Any Windows Software - Shareware and Freeware Download Center for Windows

Top Downloads

New Downloads

Recent Searches

Latest Reviews

  • Jack Free Calculator   (Abir)

    Poor and laggy user interface. It's not the kind I was looking.

  • Bus Driver   (Patrick)

    Realistic sounds and graphics. Enjoyed this game very much. I will surely play this again.

  • AdiIRC   (Luke)

    Excellent IRC client. Does exactly what it promises.

  • Driver Fusion   (Warner)

    It's really good, will help you to manage your drivers efficiently.

  • Bike Mania   (Narayan)

    This is not exactly racing game with other bikers which I thought, rather bike riding game. But I enjoyed it very much.

  • RapidTyping Typing Tutor   (Alen)

    Great software. Helped me to improve typing skills. It's one of the best typing tutor software.

  • CAMCOM CHAT   (Joyce)

    If you need simple text chat this is the best one. Video chat is not included on free version but for text chat it's...

  • DipTrace   (Raj)

    Best program to design circuit boards in easy way.

  • Avro Keyboard Bangla Software   (Kamal)

    I learned Bangla typing using Avro. It's really good and useful.

  • WinSesame   (Karel )

    Poorly designed interface. This version only allows locking files smaller than 200KB. Otherwise you'll need to pay $55...


Monoalphabetic Substitution Ciphers

From Title
1.  Football substitution Board - Mobile/Sports
... Your don't need to play in the EPL to enjoy the benefits of an electronic substitution board. Our digital football substitution board is great for School Tournaments, Sunday leagues, Indoor Football or just a bit of fun with your mates. Board design with 2 digits player in and 2 digits player out layout. Cool customize text space option at the bottom to display tournament name, logo, domain name, players names or funny messages. Long text / messages and even images can be display in scrolling ...
 




2.  Fragment substitution Estimation System - Utilities/Other Utilities
... This software is used for studies of comparative Molecular Evolution and Genomics. It can be used to obtain substitution estimates for coding sequences derived from a variety of different sequence data types from genomics projects. ...
 

Monoalphabetic Substitution Ciphers

From Short Description
1.  Cryptix for Mac OS - Internet/Tools & Utilities
... A complete solution for cryptography, encoding,ciphers and data encryption. You can also make numerous tasks and learn more about cryptography. The main interface is divided into 2 parts. One for the cryptography, the other one for the security, containing tools such as (Checksum, Network, Unix). You can also thanks to this software have any elements necessary for your security (Steganography, Passwords & System management).Key features: Aes 128 /256 bits, Ano, Blowfish 447, Cesar, ...
 
2.  showSSL - Utilities/Other Utilities
... ShowSSL is a tool for to test the strength of SSL servers by analyzing the ciphers supported. The report generated includes SSL protocol version and cypher supported, if sessionID is used and its timeout value, certificate chain e CA trusted by the serve ...
 
3.  InteliSSL - Utilities/Other Utilities
... A tool designed to determine all SSL/TLS ciphers and protocols supported by the target server. ...
 
4.  GodScrypt - Security/Encryption Tools
... GodScrypt is a portable email client that applies strong ciphers and hash algorithms to encrypt messages. Typical encryption yields a random sequence of meaningless characters. GodScrypt takes each character and assigns to it a random passage from the Holy Bible or the Holy Quran. It assigns meaning to otherwise random noise. The beautiful encoded message is undecipherable without an agreed upon passphrase or password. The program may also be used as a simple oracle, if we seek a meaningful ...
 
5.  SubstDrive - Programming/Source Code
... API for work with substitution device (see DOS command "subst"). Win9x ONLY. For WinNT and Win2000 use native API call ...
 




6.  RegexTool - Utilities/Mac Utilities
... A lightweight and versatile search and replace tool using regular expressions pattern substitution.Written in ruby. Runs on the command line. ...
 
7.  INDISS - Utilities/Mac Utilities
... Initially intended merely as a digital substitution table for a school, some more ideas like displaying images and a message ticker have been added up to now. Also, plugins is a major aim. INDISS - Informational Display System for Schools ...
 
8.  nPhite - new PHITE PHP Site Framework - Utilities/Other Utilities
... The idea is to make with that it can be flexible in the acceptance of plugins and extensions, modifications, sources of data, substitution of modules and customizable. To give to it to an edition area on-line, upload of materials. ...
 
9.  stemplar - Utilities/Other Utilities
... stemplar is a Python template substitution module with handy loop control--- Command line usage example: $ cat stemplarExample.stm | python stemplar.py sHello=World sOut=Pest,Buda,Ob=da sInn=Left,Right--- brace3 usage: Repeat line, with [multiple] substitution; Can be used within brace4 block blahblah {{{sServer}}} blah {{{sPort}}} blah {{{{sCity4}}}} --- brace4 usage: Repeat block; Can be recursive {{{{sOut{{{{ ... {{{{sInn{{{{ blah {{{{sOut}}}}:{{{{sInn}}}} ... }}}}sInn}}}} ... }}}}sOut}}}} ...
 
10.  Partner Voice Translator for Pocket PC English - Spanish / French / German - Educational/Other
... The main function of the Partner® Voice Translator is substitution of an interpreter for you in such standard situations as registering at a hotel, shopping, visiting the bank, etc. The Pocket Voice Translator is a phrase bank that contains the most commonly used phrases especially selected to satisfy 80% of the communication requirements of travelers abroad. You say a phrase in English, and the application recognizes it and pronounces its translation in target language. The Partner® Voice ...
 

Monoalphabetic Substitution Ciphers

From Long Description
1.  JBO Xia B Cipher - Security/Encryption Tools
... Xia B Cipher is an encryption software developed to secure text and messages using classical cryptographic methods. What all ciphers have in common is that ultimately, they are breakable.The issue is the amount of time it would take to break them and whether such time would be well spent. Some modern methods of encryption rely on large numbers which (so far) cannot be factored for security.Most traditional ciphers have a finite number of solutions consider a cipher system which uses an ...
 
2.  JBO Giova Cipher - Security/Encryption Tools
... Giova Cipher was developed to secure text and messages using classical cryptographic methods. What all ciphers (except a One Time Pad) have in common is that ultimately, they are breakable. The issue is the amount of time it would take to break them and whether such time would be well spent.Some modern methods of encryption rely on large numbers which cannot be factored for security. Most traditional ciphers have a finite number of solutions consider a cipher system which uses an alphabetic key ...
 
3.  JBO Catflap Cipher - Security/Encryption Tools
... JBO Catflap Cipher is an application developed to secure text and messages using classical cryptographic methods. What all ciphers have in common is that ultimately, they are breakable. The issue is the amount of time it would take to break them and whether such time would be well spent. Some modern methods of encryption rely on large numbers which cannot be factored for security.Most traditional ciphers have a finite number of solutions ... consider a cipher system which uses an alphanumeric ...
 
4.  JBO Giova X Cipher - Security/Encryption Tools
... Giova X Cipher is an application especially designed to secure text and messages using classical cryptographic methods. What all ciphers (except a One Time Pad) have in common is that ultimately, they are breakable. The issue is the amount of time it would take to break them and whether such time would be well spent.Some modern methods of encryption rely on large numbers which cannot be factored for security. Most traditional ciphers have a finite number of solutions consider a cipher system ...
 
5.  JBO Zeta Cipher - Security/Encryption Tools
... Zeta Cipher is an application designed to secure text and messages using a modern implementation of neo-classical cryptographic methods. What all ciphers have in common is that ultimately, they are breakable.The issue is the amount of time it would take to break them and whether such time would be well spent. Some modern methods of encryption rely on large numbers which (so far) cannot be factored for security.Most traditional ciphers have a finite number of solutions consider a cipher system ...
 
6.  ASaturA - Multimedia & Design/Graphic & Design
... The usual way to demonstrate saturation in nucleotide sequences is to plot the fraction of differences between sequences against the evolutionary distance separating them. When the number of observed differences, for example for the fraction of third codon positions, no longer increases with increasing evolutionary distance, the sequence is said to be saturated. The same technique can be applied to amino acid (aa) sequences. We have developed a Java application called ASaturA that discriminates ...
 
7.  Frequency Analysis Utility - Utilities/Other Utilities
... A simple program that takes a cyphertext and analysis the occurrences of characters in order to make an educated guess as to their plaintext correspondence. Can be a devastating attack on substitution cyphers. ...
 
8.  Wsmake - Utilities/Other Utilities
... Wsmake is a make tool written in C/C++ for website development and maintenance. It features tag substitution, page ordering, and 'make'-like dependency checking. ...
 
9.  Encryption Workshop - Utilities/Other Utilities
... Encryption Workshop includes file and folder encryption and decryption tool. Currently nine strong symmetrical block ciphers are implemented: BLOWFISH, GOST, RC 4, DES, Skipjack, TWOFISH, TEA and XOR. Any type of file can be encrypted/decrypted, not only ZIP files. If working with ZIP archives you might want to consider using encryption rather than password protection - it is much safer. ...
 
10.  Kryptonic - Utilities/Other Utilities
... Kryptonic is a little tool for creating small substitution-permutation networks and offers the ability for attacking them with the methods of linear and differential cryptanalysis. All information and data can be saved as latex-src and pdf-document. ...
 

Monoalphabetic Substitution Ciphers

Related Searches:

a - b - c - d - e - f - g - h - i - j - k - l - m - n - o - p - q - r - s - t - u - v - w - x - y - z - #
© 1997-2012 ShareMe Last Update: Thursday, October 23, 2014 shareme | contact | notice | privacy | bookmark | link to us

Welcome to the ShareMe. Shareme is a dedicated internet portal bringing users the latest shareware & freeware from the world's best Software Authors. Shareme allows Shareware & Freeware Authors to submit their latest wares, so you the user are able to download their latest software updates all the time, after they are released! Always visit Shareme for your software needs.