|
||||||
|
||
|
Home > Information security software |
|
|
111. | wodCrypt 1.2.7.0 (weonlydo.com) | ||
and provide the same as their output. Even more, it can present the information in BASE64 and HEX encoded data - in case your environment just doesn't like to work with binary data. Optimized code Besides working in regular way - without random padding and internal wrapping, wodCrypt can work in | |||
Updated: 2, 2006 | Rating: 82 | Author: Kresimir Petric | Size: 1189 kb | Shareware Go to category: Development > Other Similar programs | |||
112. | wodDHCPServer 1.0.7.0 (weonlydo.com) | ||
information wodDHCPServer is a DHCP server component (Dynamic Host Configuration Protocol), available as COM object and ActiveX control. It provides a framework for passing configuration information to hosts on TCP/IP network. wodDHCPServer implements protocol specific infrastructure, allowing you to allocate IP addresses from your address pool, and provide it to requesting | |||
Updated: 2, 2006 | Rating: 0 | Size: 858 kb | Freeware Go to category: Development > Other Similar programs | |||
113. | wodFTPServer 2.1.9.0 (weonlydo.com) | ||
that implements server side of following protocols: FTP, FTP/S (FTPS or FTP+SSL) both in explicit and implicit modes, and SFTP (secure ftp subsystem on SSH2 secured channel). Support for all 3 protocol is transparent for your programming - you have same set of events, same set of properties and methods, same control over connected users - and just one property to change to | |||
Updated: 2, 2006 | Rating: 16 | Author: Kresimir Petric | Size: 2235 kb | Shareware Go to category: Development > Active X Similar programs | |||
114. | wodHttpDLX 1.3.8.0 (weonlydo.com) | ||
information WeOnlyDo Software's wodHttpDLX is a HTTP client ActiveX control that provides easy, both high and low level access to the complete HTTP protocol. It's primary purpose is to retrieve documents and other resources from the WEB. It was designed to be as programmer-friendly as possible. You will find it can be fully automated to get you requested resource | |||
Updated: 2, 2006 | Rating: 0 | Author: Kresimir Petric | Size: 1615 kb | Shareware Go to category: Development > Active X Similar programs | |||
115. | VeriLook Standard SDK (Demo for Windows) 2.0 (neurotechnologija.com) | ||
per second. VeriLook can be easily integrated into the customer's security system. The integrator has a complete control over SDK data input and output; therefore SDK functions can be used in connection with most cameras and databases. Integrator could develop any user interface. Distribution package contains: + VeriLook DLL (one license); + Interface for image input | |||
Updated: 2, 2006 | Rating: 0 | Author: Neurotechnologija | Size: 590 kb | Demo Go to category: Development > Components & Libraries Similar programs | |||
116. | FingerCell Library EDK (Demo for WinCE) 1.2 (neurotechnologija.com) | ||
via USB port + FingerCell 1.2 EDK documentation. For more information please review our web site or contact us. FingerCell 1.2 Library EDK is intended for large biometric system projects using hardware, based on ARM processors. Includes FingerCell library, samples and documentation for Windows CE and | |||
Updated: 2, 2006 | Rating: 0 | Author: Neurotechnologija | Size: 149 kb | Demo Go to category: Development > Other Similar programs | |||
117. | Cryptocx v6 6.1.3 (easybyte.com) | ||
data using standards compliant algorithms to make sure that your information is totally secured. It is very easy to add Cryptocx to an existing application or web site backend. Use Cryptocx to encrypt your data, totally securing it. EasyByte Cryptocx v6 builds upon the previous releases of Cryptocx to add further powerful features in a very easy to use bundle. Data security | |||
Updated: 2, 2006 | Rating: 0 | Author: EasyByte Software | Size: 3999 kb | Demo Go to category: System Utilities > Other Similar programs | |||
118. | Access Forms and Reports Assistant 2.0 (cbacorp.com) | ||
you work with several secured databases, AFRA can keep track of your security information so you just select the workgroup data with two mouse clicks. All writeable form and report properties for Access 2000, 2002, and 2003 are available except the HasModule property (that one could be a disaster, erasing all your form and report module code in an instant). AFRA detects the | |||
Updated: 2, 2006 | Rating: 149 | Author: Bob Flenniken | Size: 6165 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
119. | TurboNote+ desktop sticky notes v6.0 (turbonote.com) | ||
your network or via email; password-protect them or encrypt them for security. Use them for reminders, messages, to-do lists, Web and email addresses. Change note colors and sizes, set alarms, lock them and keep your screen uncluttered by hiding them. Use handy templates for common messages or make up your own style with optional rich text editing, transparency control and images | |||
Updated: 2, 2006 | Rating: 173 | Author: Vicki Hyde | Size: 1616 kb | Shareware Go to category: Business > Other Similar programs | |||
120. | TimeOff 2.5.3 (mycroftcomputing.com) | ||
data entry. A benefit policy wizard helps you enter your company's benefit policies. And the main screen helps you keep track of both available and used benefit hours for each employee. TimeOff records the hours that employees were not at work by different categories. It automatically calculates the benefit hours each employee earns, and updates balances as the information | |||
Updated: 2, 2006 | Rating: 0 | Author: Gordon Turner | Size: 2732 kb | Shareware Go to category: Business > Other Similar programs | |||
|
Home > Information security software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|