|
||||||
|
||
|
Home > Registration option software |
|
|
101. | Install Creator 2 (clickteam.com) | ||
text and also use the configuration interface to define additional options, which include optional DLL, OCX, REG and TLB registrations, installation of fonts, desktop shortcuts and more. Install Creator can also include a complete uninstall option. This free version is fully featured and can be used for personal and commercial distributions. Install Creator isan easy to | |||
Updated: 9, 2005 | Rating: 191 | Author: Jeff Vance | Size: 2224 kb | Freeware Go to category: Development > Install & Setup Similar programs | |||
102. | Instyler SmartSetup 2.51 (instyler.com) | ||
update installations, uses system file path variables, supports ocx registration and can also create environment variables and surely features an included uninstaller. New in this version: Create differential patch packages for components, Set the window state of created shortcuts, Run program before | |||
Updated: 9, 2005 | Rating: 0 | Author: Instyler Software | Size: 2151 kb | Shareware Go to category: Development > Install & Setup Similar programs | |||
103. | JLauncher 1.4 (magi-au.com) | ||
Java Runtime detection using the Windows Registry, web download options, Java version checking, debug mode for developers, a wizard-like configuration tool, and much more. Registration includes free software upgrades when released. JLaunch is a lightweight executable used to launch Java applications directly, without the need for batch files with DOS boxes popping up and | |||
Updated: 9, 2005 | Rating: 491 | Author: Paul Atkinson | Size: 518 kb | Shareware Go to category: Web Development > Java & JavaScript Similar programs | |||
104. | KeyedAccess for MS Access 2.0 (peterssoftware.com) | ||
to generate an installation-specific Serial Number on the end-user's computer which can be unlocked with a corresponding Unlock Code. Using KeyedAccess means you can create shareware-type versions of your MS Access application where some functionality is locked and is only unlocked when the user enters a valid key. When using the Installation Serial Number and Unlock Code | |||
Updated: 9, 2005 | Rating: 0 | Author: Peter De Baets | Size: 774 kb | Demo Go to category: Development > Other Similar programs | |||
105. | MSCCrypto for Linux 2.0 (miraplacid.com) | ||
MSCCrypto is COM component for Active Server Pages and stand-alone applications. It includes collection of the best encryption and hashing algorithms: - RSA public key algorithm (512/1024/2048 bits key size) - AES symmetric block algorithm (128/192/256 bits key size) - Blowfish symmetric block Includes PGP/OpenPGP compatible component | |||
Updated: 9, 2005 | Rating: 0 | Author: Miraplacid Software Development | Size: 225 kb | Shareware Go to category: Web Development > ASP & PHP Similar programs | |||
106. | Optilink 3.0.24 (optilinksoftware.com) | ||
OptiLink offers a set of powerful tools that analyzes top ranked web pages to reveal just why they are ranked at the top of the major search engines, including AllTheWeb, AltaVista, AOL, Google, HotBot, Inktomi, Lycos and MSN. OptiLink offers seven powerful benefits; (1) unravel the secrets behind top ranked | |||
Updated: 9, 2005 | Rating: 92 | Author: Michael Wong | Size: 4097 kb | Commercial Go to category: Development > Other Similar programs | |||
107. | PajantImage 1.51 (pajant.co.uk) | ||
documentation and example code. Excellent on-line support. All-in registration price with nothing else to pay. A powerful ActiveX control supporting GIF animation, JPEG, TWAIN, PNG, TIFF, database storage, thumbnail generation, and many imaging processing operations. Extensive documentation and example code. Excellent on-line | |||
Updated: 9, 2005 | Rating: 39 | Author: Richard Morrey | Size: 1422 kb | Shareware Go to category: Education > Teaching & Training Tools Similar programs | |||
108. | PELock 1.06 (pelock.pac.pl) | ||
• compression of the application (code, imports, resources), it's possible to decrease executable size even 70% of original file • encryption of code (publicly available cryptographic algorithms and algorithms build polymorphic ally) • reorganization of basic PE EXE structures in order to assure better ratio during compression • deletion of unnecessary structures in executable | |||
Updated: 9, 2005 | Rating: 0 | Author: Bartosz Wójcik | Size: 422 kb | Demo Go to category: Development > Other Similar programs | |||
109. | ProxyDesigner 1.0.1 (proxysource.com) | ||
Modeling Language). Users need to register on the author's web site at www.proxysource.com. Registration is free and only takes a few moments. A connection to the internet is required to register the product the first time you use it. After registration, the product can work normally with no internet connection, unless you wish to use the product to share and | |||
Updated: 9, 2005 | Rating: 200 | Author: Vince D'Onofrio | Size: 2147 kb | Freeware Go to category: Education > Teaching & Training Tools Similar programs | |||
110. | Purchase Gateway 1.2.0 (purchasegateway.com) | ||
your applications. The control can then integrate with your existing registration method to enable or unlock demos or pay-per-use software. The control uses 128-bit encryption to secure the buyer's information and then delivers it to your email inbox. You can use your existing merchant | |||
Updated: 3, 2005 | Rating: 0 | Author: Robert Tigwell | Size: 4833 kb | Shareware Go to category: Development > Active X Similar programs | |||
|
Home > Registration option software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|