Novosec - Bouncy Castle - Extensions
- Downloads:
- Views:
- Rating:

This package provides the following pure Java extensions to the Bouncy Castle framework www.bouncycastle.org and was made freely available by www.novosec.com:1. OCSP (RFC 2560) server and client / 2. CMP (RFC 2510, RFC 2511) generator and parser
Free download from Shareware Connection - This package provides the following pure Java extensions to the Bouncy Castle framework www.bouncycastle.org and was made freely available by www.novosec.com:1. OCSP (RFC 2560) server and client / 2.
Version: 1.0 | Size: 8 KB | Platform: Linux, Mac OS X, WinOther
Released Date: 09-09-2012 | Rating: 0 | Title: Novosec - Bouncy Castle - Extensions
Author Url: http://novosec-bc-ext.sourceforge.net
Program Info Url: http://novosec-bc-ext.sourceforge.net
Download Url: http://freefr.dl.sourceforge.net/project/novosec-bc-ext/novosec-bc-ext-ocsp-add-in/ocsp-add-in-1.0/NovosecOCSPAdd-In.tar.bz2
Cryptainer LE Gratis Encryptie Software
Hotspot Shield Elite
Folder Lock Free
SmartHide
Folder Password Expert
Touch Hider for S60 E5/Symbian ^3
Touch Crypto for S60 E5
Touch Hider for S60 E3
GiliSoft USB Stick Encryption
CryptoForge
Touch Crypto for S60 E5/Symbian^3
USB Encryptor
imlSoft USB Disk Guard
File Encryption XP
Anti-Spam & Anti-Spy Tools
Covert Surveillance
Encryption Tools
Firewalls
Internet Security
Online Privacy
Other
Password Managers
Pop-Up Killers
Www Shri Thakur Ji Org
Http Www Promotionalproducts Org
Castle H Bouncy
Www Java Game Free Com
Www Wap Java Mobil Free Media Play Dawnlod Com
Frosby's Bouncy Castle - Welcome to Frosby's Bouncy Castle! This virtual bouncy castle app is a fun little cause and effect game for toddlers and young children. Suitable for ages 1-4.HOW TO PLAY:1) Drag the little eggs up the ladder and watch them bounce around ...
Encrypt Data within Mobile Apps Tutorial - In this tutorial, you'll employ the open standard Bouncy Castle to encrypt mobile MIDlet applications. The tutorial provides an overview of how to encrypt application-related data in a Java 2 Micro Edition (J2ME) application.
cumulus4j - Cumulus4j is an encryption plug-in for DataNucleus. Applications can thus use JDO or JPA to persist their data into every common database. Using the Bouncy Castle cryptography libs, it provides strong encryption via AES, TwoFish or other algorithms.
HashTool - HashTool calculates the most common hash and hmac values of files and strings by using the "Bouncy Castle Java cryptography API".
Tiger Envelopes - mail encryption - With Tiger Envelopes you can stop snoops from reading your email. Same email client. No extra steps. One click to install on Windows and Linux. Configures Outlook, Thunderbird, and KMail. Supports GPG, PGP, Bouncy Castle encryption.
Shareware Connection periodically updates pricing and software information of 'Novosec - Bouncy Castle - Extensions' from company source 'novosec-bc-ext.sourceforge.net' , so some information may be slightly out-of-date. You should confirm all information before relying on it. Software piracy is theft, Using 'Novosec - Bouncy Castle - Extensions' crack, password, serial numbers, registration codes, key generators is illegal and prevent future development of Novosec - Bouncy Castle - Extensions.
Driver Fusion - To keep your laptop and desktop running smoothly and get the best performance out of it, it is important to pay attention to some aspects. It is quite important to ensure your PC device drivers are updated. Components like motherboards, GPU and ...
RawTherapee - There are so many image editors out there but when it comes to powerful and versatile RAW file editors, the choices are somewhat limited. With Adobe switching to Cloud-based subscriptions for most of its apps, semiprofessional users including ...
SiSoftware Sandra Lite - People use computers for various needs, including work, entertainment and information seeking. However, a majority of PC users do not bother much about intricate details of their PC’s hardware parts. A section of users are particular about ...
Sophos Antivirus - Mac users used to feel complacent about security of their desktops and laptops as Apple proudly claimed Macs do not get affected by malware. The rising instances of Macs getting compromised by attacks and malware has changed this perception. ...
Magican Monitor - Macs are famous for their superb stability and ease at multitasking. That explains why they enjoy a steady and growing user base, the steep price tag notwithstanding. However, prolonged usage can make even the most powerful iMac or Macbook ...
Cold Turkey - To keep your kids and teenage family members away from pornographic and objectionable websites you can use parental control software. Such apps offer numerous restrictive measures to limit PC and web access for young users. However, adult users ...
MusicBee - Irrespective of what type of a PC you use, it will be necessary to use a media player app from time to time. If the WMP is not your cup of tea, you will have to pick from third-party music player apps. The problem with some such apps is that ...
Paint.NET - Nearly every PC user needs to use some type of image editing software nowadays, whether it is for personal or professional reasons. It can be for making minor corrections to your vacation pictures before you share them on social media sites. It ...
PC Wizard 2012 - Average computer users use their laptops and desktops to run productivity applications, watch movies, browse web and perform other computing needs. However, seasoned users think beyond these and they need to find out in depth information about ...
Privatefirewall - Everything in life has two sides to it and same can be said about technological innovations. It is quite hard to carry out most activities without resorting to the web these days. Yet the internet itself is also the reservoir of malicious ...
