32-bit

ConTEXT is a small, fast and powerful freeware text editor, developed to serve as a secondary tool for software developers.

Features

unlimited open files
unlimited editing file size, 4kB line length
powerful... more

TechNet blogs about the following Microsoft products and services:

CorneliOS is a web based OS (aka "Web OS") that runs in your web browser. All applications and files are stored on the CorneliOS and are accessible all the time and anywhere. CorneliOS is platform and browser independent, it can be installed on... more

"Crawler4j is an open source Java Crawler which provides a simple interface for crawling the web. Using it, you can setup a multi-threaded web crawler in 5 minutes! "

This is simple,easy and fast registry comparison tool. You can watch all registry changes. Like you install a new software and want to check what changes done then just compare your registry with old snap shot( that is created by this software... more

CrossCrypt Features

On the fly and offline encryption of Containers CD's compatible to standard Linux systems under Win2000 / XP
Strong Encryption: Supporting /aes256 , /aes192, /aes128 (SingleKey Mode aes-loop compatible)... more

Crossroads is an open source load balance and fail over utility for TCP based services. It is a daemon running in user space, and features extensive configurability, polling of back ends using 'wakeup calls', detailed status reporting, 'hooks'... more

Cryptainer LE - Free 448 bit Encryption Software

Cryptainer LE – Free Encryption Software Creates an encrypted disk drive (volume) to store any type of data.

Cryptainer LE – Free Encryption Software 448 bit strong encryption

... more

CryptoExpert creates encrypted virtual disks and these disks are visible as usual disks with drive letters (for example, G:, H:, Z:, i.e. with any drive letter that is not used by other system devices). The data stored on a CryptoExpert disk is... more

CSET is a desktop software tool that guides users through a step-by-step process to assess their control system and information technology network security practices against recognized industry standards. The output from CSET is a prioritized... more

Pages

Subscribe to 32-bit