Volt 1.4 Volt is an power monitoring and controlling utility. It provides a graphical and text display of the internal battery state of a Laptop Computer, as well as being a Quick Shutdown utility supporting idle and delayed shutdowns as well as resuming.
CPUSpy 1.044 CPUSpy tests your processor and using an internal database of most common CPUs, displays CPUID data such as cache details, cache and CPU speed, processor features, processor name, IP, OS and drives in a tabbed window. Supports HTML exporting of data.
Description: Most file encryptors use methods that rely on the theory of computational security, that is difficulty of key factorisation prevents decryption of the file. But this method may not work forever. It used to be considered that a 56 bit key was unbreakable to brute force attacks, but the government of the USA now requires all Top Secret data to use keys of at least 192 bits. This bar will keep raising as computing power increases. (It is argued by some though that this will never happen due to the laws of physics!) XorIt is designed to use conventional XOR encryption on keys that are the same size as the file to be encrypted. Furthermore, if you use an unpredictable file that is the same size (or larger) than the original file and you use this file only once, this is known as a "one-time pad" and it is completely unbreakable, even to computers 1000 years from now. This is because there is no algorithm at all, just a big key, and thus there is no pattern to follow once you have decrypted any part of the file. Thus attempts to decrypt it could result in any file, and there would be no way to verify that it has decrypted correctly.
XorIt is written in Assembly Language for maximum efficiency.
XorIt is a simplified version of our program CryptIt.
PGP Inventor to Encrypt Net Calls The creator of a well-known tool for keeping e-mail safe from prying eyes is now working on a program that he says will help stop eavesdroppers from listening in on Internet-based phone calls.
RSA Security Releases 'One-Time Password' Specs Will international standards for one-time password technologies be the catalyst for deployment and adoption of stronger authentication in enterprise applications? RSA Security believes it will.