[go: up one dir, main page]

Suggested Categories:

Cryptocurrency Exchanges
Cryptocurrency exchanges are online platforms that facilitate the buying, selling, and trading of digital assets like Bitcoin, Ethereum, and other cryptocurrencies. They provide users with tools to exchange cryptocurrencies for fiat money or other digital currencies, acting as intermediaries in transactions. These exchanges often include features like price tracking, market analysis, wallet integration, and secure storage. Depending on the type, exchanges can be centralized, with a managing authority, or decentralized, offering peer-to-peer trading. They play a crucial role in the cryptocurrency ecosystem by providing liquidity and access to global markets for users of all levels.
URL Shorteners
URL shorteners, also known as link shorteners, allow users to make a shortened version of a URL. URLs and web addresses are often too long to use in marketing materials and social media, so creating a "shortlink" using a URL shortener can be very useful.
Pixel Art Software
Pixel art software enables artists and game developers to create images where each individual pixel matters—from tiny icons to animated sprites. It provides tools such as pixel-perfect brushes, limited color palettes, layer and frame management, tile and grid support, and animation features like onion-skin and frame tags. Many applications also support sprite sheet export, tileset editing, and palette manipulation, making them especially useful for game assets and retro-style art. With zoomed-in canvases and precise control over each pixel, this software lets creators craft crisp visuals that retain clarity at any size. Ultimately, pixel art software empowers users to bring nostalgic, stylized, or game-ready artwork to life with accuracy, efficiency, and artistic flair.
Crypto Tools
Crypto tools are software solutions designed to assist users in managing, trading, analyzing, and securing cryptocurrencies. These tools can include cryptocurrency wallets, exchange platforms, mining software, price tracking applications, and portfolio management tools. They help individuals and businesses with tasks such as buying, selling, tracking market trends, managing digital assets, and ensuring security. Crypto tools are essential for both beginners and experienced users who wish to engage with the rapidly evolving cryptocurrency space in a safe and efficient manner.
Crypto Credit Cards
Crypto credit cards are credit cards that provide rewards in the form of cryptocurrency such as Bitcoin, Ethereum, and other cryptocurrencies. Crypto debit cards are debit cards that allow cardholders to spend their cryptocurrency using a debit card at any merchant, just like they would with a normal debit card.
IT Security Software
IT security software is designed to protect information technology (IT) systems, networks, and data from cyber threats, such as malware, hacking, and unauthorized access. These tools provide various features such as antivirus protection, firewalls, encryption, intrusion detection and prevention systems, and vulnerability management to ensure the integrity, confidentiality, and availability of sensitive information. IT security software helps organizations detect, prevent, and respond to security incidents, mitigate risks, and ensure compliance with industry regulations. It is critical for businesses and individuals to safeguard against cyberattacks, data breaches, and other security vulnerabilities.
View more categories (6) for "shotcut 32 bit"

7 Products for "shotcut 32 bit" with 1 filter applied:

  • 1
    DESwrap

    DESwrap

    Data Encryption Systems

    ...An ideal method of controlling demonstration software, this counter may be reset remotely. In addition to the standard features, all DESwrap system messages may be user-defined when protecting your application. DESwrap for 32-bit Windows also encrypts function calls to .DLL files and the Win32 API. The number of API calls per DESkey access and the .DLL files which use ACE can be customized. DESwrap for 32-bit Windows also encrypts function calls to .DLL files and the Win32 API.
  • 2
    Win Riser

    Win Riser

    Bit Guardian

    ...Additional highlights include real-time notifications, system restore capabilities, automatic backups to prevent data loss, startup management for faster boot times, and customizable scan scheduling. Win Riser is compatible with Windows 7, 8, 8.1, 10, and 11, supporting both 32-bit and 64-bit systems. The installation package is approximately 11.4 MB in size. Win Riser aims to provide a seamless and efficient user experience for maintaining optimal PC health.
    Starting Price: $11 one-time payment
  • 3
    Seqrite Linux AntiVirus
    ...The software’s Advanced Device Control feature enforces complete governance over the use of removable storage devices, which helps to keep your system safe and secure. Our Linux antivirus features a user-friendly interface with comprehensive support for both 32-bit and 64-bit Linux distributions. Additionally, Seqrite Linux AntiVirus is one of the best antiviruses in the market today that offer comprehensive support to a range of Linux versions including Red Hat, Fedora, Ubuntu, Linux Mint, SUSE, CentOS, and BOSS. Our antivirus for Linux blocks phishing websites and other malicious online elements as well as restricts access to gaming and social networking websites. ...
  • 4
    Excel Password Recovery

    Excel Password Recovery

    eSoftTools Software

    ...Smart Key Features of Excel Password Unlocker Recover lost Excel spreadsheet password Unlock Excel, Word, & Access file formats Support all MS Excel versions 97 up to 2019 and Windows versions up to 10 (32-bit, & 64-bit) Gives recovery attack options such as Dictionary attack, Brute Force attack, & Mask attack
    Starting Price: $19
  • 5
    X-Ways Forensics
    X-Ways Forensics is an advanced work environment for computer forensic examiners and our flagship product. Runs under Windows XP/2003/Vista/2008/7/8/8.1/2012/10/2016, 32 Bit/64 Bit, standard/PE/FE. (Windows FE is described here, here and here.) Compared to its competitors, X-Ways Forensics is more efficient to use after a while, by far not as resource-hungry, often runs much faster, finds deleted files and search hits that the competitors will miss, offers many features that the others lack, as a German product is potentially more trustworthy, comes at a fraction of the cost, does not have any ridiculous hardware requirements, does not depend on setting up a complex database, etc.! ...
    Starting Price: $18,589
  • 6
    Sandboxie

    Sandboxie

    Sandboxie

    Sandboxie is a sandbox-based isolation software for 32- and 64-bit Windows NT-based operating systems. It is being developed by David Xanatos since it became open source, before that it was developed by Sophos (which acquired it from Invincea, which acquired it earlier from the original author Ronen Tzur). It creates a sandbox-like isolated operating environment in which applications can be run or installed without permanently modifying the local or mapped drive.
  • 7
    Rohos Logon Key

    Rohos Logon Key

    Tesline-Service

    Two-factor authentication solution that converts any USB drive into a security token for your computer and allows you to access Windows securely. Works also with RFID, OTP, U2F tokens by replacing the Windows login password. Replaces weak password-based login with a hardware Security Key: USB flash drive, Google Authenticator OTP, FIDO U2F or industrial RFID access cards. The computer is password-protected, but you don’t need to enter it manually each time you log in, unlock/resume or...
    Starting Price: $32 one-time payment
  • Previous
  • You're on page 1
  • Next