ePrivacy and GPDR Cookie Consent by Cookie Consent

Related Tags

Popular x64 Tags

Results Page: « Previous 1 2 3 4 5 6 7 8 ... Next » (34 pages) Displayed: 51 - 75 of 839
Sort by:  relevance | title | downloads | rating | date
Guardian Of Data
Guardian Of Data 3.003   
... it's a breeze. With AES encryption (Rijndael Encryption Algorithm) you protect any type of document, so that it can only be read after entering the correct password! With up to ...
Freeware

Cassandra
Cassandra 11.2.5   
... image operations and the interactive, graphical modeling of algorithms. Extensive visualization features ease the development process. Real-time ... user interface with just a few mouse clicks. Algorithm parameters, e.g., thresholds, can be changed interactively at ...
Shareware | $99.00

ImageCut
ImageCut   
... or share it with others. Application algorithms provide user various tools for extracting image object ... into three regions - create mask; Image matting algorithm that extracts image cut-outs (objects of interest) Library ...
Freeware

PenProtect

PenProtect 1.45   
... using your Password and a special technique (AES algorithm 256 bit key). PenProtect requires no installation: it is a single file located in the home folder of your Flash Drive. ...
Demo | $19.00

TexturePacker x64
TexturePacker x64 7.3.0   
... LimeJS – Javascript / HTML5 framework Layout algorithms: TexturePacker currently shipps with 2 layout algorithms: Basic: · This is a layout algorithm best for tilemaps and simple animations without the ...
Demo | $39.99

Infralution Licensing System
Infralution Licensing System 6.4.1   
... license keys. ILS uses a public key encryption algorithm to generate encrypted license keys which are virtually ... Encryption - ILS uses a public key encryption algorithm to verify license keys which makes it virtually ...
Trialware | $140.00

Mnemosyne
Mnemosyne 2.11   
... with an important twist: it uses a sophisticated algorithm to schedule the best time for a card ... Blackberry devices. FEATURES: · Efficient scheduling algorithm, so you don't waste time on things you ...
Open Source

Mnemosyne Portable
Mnemosyne Portable 2.10.1   
... with an important twist: it uses a sophisticated algorithm to schedule the best time for a card ... Blackberry devices. FEATURES: · Efficient scheduling algorithm, so you don't waste time on things you ...
Open Source

GoodSync2Go
GoodSync2Go 12.6.8   
... and portable tool that uses an innovative synchronization algorithm to synchronize your data between desktop PCs, USB drives, laptops and more. GoodSync2Go installs and runs directly on any portable device ...
Trialware | $299.00

Super Email Verifier
Super Email Verifier 5.24   
... mailing lists. The program works on the same algorithm as ISP mail systems do. There is no need to disturb your clients and friends anymore to verify their email addresses. ...
Demo | $59.95

Rhyme Genie
Rhyme Genie 8.0   
... charm your muse with a powerful intelligent rhyme algorithm. Change from one-syllabic to multi-syllabic rhymes with a single click and see a wealth of near rhymes appear by simply decreasing ...
Demo | $24.95

Allatori Obfuscator
Allatori Obfuscator 8.9   
... obfuscation process, there can be mentioned the unique algorithm of the application size minimization and special functions implementing a number of tricks on acceleration of protected application's performance. And, ...
Demo | $290.00

Portable Revo Uninstaller
Portable Revo Uninstaller 2.4.5   
... panel applet. With its advanced and fast algorithm, Revo Uninstaller analyzes an application's data before uninstall and scans the computer for left-overs. After program's regular uninstaller runs, you can ...
Freeware

Msieve screenshot
Msieve 1.53   
... is a C library implementing a suite of algorithms to factor large integers. It contains an implementation of the SIQS and GNFS algorithms; the latter has helped complete some of the ...
Open Source

Studio Clean screenshot
Studio Clean 1.6.2   
... a plug-in for broadband noise reduction. Because the algorithm takes the perceptual properties of the human hearing ... minimum of artifacts. -StudioDeclicker contains two different algorithms. The actual click filter eliminates larger clicks and ...
Demo | $69.00

CryptAPI screenshot
CryptAPI 3.0   
... salt. This salt will indicate the type of algorithm that will be used to encrypt such string. ... development. We have integrated almost all the algorithms used in different Linux/Unix distributions and have ported ...
Open Source

SilentEye
SilentEye 0.4.1   
... interface and an easy integration of new steganography algorithm and cryptography process by using a plug-ins system. Two main plug-ins family exists: Format Plug-in : Image format ...
Open Source

Blue Cat's Stereo Flanger x64
Blue Cat's Stereo Flanger x64 3.43   
Using the same algorithm as our x64 Flanger plugin, this plug-in adds a unique feature to the original effect: you can smoothly transform it into a stereo flanging effect with ...
Freeware

SteadyCrypt x64
SteadyCrypt x64 2.4   
... usage. As far as features, tools and encryption algorithm are concerned, it is not comparable to widely used TrueCrypt, but users who wont like to follow lengthy procedure in TrueCrypt ...
Freeware

Pixenlarge
Pixenlarge 2.0.0   
... sketches, cartoons etc. Pixenlarge has an intelligent algorithm to recognize patterns in the image. That makes it unique and very good at dealing with complex patterns, as if it ...
Trialware | $45.00

Ircam Trax
Ircam Trax 23.07.0.50310   
... These precision tools provide truly innovative signal transformation algorithms allowing the user to alter sound characteristics such ... phase vocoder technology and a cutting edge transformation algorithm, allowing for manipulating characteristic properties of a voice ...
Trialware | $399.00

Ryijy Stitch Designer screenshot
Ryijy Stitch Designer 1.4.0   
... replacing colors. Image conversion uses smart color reduction algorithm to use as few colors as possible. Final image can be printed or saved to file with grid or color map. ...
Open Source

Rohos Disk Encryption
Rohos Disk Encryption 3.2   
... encryption Rohos disk uses NIST approved AES encryption algorithm, 256 bit encryption key length. Encryption is automatic and on-the-fly. No risk of data loss Partition password reset option allows ...
Trialware | $42.00

FurMark
FurMark 1.38.1.0   
... very intensive OpenGL benchmark that uses fur rendering algorithms to measure the performance of the graphics card. ... minutes, and two more presets. The application's rendering algorithm is highly multipass (100 passes) and each pass ...
Freeware

Rohos Disk Encryption
Rohos Disk Encryption 3.2   
... encryption Rohos disk uses NIST approved AES encryption algorithm, 256 bit encryption key length. Encryption is automatic and on-the-fly. No risk of data loss Partition password reset option allows ...
Trialware | $42.00
Results Page: « Previous 1 2 3 4 5 6 7 8 ... Next » (34 pages) Displayed: 51 - 75 of 839
Sort by:  relevance | title | downloads | rating | date

Members area

Login:
Password:
Remember me

Sign Up  |  Forgot Password?

Top 64-bit Downloads

Top Downloads

64-bit Tags