Top 15 WebSequenceDiagrams Alternative and Similar Softwares | Nov 2024

Easy diagram generator for Sequence Diagrams and Message Sequence Charts.

1. ARIS Express

ARIS Express ARIS Express is based on the proven ARIS methodology and industry standards. Its intuitive user interface and the latest improvements in modeling assistances enable instant results. This free version will appeal to universities and vocational schools, as well as BPM beginners and occasional users. ARIS Express is not a limited......

2. Nevron Draw

Nevron Draw Nevron Draw is a powerful yet easy to use software for creating diagrams. It provides a large selection of shapes, formula based engine like in Microsoft Visio ®, a lot of automatic layout algorithms and many other features. Nevron Draw is perfect for the easy creation of nearly any type......

3. Grafio

Grafio Grafio allows you to make flow charts, org charts, Venn diagrams, mind maps, take notes, sketches and do other diagrams. Everything is custom and modifiable.Grafio's shape recognition algorithm can detect basic shapes and redraw them. You feel free sketching your idea, as if your Device is a cocktail napkin but......

4. textografo

textografo Generate diagrams from text faster than ever and facilitate stakeholders involvement via animation and online collaboration.......

5. EDS (Encrypted Data Store)

EDS (Encrypted Data Store) With EDS (Encrypted Data Store) you can store your files in the encrypted container to prevent unauthorized access to sensitive information. TrueCrypt container files are supported.Main features:* Supports AES, Serpent, Twofish encryption algorithms.* SHA-512, RIPEMD-160, Whirlpool hash algorithms.* Encrypt/decrypt any kind of file.* TrueCrypt compatible container files.* All the......

6. USBCrypt

USBCrypt Password protection and strong encryption of the external and internal drives, flash drives, backup drives, etc.......

7. east-tec SafeBit

east-tec SafeBit east-tec SafeBit is the perfect electronic vault you need for your privacy. It features on-the-fly AES encryption, by creating virtual encrypted disk drives, where you can hide files and folders, keep them encrypted all the time, but still work with them just like you work with normal files. Data is......

8. FileVault

FileVault FileVault is a method of using encryption with volumes on Mac computers. Encryption and decryption are performed on the fly.FileVault 2 uses full disk, XTS-AES 128 encryption to help keep your data secure. Using FileVault 2, you can encrypt the contents of your entire drive.......

9. GoAnywhere OpenPGP Studio

GoAnywhere OpenPGP Studio GoAnywhere OpenPGP Studio™ is a free desktop tool that makes it easy to protect sensitive files using the popular Open PGP encryption standard. Documents can be encrypted, decrypted, signed and verified from your PC or workstation using this intuitive tool. An integrated key manager allows you to quickly create, import,......

10. eCryptfs

eCryptfs The enterprise cryptographic filesystem for Linux......

11. TruPax

TruPax TruPax generates TrueCrypt - compatible container files from arbitrary sets of files and folders. Such files match exactly the size of the contained material and can be mounted by TrueCrypt, but also directly extracted using TruPax itself. Latter also works for containers formatted with FAT32 by TrueCrypt itself,......

12. ImmediateCrypt

ImmediateCrypt ImmediateCrypt is an utility for encryption and decryption of plain text messages with the AES-256 cipher.It is released under the GPLv3 license (full Java source available) and works under any Java-enabled environment (Windows, Linux and Mac OSX).......

13. Cryptix

Cryptix Cryptix is a complete solution to study cryptography, encoding and ciphers. Hide your datas, encrypt your texts and documents.Cryptix contains password generators, Mnemonic, .htpasswd generator, RSA 512 bits key generator, Wordlist generator and numerous security tools.......

14. iSteg

iSteg iSteg is an encryption tool used to hide a file (for example a zip archive) inside a jpeg picture. This encryption technology is called steganography. iSteg is a frontend for the opensource tool outguess 2.0. iSteg can be used to both encode and decode a hidden file.......

15. Hash

Hash Hash is your free utility to validate the check sum a file (file checksum).With "Hash" you calculate the hash of a file.Hash supports the following algorithms :- Adler32- CRC16- CRC32- DSS1- MD4- MD5- MDC2- RMD160- SHA- SHA1- SHA256Other functionalities :- Drag & Drop mode.- Export results.- Informations about the analyzed......