|
||||||
|
||
|
Home > Verify security software |
Related keywords: security, Security, computer security, internet security, verify, security software, information security, SECURITY, file security, windows security |
|
|
1. | URLBase 6 Professional Edition 6.0.0.1046 (terriadev.com) | ||
management features. Easily accessible functionality allows you to verify web sites, check web sites for updates and scan for duplicate URLs. Take control over your bookmarks using the powerful Import/Export wizard, offering full support for the most popular browsers on the market today. Integrated | |||
Updated: 3, 2006 | Rating: 16 | Author: Martin Visser | Size: 2337 kb | Demo Go to category: Network & Internet > Other Similar programs | |||
2. | EGuest PRO 4.1 (esoftpro.com) | ||
on the popular guestbook system EGuest. New features including Image Verification Code, Admin Interfaces, Theme, 250+ Emoticons, Advanced Search with Highlight, Auto Web/Email Links, IP/Word Banning, Blank Line Protection and much more. It excels other guestbook scripts, allowing you to have a truly | |||
Updated: 2, 2006 | Rating: 0 | Author: Eric Leung | Size: 313 kb | Shareware Go to category: Network & Internet > Other Similar programs | |||
3. | All in One SECRETMAKER 4.2.1 (secretmaker.com) | ||
Secretmaker combines several tools: a security watchdog, a intruder blocker, a spam fighter, a pop-up blocker, a banner blocker, a movie blocker, a privacy protector, history cleaners, a worm hunter and a cookie eraser. Security Watchdog recognizes malicious "mysteryware" and parasites that may assault your computer. Intruder blocker protects from Spyware, Trackware and | |||
Updated: 2, 2006 | Rating: 264 | Author: secretmaker team | Size: 1249 kb | Freeware Go to category: Security & Privacy > Anti-Spam & Anti-Spy Tools Similar programs | |||
4. | CryptIt 1.301 (SinnerComputing.com) | ||
file encryptors use methods that rely on the theory of computational security, that is difficulty of key factorisation prevents decryption of the file. But this method may not work forever. It used to be considered that a 56 bit key was unbreakable to brute force attacks, but the government of the USA | |||
Updated: 2, 2006 | Rating: 0 | Author: Andrew Glina | Size: 33 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
5. | ASP/PHP Web Application Builder 7.01 (citybusinesslogic.com) | ||
for dates, and can lookup relational data in other tables. The security wizard lets you decide which user(s) have access to which tables/fields. For example, you may wish to allow anonymous users to search your product table, but you wouldn't want them to see the trade price, nor add/edit records. Customers may need to be allowed to update their own record, but not that of other | |||
Updated: 2, 2006 | Rating: 366 | Author: Development Manager | Size: 3803 kb | Shareware Go to category: Web Development > ASP & PHP Similar programs | |||
6. | Advanced Administrative Tools 5.92 (glocksoft.com) | ||
you been port scanned lately? Completely ignoring network security is not smart and ignorance isn't exactly bliss. If you access the Internet via a cable modem, DSL, or even a dial-up connection, someone is always knocking on your virtual front door, giving your system the once-over. Protect your data, privacy and valuable computer system with AA Tools. AATools investigates and | |||
Updated: 2, 2006 | Rating: 173 | Author: Alex Markov | Size: 3087 kb | Shareware Go to category: Network & Internet > Network Monitoring Similar programs | |||
7. | wodCrypt 1.2.7.0 (weonlydo.com) | ||
symmetric encryption and decryption, RSA DSA for making and verifying signatures, and MD5 SHA1 for creating hashes. Working with Blobs wodCrypt works with Blobs - Binary Large Objects (it doesn't have to be big, of course) when it comes to data manipulation. Blob is our object that | |||
Updated: 2, 2006 | Rating: 82 | Author: Kresimir Petric | Size: 1189 kb | Shareware Go to category: Development > Other Similar programs | |||
8. | VeriFinger Standard SDK (Windows Demo) 4.2 (neurotechnologija.com) | ||
per second,. VeriFinger can be easily integrated into the customer's security system. This SDK contains interfaces for some of the major fingerprint scanners, which allow the developer to obtain data from the scanners without any additional software. Supports DigitalPersona U.are.U, Identix DFR2090, Cross Match Verifier 300, BiometriKa FX 2000 and TouchChip TCRU1C scanners | |||
Updated: 2, 2006 | Rating: 16 | Author: Neurotechnologija | Size: 3948 kb | Demo Go to category: Development > Components & Libraries Similar programs | |||
9. | VeriFinger Standard SDK (Windows Demo) 4.2 (neurotechnologija.com) | ||
per second,. VeriFinger can be easily integrated into the customer's security system. This SDK contains interfaces for some of the major fingerprint scanners, which allow the developer to obtain data from the scanners without any additional software. Supports DigitalPersona U.are.U, Identix DFR2090, Cross Match Verifier 300, BiometriKa FX 2000 and TouchChip TCRU1C scanners | |||
Updated: 2, 2006 | Rating: 0 | Author: Neurotechnologija | Size: 3948 kb | Demo Go to category: Development > Components & Libraries Similar programs | |||
10. | FingerCell Library EDK (Demo for WinCE) 1.2 (neurotechnologija.com) | ||
FingerCell 1.2 Library EDK is intended for large biometric system projects using hardware, based on ARM processors. FingerCell 1.2 Library EDK contains the following components: + PC Components: FingerCell libraries for Windows and Linux; drivers for image input from Tacoma CMOS, Startek FM200, AuthenTec | |||
Updated: 2, 2006 | Rating: 0 | Author: Neurotechnologija | Size: 149 kb | Demo Go to category: Development > Other Similar programs | |||
|
Home > Verify security software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|