Large Icons for Vista 2011.1
These rich colored icons are provided in two versions: icons can cast shadows on themselves or be without them. They are delivered in sizes 16x16, 24x24, 32x32, 48x48, 128x128 and also 256x256, which is typically used for Vista OS. The icons come in ...
- Audio & Multimedia
- Business
- Communications
- Desktop
- Development
- Education
- Games
- Graphics
- Home & Hobby
- Network & Internet
- Screen Savers
- Security & Privacy
- Servers
- System Utilities
- Web Development
- USB Data Recovery
- DVD Labels
- SSuite NetSurfer E-Gamer x64
- Privacy Eraser Free
- EasyBilling Invoicing Software
- AnyMP4 Video Editor
- Windows Data Recovery Software
- Aiseesoft AI Photo Editor
- Files Recover Mac
- FoneLab iOS Unlocker
- NTFS Files Recovery Utility
- Undelete NTFS Partition
- Apeaksoft iOS Unlocker for Mac
- Apeaksoft Data Recovery for...
- 4Easysoft iPhone Unlocker...
- ADRC Data Recovery Tools
- avast! Antivirus
- Revo Uninstaller
- Java Runtime Environment
- AVG Anti-Virus Free Edition
- GOM Media Player
- RegSeeker
- IrfanView
- CPU-Z
- Malwarebytes Anti-Malware
- Spybot Search & Destroy
- Skype
- µTorrent
- Ai File Extension Editor
- Remove Drm From Pdf Files
- Download Word Templates For...
- Assault Cube Sounds
- Download Song As Zip File
- Rankquest Watchseo
- Free Becker Cpa
- Creative Smiley Faces Text
- Portable Photo Editor Free...
- Screen Capture Master
- Bat Merge
- Daz Iso Compressor
- Destroy Recycle Bin Windows
- Decode Firefox Cache File
- Link Directory Script
Cast 256 Download
-
26$129.00
Buy -
27Utility Phone 1.5
FREE Worldwide PC-to-PC communications using: voice, video, online/offline text messaging, text chat and file transfer, all secured using AES 256 bit encryption. Other features include activity notifications and privacy mode. For corporate V.O.I.P. peering ...$1.50 -
28QuickHash Library 3.02
Fast, highly optimized implementation of hash and checksum algorithms: MD2, MD4, MD5, SHA-1, SHA-2(256,384,512), RIPEMD(128,160,256,320), PANAMA, TIGER, CRC-32, CRC-16, CRC-CCITT, ADLER32. The library allows to calculate hashes (message digests), checksums ...$149.95 -
29Basic Icons for Vista 2015.1
The icons come in two versions: with or without shadows and delivered in various sizes and formats in 256 colors and 32-bit True Color (16.7 million colors with transparency). Look at design in perspective and use the icons crafted in the same style ...$99.00
Buy -
30Da Vinci Encryption System 1.0
Da Vinci was designed with emphasis on cost-effectiveness and ease of use while employing the strong and widely-accepted AES 256-bit encryption algorithm. It is simple to incorporate into daily computer use while providing powerful data protection. Its ...$39.00 -
31Charm Tale 1.12
Many and many a year ago an evil spell was cast on the inhabitants of Fairyland. Grave is their fate, for no one dares to break the spell. Disenchant the motionless figures covered with mosaics with the help of sparkling pieces of crystal. Moving from ...$19.95 -
32SupportSmith 1.0
SupportSmith is an integrated platform that provides Remote Assistance and Remote Access to another desktop, establishing secure SSH/2 AES 256-bit encrypted connections between computers, through NATs, firewalls and proxies. SupportSmith also complements ... -
33Bytescout Screen Capturing SDK
Screen capturing SDK makes screen cast video recording (WMV, AVI) as easy as 5 lines of code in your Visual Basic, C# or C++ application. If you develop an application which is intended to record screen activities to WMV, AVI movie files, use Bytescout ...$999.99
Buy -
34JDigesterCheck 5.0.0.1
jar extension library contains classes implementing SHA 1, SHA 224, SHA 256, SHA 384, SHA 512, RIPEMD 128, RIPEMD 160, RIPEMD 256, RIPEMD 320 hash algorithms. JHashDigester 5.0.0.1 is able to share data with JDiceChecker 5.0.0.1 random number test and ...Freeware -
35KPG-66D 2.0
KPG-66D is a tool designed for TKR-750/TKR-850, this tool come with the features : - Frequency Range: 440-470 MHz - 16 Full Duplex Channels & Single Priority Scan - Variable RF Output - 25 W to 50 W - Durable Die-Cast Chassis Construction - Compact ...$47.00 -
36Giganews Accelerator 1.0
The Giganews Accelerator is a software-based news proxy which will allow you to compress headers and enable 256-bit SSL encryption, regardless of whether or not SSL is supported natively by your news client. All authentication and commands are also encrypted, ...Freeware -
37NTI Ninja 4.1
NTI Ninja is an exciting software that maximizes data protection by using a driver level 256 bit AES encryption technology to create private and public partitions on USB storage devices.Ninja allows you to easily access and share commonly used data on ...$19.99 -
38Puffer 4.0
Puffer is a general purpose 256-bit AES encryption utility for protecting your most sensitive data. Use Puffer to securely exchange email with other Puffer users via the 2048-bit Diffie-Hellman key exchange function. Compress and encrypt your data files ...$34.95 -
39Private Notepad 3.0
Private Notepad can be used to store your private information using secure 256 bit encryption. The program can be installed on your computer or copied to and used from a memory stick so that you can access your private information to any computer. Text ... -
40KeePass Password Safe 2.1
KeePass is an open source program that helps you manage your passwords in a secure way, with our passwords in its fully encrypted database with up to 256 AES security, one of the the largest and best-known encryption algorithms. With this program you ...Freeware -
41Wep Key Creator 2.0
Wep Key Creator, will create a valid 64, 128 or 256 Bit Hex Wep Key from a word or phrase you select. You can then copy and paste the key directly into your wireless router, connection profile. Want to paste you key into another profile, or forgot your ...Freeware -
42Parallel Password Recovery (PDF
PDF documents can be password protected for opening, using 40, 128 or 256-bit cryptography. 40-bit keys can be broken with guarantee, regardless of password used. To recover PDF open password if 128 or 256-bit keys are used, Parallel Password Recovery ...Freeware -
43LexisNexis CaseMap 9.1
CaseMap is a fact and issue management software helps litigation teams bring together the relevant facts, documents, cast of characters and issues of each case—as well as legal and investigative research—into a centralized repository ...$500.00 -
44ASCII Converter 1.2
This program will convert plain text to AND from Hex and Binary based on the standard ASCII character set of 256 characters. You can Save (Export) and Open(Import) files into either text field. The program can also copy the result of the conversion ...Freeware -
45BD File Hash 1.1
BD File Hash is a convenient file hashing and hash compare tool for Windows which currently works with MD5, SHA-1, SHA-256, and SHA-512 algorithms. The goal behind BD File Hash is to have a super simple to use hashing tool which doesn't force you ...Freeware -
46Barco Explorer 1.0
The Barco Explorer software is designed to remotely control up to 256 Barco 900 series CRT projectors through a local network or via the internet. The application consists out of two seperate executables: a client user interface called Barco Explorer ... -
47LineNotes 1.0
Send notes to your cast and staff, by print or email, with just a few clicks of the mouse. LineNotes can even interface directly with an electronic script in Microsoft® Word®, so following a script and taking script-related notes during ...$129.96 -
48NTI Ninja 4 4.1
NTI Ninja is an exciting software that maximizes data protection by using a driver level 256 bit AES encryption technology to create private and public partitions on USB storage devices. Ninja allows you to easily access and share commonly used data ...$19.99 -
49PDF Postman 2.5.0.320
Outlook users can now send PDF Postman will protect your message and file attachments using AES-256 strong encryption that is compatible with major PDF viewers, such as Adobe Reader. Encrypted PDF files are easy on recipients, since most people ...$79.99
Buy -
50MS Word ASCII Conversion Chart
This software offers a solution for users who want to create a chart of all 256 ASCII characters (including: p > ñ q ° ¾) in MS Word. Four columns designate the decimal number, the hexadecimal number, the binary number, ...$19.99