chaining shareware downloads


Search results for «chaining»:

myExpertLite 1.0 myExpertLite 1.0
… ertainty handling myExpertLite is a Windows XP rule-based expert system shell. It is aimed at individuals, students and teachers/lecturers who want an inexpensive yet capable expert system that can handle inferencing through forward and backward chaining, is able to deal with uncertainty, and is… 

CSCryptoX 1.32 CSCryptoX 1.32
… Library (CSCryptoX) is an embeddable encryption component for use in your programs. It's highly optimized algorithm implementation allows you to integrate powerful encryption techniques with your software. It includes 13 ciphers, 8 digests and 5 chaining modes giving you the all the cryptographi… 

Myspace Marketer 1 Myspace Marketer 1
… uest 20 friends at a time and will note remove succesful friend requests from the list of friend ID's Requirements .Net 2.0 or higher is required… 

Automation Anywhere 6.0 Automation Anywhere 6.0
… e complex tasks in minutes, without any programming. Record keyboard & mouse or create automation scripts with wizards. Features SMART automation technology, scheduler, repeat options, multiple variable & debugging support, interactive scripts, task-chaining, conditional, file, system & Internet com… 

BestCrypt Corporate 1.12 BestCrypt Corporate 1.12
… ssign a new additional password to a container specific to an individual user. This permits you to choose which users have access to particular containers. Requirements Windows NT/2000/2003 Server has to be configured as Domain Controller.… 

QuickCrypt Library 2.51 QuickCrypt Library 2.51
… elp file has C, C++ and Visual Basic (VB) examples showing how to add encrypting/decrypting functionality to Windows applications quickly and easily.… 

LTFCrypt 1.1 LTFCrypt 1.1
… am. LTFCrypt supported ciphers: aes, blowfish, des, rc5, rc6, safer+, xtea, twofish, safer-k64, safer-sk64, safer-k128, safer-sk128, cast5, rc2, 3des, noekeon, skipjack, khazad and anubis. In this example source codes, the symmetric block cipher chaining mode used is CTR (Counter Mode). However,… 

AllSync 3.5.145 AllSync 3.5.145
… g easy-to-interpret copy previews of your profiles so that you get an optimal view of the actions to be performed. The actions of the folders and files can be edited by you so that the copy operation goes as you intended. Profile chaining Profile chaining enables you to chain several profiles so… 

AutoKrypt 11.16 AutoKrypt 11.16
…  Dynamic variables are supported for most tasks. Most tasks also generate variables which can be used in other tasks. Create advanced automation solutions using our Automize tasks in conjunction with variables, directory/file monitors and our task chaining system. Zip files and directories usin… 

PowerKey 2.0 PowerKey 2.0
… password-spy protection Secure deletion of files/folders (low level Wipe) Wipe Free Space Integration into Windows Shell Drag and drop support Limitations 14 days trial… 


Related: chaining  chaining and  backward chaining  block chaining  chaining mode