Any Windows Software - Shareware and Freeware Download Center for Windows

Top Downloads

New Downloads

Recent Searches

Latest Reviews

  • WinMend File Copy   (Bella)

    Very good, works exactly as it supposed to do. Really nice program indeed.

  • Logo Design Studio   (Waltz)

    Nice, intuitive and easy to use interface which made my work a lot easier.

  • Photo to Cartoon   (Nawaj)

    Love it very much. It works very good. You should try it.

  • Kingo Android ROOT   (Stefan)

    Very good. Just rooted my phone successfully. It was very easy.

  • Snappy Bird   (Orton)

    Excellent game. It's very close to flappy bird that everybody loved. I have been playing it on my android phone for last...

  • DiskBoss   (Kane)

    I find it very useful and powerful. Works great so you can give it a try.

  • PCFerret   (Husyn)

    It's a handy tool to view detailed system information, working fine and it's free to use.

  • SnipPlus   (Ram)

    I love this app. It helps me to take screenshot of custom region very easily.

  • EWDraw 3D ActiveX   (Hale)

    Very good to control, it is highly suitable for industrial development.

  • Antenna Design Calculator   (Smith)

    Truly appreciate it. I've been looking everywhere for this! It seems it will work good.


Monoalphabetic Substitution Ciphers

From Title
1.  ciphers all - Security/Encryption Tools
... "ciphers all 8.1.2" aims to provide you with a way to encrypt files in your computer and generate enciphered text documents, in order to prevent others from accessing your sensitive or confidential data. ...
 




2.  Football substitution Board - Mobile/Sports
... Your don't need to play in the EPL to enjoy the benefits of an electronic substitution board. Our digital football substitution board is great for School Tournaments, Sunday leagues, Indoor Football or just a bit of fun with your mates. Board design with 2 digits player in and 2 digits player out layout. Cool customize text space option at the bottom to display tournament name, logo, domain name, players names or funny messages. Long text / messages and even images can be display in scrolling ...
 
3.  Fragment substitution Estimation System - Utilities/Other Utilities
... This software is used for studies of comparative Molecular Evolution and Genomics. It can be used to obtain substitution estimates for coding sequences derived from a variety of different sequence data types from genomics projects. ...
 

Monoalphabetic Substitution Ciphers

From Short Description
1.  Cryptix for Mac OS - Internet/Tools & Utilities
... A complete solution for cryptography, encoding,ciphers and data encryption. You can also make numerous tasks and learn more about cryptography. The main interface is divided into 2 parts. One for the cryptography, the other one for the security, containing tools such as (Checksum, Network, Unix). You can also thanks to this software have any elements necessary for your security (Steganography, Passwords & System management).Key features: Aes 128 /256 bits, Ano, Blowfish 447, Cesar, ...
 
2.  showSSL - Utilities/Other Utilities
... ShowSSL is a tool for to test the strength of SSL servers by analyzing the ciphers supported. The report generated includes SSL protocol version and cypher supported, if sessionID is used and its timeout value, certificate chain e CA trusted by the serve ...
 
3.  InteliSSL - Utilities/Other Utilities
... A tool designed to determine all SSL/TLS ciphers and protocols supported by the target server. ...
 
4.  GodScrypt - Security/Encryption Tools
... GodScrypt is a portable email client that applies strong ciphers and hash algorithms to encrypt messages. Typical encryption yields a random sequence of meaningless characters. GodScrypt takes each character and assigns to it a random passage from the Holy Bible or the Holy Quran. It assigns meaning to otherwise random noise. The beautiful encoded message is undecipherable without an agreed upon passphrase or password. The program may also be used as a simple oracle, if we seek a meaningful ...
 
5.  SubstDrive - Programming/Source Code
... API for work with substitution device (see DOS command "subst"). Win9x ONLY. For WinNT and Win2000 use native API call ...
 




6.  Substitute Board - Mobile/Sports
... substitution board with easy number entry and choice of 3 fonts to suit your mood. ...
 
7.  RegexTool - Utilities/Mac Utilities
... A lightweight and versatile search and replace tool using regular expressions pattern substitution.Written in ruby. Runs on the command line. ...
 
8.  nPhite - new PHITE PHP Site Framework - Utilities/Other Utilities
... The idea is to make with that it can be flexible in the acceptance of plugins and extensions, modifications, sources of data, substitution of modules and customizable. To give to it to an edition area on-line, upload of materials. ...
 
9.  INDISS - Utilities/Mac Utilities
... Initially intended merely as a digital substitution table for a school, some more ideas like displaying images and a message ticker have been added up to now. Also, plugins is a major aim. INDISS - Informational Display System for Schools ...
 
10.  stemplar - Utilities/Other Utilities
... stemplar is a Python template substitution module with handy loop control--- Command line usage example: $ cat stemplarExample.stm | python stemplar.py sHello=World sOut=Pest,Buda,Ob=da sInn=Left,Right--- brace3 usage: Repeat line, with [multiple] substitution; Can be used within brace4 block blahblah {{{sServer}}} blah {{{sPort}}} blah {{{{sCity4}}}} --- brace4 usage: Repeat block; Can be recursive {{{{sOut{{{{ ... {{{{sInn{{{{ blah {{{{sOut}}}}:{{{{sInn}}}} ... }}}}sInn}}}} ... }}}}sOut}}}} ...
 

Monoalphabetic Substitution Ciphers

From Long Description
1.  JBO Xia B Cipher - Security/Encryption Tools
... Xia B Cipher is an encryption software developed to secure text and messages using classical cryptographic methods. What all ciphers have in common is that ultimately, they are breakable.The issue is the amount of time it would take to break them and whether such time would be well spent. Some modern methods of encryption rely on large numbers which (so far) cannot be factored for security.Most traditional ciphers have a finite number of solutions consider a cipher system which uses an ...
 
2.  JBO Giova Cipher - Security/Encryption Tools
... Giova Cipher was developed to secure text and messages using classical cryptographic methods. What all ciphers (except a One Time Pad) have in common is that ultimately, they are breakable. The issue is the amount of time it would take to break them and whether such time would be well spent.Some modern methods of encryption rely on large numbers which cannot be factored for security. Most traditional ciphers have a finite number of solutions consider a cipher system which uses an alphabetic key ...
 
3.  JBO Catflap Cipher - Security/Encryption Tools
... JBO Catflap Cipher is an application developed to secure text and messages using classical cryptographic methods. What all ciphers have in common is that ultimately, they are breakable. The issue is the amount of time it would take to break them and whether such time would be well spent. Some modern methods of encryption rely on large numbers which cannot be factored for security.Most traditional ciphers have a finite number of solutions ... consider a cipher system which uses an alphanumeric ...
 
4.  JBO Giova X Cipher - Security/Encryption Tools
... Giova X Cipher is an application especially designed to secure text and messages using classical cryptographic methods. What all ciphers (except a One Time Pad) have in common is that ultimately, they are breakable. The issue is the amount of time it would take to break them and whether such time would be well spent.Some modern methods of encryption rely on large numbers which cannot be factored for security. Most traditional ciphers have a finite number of solutions consider a cipher system ...
 
5.  JBO Zeta Cipher - Security/Encryption Tools
... Zeta Cipher is an application designed to secure text and messages using a modern implementation of neo-classical cryptographic methods. What all ciphers have in common is that ultimately, they are breakable.The issue is the amount of time it would take to break them and whether such time would be well spent. Some modern methods of encryption rely on large numbers which (so far) cannot be factored for security.Most traditional ciphers have a finite number of solutions consider a cipher system ...
 
6.  Gold Standard GAMSAT Organic Chemistry Flashcards - Mobile/Education
... Gold Standard GAMSAT Organic Chemistry Flashcards (GAMSAT preparation) application contains the most tested GAMSAT concepts summarized on 103 high quality GAMSAT organic chemistry questions that are divided into 3 categories: knowledge, conceptual and GAMSAT 100 (i.e. the most challenging category). The app contains colorful illustrations for better understanding, clear explanations and easy navigation. Scores are saved to keep track of your progress and there is an option to mark difficult ...
 
7.  ASaturA - Multimedia & Design/Graphic & Design
... The usual way to demonstrate saturation in nucleotide sequences is to plot the fraction of differences between sequences against the evolutionary distance separating them. When the number of observed differences, for example for the fraction of third codon positions, no longer increases with increasing evolutionary distance, the sequence is said to be saturated. The same technique can be applied to amino acid (aa) sequences. We have developed a Java application called ASaturA that discriminates ...
 
8.  Secret Decoder Ring - Mobile/Entertainment
... Secret Decoder Ring will allow you to encode messages using multiple ciphers. Currently supported: Thomas Jefferson wheel cipher, a rotating disk cipher, a "Quick Brown Fox" cipher, and a Telephone cipher. Built in email support allows you to mail your encoded message to a friends which they can decode. ...
 
9.  Frequency Analysis Utility - Utilities/Other Utilities
... A simple program that takes a cyphertext and analysis the occurrences of characters in order to make an educated guess as to their plaintext correspondence. Can be a devastating attack on substitution cyphers. ...
 
10.  Wsmake - Utilities/Other Utilities
... Wsmake is a make tool written in C/C++ for website development and maintenance. It features tag substitution, page ordering, and 'make'-like dependency checking. ...
 

Monoalphabetic Substitution Ciphers

Related Searches:

a - b - c - d - e - f - g - h - i - j - k - l - m - n - o - p - q - r - s - t - u - v - w - x - y - z - #
© 1997-2012 ShareMe Last Update: Saturday, December 20, 2014 shareme | contact | notice | privacy | bookmark | link to us

Welcome to the ShareMe. Shareme is a dedicated internet portal bringing users the latest shareware & freeware from the world's best Software Authors. Shareme allows Shareware & Freeware Authors to submit their latest wares, so you the user are able to download their latest software updates all the time, after they are released! Always visit Shareme for your software needs.