Algorithms » Page 7 » Developer.Team

Kellerman .NET PGP Library 1.05

Kellerman .NET PGP Library 1.05
Kellerman .NET PGP Library 1.05


Encrypt/Decrypt files or streams with PGP using a single line of code
Generate public/private key pairs
Add data integrity packets
Output to ASCII using ASCII Armor
Supports PGP Version 2 or PGP Version 3
Encrypt/Decrypt synchronously or asychronously
Compatible with GPG4Win, PGP Command Line, Symantec Desktop, File Assurity
Leverages Bouncy Castle Encryption Algorithms which are FIPS Compliant
Read more

Auslogics Disk Defrag Professional 4.9.3 Multilingual

Auslogics Disk Defrag Professional 4.9.3 Multilingual
Auslogics Disk Defrag Professional 4.9.3 Multilingual


Auslogics Disk Defrag Pro now delivers even more speed to your hard drive, thanks to new optimization algorithms and boot-time defrag technology. The program increases file access speed, meaning that just about everything on your PC will work faster. Auslogics Disk Defrag Pro uses 4 different algorithms for intelligent file placement, your hard drive will always run at its top speed. Use the Wizard to identify best defrag methods for your PC and decide which defrag algorithm to choose. Auslogics Disk Defrag Pro not only defrags, but also can prevent further fragmentation by leaving free space after specified files. For faster and safer defragmentation, you can set the program to remove temp files and check disks for errors. Limit the use of system resources by the defrag process when you’re at your PC, or lift any restrictions for faster defrag.
Read more

Prevent Restore Pro 4.26 Multilingual

Prevent Restore Pro 4.26 Multilingual
Prevent Restore Pro 4.26 Multilingual


If you clean computer's Recycle Bin, the files and folders are not deleted forever. Anyone can use special recovery software and restore any deleted data (files and folders) because any deleted file still exists on the hard disk until will be overwritten with other data.The main purpose of this program is to make impossible recovery of files and folders which was deleted in the past. Program uses several security algorithms (DoD 5220.22, Gutmann and other). While working this program fills out information to the end of each cluster, leaving no chance to restore even just one word!
Read more

Wolfram Mathematica 11.3.0

Wolfram Mathematica 11.3.0
Wolfram Mathematica 11.1.1


For three decades, Mathematica has defined the state of the art in technical computing—and provided the principal computation environment for millions of innovators, educators, students, and others around the world. Widely admired for both its technical prowess and elegant ease of use, Mathematica provides a single integrated, continually expanding system that covers the breadth and depth of technical computing.
Read more