Iside compares files and folders by computing their hash code through standard algorithms, such as MD5, SHA1 and SHA256 and many others hash functions. |
NCrypt TX features: Hash functions using SHA and MD5 algorithms. Historical algorithms (Caesar, Vigenere, Polyalphabetical). Hard to break, state-of-the-art algorithms (DES, TripleDES, Rijndael). |
Although fuzzy Pattern-Matching Algorithms use up a lot of computing power, this program can manage, for example, 30,000 records in about 2 minutes. |
Network & desktop search |
Search My Network |
LAN Find |
Reminder software |
Software downloads |
WordNet-Online dictionary |
Thesaurus |
CV
Access us via www.LuckyDownloads.com
or www.L-DL.com
Copyright © 2005 Lucky Downloads