Search N5 Net Software Repository:
Search Files
Sponsor:
Browse:
- Audio & Multimedia (1698)
- Business (4376)
- Communications (1281)
- Desktop (224)
- Development (666)
- Education (261)
- Games & Entertainment (730)
- Graphic Apps (727)
- Home & Hobby (110)
- Network & Internet (601)
- Security & Privacy (564)
- Servers (69)
- System Utilities (31877)
- Web Development (308)
Areas Of Interest
Authors Area
Are you a software author? Take a look at our Author Resource Center where you will find marketing tools, software specifically created for promoting your software and a ton of other helpful resources.
Search: encrypt
Development :: Active X
wodSSHTunnel component is server-type component that will add secure tunneling capabilities to your application. Based on your rules and definitions it will accept local connections, encrypt it and forward to SSH server (where they will be decrypted and sent to destination host). SSH server is required for this component to work, encryption will take place between local computer (running wodSSHTunnel) and SSH server of your choice
Windows | Shareware
Read More | Download Now
Development :: Active X
wodTelnetDLX is a telnet client component ready to connect to various terminal based clients, most commonly to UNIX telnet daemon. Besides supported Telnet protocol, it also supports secured communication (through encryption) using well known SSH (SSH1 and SSH2 are supported), as well as SSL/TLS (Secure Socket Layer protocol). ActiveX version of the component has its own Terminal GUI that supports VT100 and Linux emulation.
Windows | Shareware
Read More | Download Now
Development :: Active X
wodVPN is VPN peer-to-peer ActiveX component that is used to establish Virtual Private Network between two peers. All P2P communication is encrypted and secured. Peers are able to forward local and remote ports, send messages, etc. TCP and UDP packets can be sent. Peers can be located using free mediator script.
Windows Linux | Shareware
Read More | Download Now
Security & Privacy :: Encryption Tools
Most file encryptors use methods that rely on the theory of computational security, that is difficulty of key factorisation prevents decryption of the file. But this method may not work forever. XorIt is designed to use conventional XOR encryption on keys that are the same size as the file to be encrypted.
Windows | Shareware
Read More | Download Now
ZIP RAR ACE PASSWORD RECOVERY 2.70
Security & Privacy :: Password Managers
ZIP RAR ACE Password Recovery is a program to recover lost or forgotten passwords on ZIP, RAR and ACE archives. Key Features: Unlimited Password Length; RAR 2.x and 3.x; RAR archives with encrypted Filenames Support; Multi-volume RAR archives; ZIP Archives Support; ACE Archives Support; SFX Archives Support; Brute-Force attack; Mask attack (with custom mask character); Dictionary attack; User-defined charset; Autosave feature, etc. Auto Update.
Windows | Shareware
Read More | Download Now