|
||||||
|
||
|
Home > On line security software |
Related keywords: security, Security, line, command line, computer security, on line, internet security, security software, off line reader, information security |
|
|
91. | Magic Box Casino - $567 FREE! 2006 V (best-on-line-casinos.com) | ||
Magic Box Casino software is using state of the art security features to provide its players with a 100% full proof secured environment. Any delicate information, which is transferred between the software and the casino servers, is being encrypted using the latest encryption technologies. All of the financial transactions in the Magic Box Casino are being processed by one of the | |||
Updated: 2, 2006 | Rating: 0 | Author: Sally Young | Size: 139 kb | Freeware Go to category: Games & Entertainment > Card Similar programs | |||
92. | Royal Dice Casino $150 Free! 2005V (best-on-line-casinos.com) | ||
Royal Dice Casino's software is using state of the art security features to provide its players with a 100% full proof secured environment. Any delicate information, which is transferred between the software and the casino servers, is being encrypted using the latest encryption technologies. All of the financial transactions in the Royal Dice Casino are being | |||
Updated: 9, 2005 | Rating: 0 | Author: Jack Black | Size: 140 kb | Freeware Go to category: Games & Entertainment > Casino & Gambling Similar programs | |||
93. | wodHttpDLX 1.3.8.0 (weonlydo.com) | ||
information WeOnlyDo Software's wodHttpDLX is a HTTP client ActiveX control that provides easy, both high and low level access to the complete HTTP protocol. It's primary purpose is to retrieve documents and other resources from the WEB. It was designed to be as programmer-friendly as possible. You will find it can be fully automated to get you requested resource, but also | |||
Updated: 2, 2006 | Rating: 0 | Author: Kresimir Petric | Size: 1615 kb | Shareware Go to category: Development > Active X Similar programs | |||
94. | CryptIt 1.301 (SinnerComputing.com) | ||
file encryptors use methods that rely on the theory of computational security, that is difficulty of key factorisation prevents decryption of the file. But this method may not work forever. It used to be considered that a 56 bit key was unbreakable to brute force attacks, but the government of the USA now requires all Top Secret data to use keys of at least 192 bits. This bar | |||
Updated: 2, 2006 | Rating: 0 | Author: Andrew Glina | Size: 33 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
95. | Ariacom Business Reports 2.1 (shareware-promotion.com) | ||
a directory over the intranet to multi-dimensional analysis on a data-warehouse. The product's main features are: - Dynamic and optimized SQL queries - Generation of complex reports integrating pivot tables - Native line, bar, point and pie charts - Integrated security management limiting user access - Fully multilingual design (currently in English | |||
Updated: 3, 2005 | Rating: 42 | Author: Ariacom | Size: 5592 kb | Freeware Similar programs | |||
96. | DevSolutions FTP 1.0 (devsolutions.net) | ||
Sending and receiving one or more files can be accomplished with only a single line of code. A sample FTP client with fully commented source code is included with the library allowing you to find out how thatв??s done. The DevSolutions FTP protocol is a relatively simple client-side component for rapid transfer of files from the local hard disk to an FTP server. Being a | |||
Updated: 2, 2006 | Rating: 0 | Author: supportTeam | Size: 1115 kb | Shareware Similar programs | |||
97. | Engineers Edition 3.3 (solarwinds.net) | ||
and Management tools. You never have to look at a router command line prompt again with the awesome Cisco Router Config tools. You can edit and update Configs real time with the changes highlighted in Red, Green and Yellow. Would you like a complete database of your network? The NETWORK SONAR tool will construct a Microsoft Access database in a matter of minutes. You could | |||
Updated: 9, 2005 | Rating: 0 | Author: Doug Rogers | Size: 61138 kb | Shareware Go to category: Network & Internet > Other Similar programs | |||
98. | System Key Wizard 2.1 (home.wol.co.za) | ||
is the best protection that you can ever place on the software that you develop at the best price ever. We have many happy customers in a verity of fields. One line of code to protect your investment that is all. The component will auto create and show the demo pop up screen if an demo key is in use, the demo pop up screen is totally customizable from the components published | |||
Updated: 9, 2005 | Rating: 16 | Author: Morne Rossouw | Size: 3731 kb | Shareware Go to category: Development > Delphi Similar programs | |||
99. | System Key Wizard 2.1 (continuumq.com) | ||
is the best protection that you can ever place on the software that you develop at the best price ever. We have many happy customers in a variety of fields. One line of code to protect your investment that is all. The component will auto create and show the demo pop up screen if an demo key is in use, the demo pop up screen is totally customizable from the components published | |||
Updated: 9, 2005 | Rating: 0 | Author: Morne Rossouw | Size: 3731 kb | Shareware Go to category: Development > Delphi Similar programs | |||
100. | Darn! Passwords! 3.1.03.41 (odarn.com) | ||
keeps track of all those pesky passwords you need for the Internet, on line services, financial sites, and other secure programs. You remember one password. Darn! Passwords! remembers all the rest. It remembers URLs of password-protected web sites. Just pick the password, and drag it and | |||
Updated: 9, 2005 | Rating: 0 | Author: Chris Thornton | Size: 2454 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
|
Home > On line security software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|