algorithms downloads

WinDataReflector Free 64 bit

3.10.1 download

... that wraps up fast file comparison and transfer algorithms into a simple and clear interface that offers you visual comparison of files and folders before synchronizing and backing them up ...

primesieve

12.7 download

... research. At its core, Primesieve employs advanced algorithms, including the segmented sieve of Eratosthenes, to deliver exceptional performance. It is meticulously optimized for modern multi-core processors, making full use ...

Opal CSV Converter

1.4.0 download

... its robust encryption capabilities. It employs advanced encryption algorithms to ensure that your text data remains confidential and protected from unauthorized access. Whether you're looking to secure personal notes, business ...

Professional .NET Obfuscator

8.7.1 download

... known software obfuscation methods and .NET app protection algorithms. Important features of Professional .NET Obfuscator: Disallows deciphering; Protected .NET app mostly is not recompilable; Runs any .NET application, executable, assembly; ...

SecretBurner

1.1 download

... on your computer. SecretBurner's secure delete and wipe algorithms make it impossible for your data to be undeleted or recovered by any known computer forensics technique. SecretBurner lets you permanently ...

AceErase File Shredder History Eraser

2.0 download

... history eraser privacy tool. Several powerful file shredding algorithms (DOD strength & stronger) permanently delete, wipe, & erase your files, folders, recycle bin, free space, IE browsing history, cache, cookies, ...

S.S.E. File Encryptor for PC

15.0.6 download

... application window. Files are encrypted using strong encryption algorithms: AES (Rijndael) 256bit, RC6 256bit, Serpent 256bit, Blowfish 448bit, Twofish 256bit, GOST 256bit + (Threefish 1024bit and SHACAL-2 512bit for Pro ...

Noiser

1.0 download

... to easily create textures using various image generating algorithms and 3D noise parameters. This technique of dynamically rendering images, rather than using precomputed static pixel bitmaps, is often used by ...

WinDataReflector Portable

3.10.1 download

... that wraps up fast file comparison and transfer algorithms into a simple and clear interface that offers you visual comparison of files and folders before synchronizing and backing them up ...

SecureEmail for Outlook 2010

1.0 download

... prior to being sent, using the latest encryption algorithms and technology. Only the sender and recipient can decrypt and read an email message, thereby making it unreadable to anyone else. ...

Paranoia Text Encryption for PC

15.0.4 download

... unwanted readers. Texts are encrypted using strong encryption algorithms: AES (Rijndael) 256bits, RC6 256bit, Serpent 256bit, Blowfish 448bit, Twofish 256bit, GOST 256bit + (Threefish 1024bit and SHACAL-2 512bit for Pro ...

CrococryptMirror

1.43a download

... mirrors complete folders to encrypted folders. The encryption algorithms that are used are AES and Twofish (256 bits, cascading). The keyfile is secured by a password using PKCS #5 (PBKDF2) ...

CrococryptMirror Portable

1.43b download

... mirrors complete folders to encrypted folders. The encryption algorithms that are used are AES and Twofish (256 bits, cascading). The keyfile is secured by a password using PKCS #5 (PBKDF2) ...

FSS Plagiator

1.0.6.7 download

FSS Plagiator uses advanced algorithms for text modifications without visual changes. The app is designed specially for students of various educational institutions: schools, colleges, universities, etc. Minimalistic interface of FSS ...

WinDataReflector Portable 64 bit

3.10.1 download

... that wraps up fast file comparison and transfer algorithms into a simple and clear interface that offers you visual comparison of files and folders before synchronizing and backing them up ...

xCELLhash

2.3 download

... implements the MD5, SHA-1, SHA-256, SHA-384, and SHA-512 algorithms and returns data as hexadecimal strings. xCELLhash also supports the hashing of files; select a file or provide the path to ...

HashTab

6.0.0.28 download

... to calculate file hashes and supports many hash algorithms such as MD5, SHA1, SHA2, RipeMD, HAVAL and Whirlpool. It provides an easy drag and drop interface to simplify the process ...

VSTextHash

1.0.3.65 download

... lets you hash text with many different hash algorithms. Simply type the text in this calculator and hash string for entered text will be immediately displayed. VSTextHash supports a variety ...

AceErase

2.0 download

... History Eraser privacy tool. Several powerful file shredding algorithms (DOD strength & stronger) permanently delete, wipe, & erase your files, folders, recycle bin, free space, internet browsing history, cache, cookies, ...

Cyber Prot

4.1.1.53 download

... safe from ransomware attacks. The software uses advanced algorithms and behavioral analysis to detect potential ransomware threats, and it blocks them before they can cause harm. Additionally, Cyber Prot automatically ...

Black Bird Cleaner

1.0.4.3 download

... trash than others! Due to a completely new algorithms and a completely different approach, Black Bird Cleaner cleans more trash than others. Clear cache in more than 50 browsers Unlike ...

Mailing List Wizard

3.1 download

... excluding duplicated addresses, correcting misspelled addresses using unique algorithms, filtering lists by varied criteria, merging lists, and making exclusions from address lists using an additional list. MLW can supplement mailing ...

Kiwi FREE PDF Comparer

2.0.0 download

Kiwi is a powerful software that uses advanced algorithms, many of them created specifically for this, to detect and show differences between two PDF documents. It's designed to review different ...

SysInfo Exchange BKF Recovery

2.0 download

... data. This tool uses a highly advanced recovery algorithms and recovers the maximum possible data. No technical knowledge is required while using this tool. Exchange BKF Repair from SysInfoTools is ...

Paranoia Text Encryption for Mac

15.0.4 download

... unwanted readers. Texts are encrypted using strong encryption algorithms: AES (Rijndael) 256bits, RC6 256bit, Serpent 256bit, Blowfish 448bit, Twofish 256bit, GOST 256bit + (Threefish 1024bit and SHACAL-2 512bit for Pro ...