|
||||||
|
||
|
Home > Illegal software |
Related keywords: Illegal Operation |
|
|
1. | Advanced SPAM Generator 1.20 (atompark.com) | ||
of e-mail addresses extraction. Improved algorithm allows to exclude illegal addresses and generate fresh mail list with unlimited number of recipients. Know how technology of e-mail addresses extraction. Improved algorithm allows to exclude illegal addresses and generate fresh mail list with unlimited number of | |||
Updated: 9, 2005 | Rating: 2499 | Author: Evgeny Medvednicov | Size: 561 kb | Commercial Go to category: Communications > E-Mail Clients Similar programs | |||
2. | Software Administration Kit 1.7 (lobstersoft.com) | ||
codes. In the battle against piracy, SAK helps you defeat illegal registration code generators by making it easy to change your key generation scheme, and e-mail your customers new codes or key files. The Software Administration Kit includes a highly customizable set of sales reports, including a graph that shows how sales have evolved over time, pie charts that display | |||
Updated: 9, 2005 | Rating: 0 | Author: Adrian Grigore | Size: 2246 kb | Shareware Go to category: Development > Management & Distribution Similar programs | |||
3. | Anti Piracy Tools 2004 Professional 2.1 (logicsoftware.net) | ||
software protection system, allowing for live license management and illegal software copies disabling! Anti Piracy 2004 offers unprecedented level of protection for applications that require access to Internet. The system consists of client and server parts. The server part is installed on Microsoft | |||
Updated: 3, 2005 | Rating: 29 | Author: Logic Software | Size: 845 kb | Shareware Go to category: Development > Other Similar programs | |||
4. | EXECryptor 2.3.7 (softcomplete.com) | ||
information. It supports black list database of 'stolen' illegal keys. EXECryptor uses cryptographically strong serial number generation algorithm that compmletely prevents illegal creation of keygen. EXECryptor supplies you with one-touch trial technology that allows to turn your full-feature application in 'try-before-you-buy' version in a few moments | |||
Updated: 2, 2006 | Rating: 140 | Author: Alex Sergeev | Size: 2865 kb | Shareware Go to category: Development > Management & Distribution Similar programs | |||
5. | ICE License 2.01 (aidsoft.com) | ||
License Protection is providing a high barrier against illegal copy using the power of Elliptic Curvesl Asymmetric Encryption to protect your application. Elliptic Curves encryption system allow transmission of secret information over an open channel without a common secret key previously shared | |||
Updated: 9, 2005 | Rating: 0 | Author: Bruno Branciforti | Size: 439 kb | Shareware Go to category: Development > Delphi Similar programs | |||
6. | MacNames 1.1m (peccatte.karefil.com) | ||
filenames stored on a Windows NT or 2000 Server volume, removing illegal characters and adding filenames extensions; With this Mac to PC conversion Windows can identify the appropriate applications associated with renamed files. MacNames works as well a Windows NT 4.0 or Windows 2000 Service | |||
Updated: 2, 2006 | Rating: 285 | Author: Patrick Peccatte | Size: 2191 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
7. | PC Guard for Win32 5.00 (sofpro.com) | ||
Windows 95/98/ME/2000/NT/XP 32bit EXE/DLL applications from illegal distribution and reverse engineering. Even more, you don't need any source code editing or programming experience for this. Everything is fully automatic! With PC Guard for Win32 you can protect unlimited number of your programs with no additional investments. You also don't need any additional | |||
Updated: 9, 2005 | Rating: 48 | Author: Blagoje Ceklic | Size: 841 kb | Commercial Go to category: Development > Management & Distribution Similar programs | |||
8. | PE Corrector 1.84 (gigamindsystems.com) | ||
this problem. It simply clean the headers in safe mode and erase all illegal information. Also you can insert your own info into header (copyright information, for example).; - Some compilers inserts into PE files some export functions which are needed for debugging, but not for final compilation | |||
Updated: 9, 2005 | Rating: 0 | Author: GigaMind Systems | Size: 630 kb | Shareware Go to category: Development > Source Editors Similar programs | |||
9. | PELock 1.06 (pelock.pac.pl) | ||
dependent keys • keeping of the database and checkup of "stolen" (illegal) registration keys • ready to use samples of license key system in C/C++/Delphi • user-friendly interface • many option, which allow you the customize protection to your needs • entire thing written in assembler | |||
Updated: 9, 2005 | Rating: 0 | Author: Bartosz Wójcik | Size: 422 kb | Demo Go to category: Development > Other Similar programs | |||
10. | SecureCode 2.0 (aidsoft.com) | ||
security to protect your software against reverse engineering and illegal decompilation. If you have important code and you do not want a competitor to see, use SecureCode !You can use as protection against reverse-engineering or you can use as additionnal protection with you current registration scheme.The security is internal at your software, it's an advantage for your application | |||
Updated: 9, 2005 | Rating: 16 | Author: Bruno Branciforti | Size: 830 kb | Shareware Go to category: Development > Delphi Similar programs | |||
|
Home > Illegal software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|