can download directly through one of the mirror sites below.

Download Sites:

Similar Products:

TREAT FIGHTER 1.1.2

Games & Entertainment :: Online Gaming
img You are a powerful Overlord in the land of Canedoom. Together with your fellow Overlords, you cast cooking magic spells to give life to Treat Fighters who battle in tournaments for your amusement. Win a Candy Crusade to earn real $$$. Treat Fighter runs without servers, decentralized, censorship resistant, and unstoppable on the BLOCKCHAIN. 80% of all CHI spent in TF goes back to the players through the Candy Crusades, 20% to free starter pack.
Windows | Freeware
Read More

FASTENCRYPTOR 25.11.1

Security & Privacy :: Encryption Tools
img FastEncryptor is MS Windows compatible software designed for fast processing of extremely large files. It can encrypt and decrypt files, contents of folders using any file as a password. FastEncryptor contains a lot of additional tools and presents a flexible user interface with detailed messages about all operations. FastEncryptor compatible with ArmorTools software.
Windows | Shareware
Read More

CRYPTOSYSTEM ME6 15.0

Security & Privacy :: Encryption Tools
img Cryptosystem ME6 is a Windows program which uses a symmetric key encryption system to encrypt information in either a single file or in multiple files (at once) so that it cannot be read by those not knowing the key. Data is encrypted using a key which is from 16 to 64 characters long, and which can be either a phrase or a sequence of 64 random bytes (the software provides a way for you to generate such random keys).
Windows | Freeware
Read More

ADAPTIVE MODELER 1.6.0

Business :: Investment Tools
img Creates agent-based financial market simulation models for price forecasting of stocks, ETFs or other securities. A population of trading strategies compete on a virtual market that runs parallel to a real world market. Strategies evolve by genetic programming and market pricing dynamics, driving the population to recognize and anticipate recurring price patterns. The collective behavior of the virtual market is used to generate trading signals.
Windows | Shareware
Read More

PDF PASSWORD CRACKER PRO 3.0

::
img PDF Password Cracker can be used to decrypt protected Adobe Acrobat PDF files, which have "owner" password and "user" password set. It has Key search attack, which guarantees the decryption of PDF files that use 40-bit encryption. PDF Password Cracker recovers user password required to open the file. Brute-Force or Dictionary attacks are used to recover the user password in PDF Password Cracker software. It needn't Adobe Acrobat software.
Windows | Shareware
Read More

DISK PASSWORD PROTECTION 5.5.1

Security & Privacy :: Access Control
img Utility used to password protect hard disks and partitions as well as the operating system load. Access to data is restricted at the low level. The utility protection mechanisms start working with the hard disk directly before the operating system and third party software and hardware are loaded. Uninstalling the utility will not remove the protection, all protected partitions and disks will remain so until you disable the password protection.
Windows | Shareware
Read More

ABYLON CRYPT IN THE BOX 2023.5

Security & Privacy :: Encryption Tools
img The file-safe automatically encrypts all files in the CRYPT-folder without entering the password every time. The the one-time entry of the password is sufficient to access the saved files and unauthorized users can not open this. Changes in the files will be updateded in the encrypted files automatically and the file-based design enables simultaneous access to multiple authorized users.
Windows | Shareware
Read More

THE SECURE SPREADSHEET 1.0

Business :: Office Suites & Tools
img The Secure Spreadsheet is the first and only end-user program for encrypted secure computation: now two parties, empowered by the latest cryptography research, can keep their data private while at the same time doing secret calculations on each other's inputs. An Excel Add-in with a minimal learning curve: to securely compute, just colour some cells and press a button; you don't need to involve anyone else to carry out your secure computations.
Windows | Shareware
Read More

CRYPTOCX V5 5.1.6

::
img Use Cryptocx to encrypt your data, totally securing it. EasyByte Cryptocx v5 builds upon the previous releases of Cryptocx to add further powerful features in a very easy to use bundle. The versatility of Cryptocx, combined with the fastest file encryption available anywhere, full PGP support and the ability to create Self Decrypting Archives (SDA), makes Cryptocx v5 an essential purchase to keep data protected and secure.
Windows | Demo
Read More