|
||||||
|
||
|
Home > Software security software |
Related keywords: software, security, Software, Security, RAD Software, free software, spy software, backup software, computer security, internet security |
|
|
111. | cryptlib 3.0 (download.componentspot.com) | ||
by Peter Gutmann is a security toolkit that allows even less experienced programmers to add strong encryption and authentication services to their programs, security features that are becoming more and more indispensable. The library attempts to hide the low-level details of encryption/decryption and authentication from programmers, allowing them to quickly make their | |||
Updated: 9, 2005 | Rating: 0 | Author: ComponentSpot | Size: 1347 kb | Freeware Go to category: Development > Active X Similar programs | |||
112. | Cryptocx v5 5.1.6 (easybyte.com) | ||
to add further powerful features in a very easy to use bundle. Data security is becoming more and more important, with developers wanting to add secure data encryption facilities to their programs and web sites. The versatility of Cryptocx, combined with the fastest file encryption available anywhere, full PGP support and the ability to create Self Decrypting Archives (SDA), makes | |||
Updated: 9, 2005 | Rating: 39 | Author: EasyByte Software | Size: 4099 kb | Demo Go to category: Development > Active X Similar programs | |||
113. | Cryptocx v6 6.1.3 (easybyte.com) | ||
to add further powerful features in a very easy to use bundle. Data security is becoming more and more important, with developers wanting to add secure data encryption facilities to their programs and web sites. The versatility of Cryptocx, combined with the fastest file encryption available anywhere, full PGP support and the ability to create Self Decrypting Archives (SDA), makes | |||
Updated: 2, 2006 | Rating: 0 | Author: EasyByte Software | Size: 3999 kb | Demo Go to category: System Utilities > Other Similar programs | |||
114. | DBDocumentor 4.00 (pikauba.com) | ||
what other objects. The cross referencing extends to procedure and security usage, clearly showing which procedures are used where, and under what security context. These capabilities make DBDocumentor ideal for those wishing to learn the structure of a given database, or simply to document the database for future reference.В В Extended capabilities include declarative | |||
Updated: 2, 2006 | Rating: 0 | Author: Tim Mackey | Size: 3660 kb | Shareware Go to category: Business > Databases & Tools Similar programs | |||
115. | EXECryptor 2.3.7 (softcomplete.com) | ||
is a software protection system for protect programs from reverse engineering, analysis, modifications and cracking. EXECryptor has powerful anticrack, antidebug, antitrace and import code protection features for stop the latest cracking software. and crackers issues. EXECryptor allows to turn program into trial, demo or evalutaion versions and vice versa. You can set | |||
Updated: 2, 2006 | Rating: 140 | Author: Alex Sergeev | Size: 2865 kb | Shareware Go to category: Development > Management & Distribution Similar programs | |||
116. | ExeShield 3.8 (exeshield.com) | ||
it's easy to turn your applications into "try-before-you-buy" software with very little effort, and maximum protection against piracy, backdating, reverse-engineering or any kind of tampering. ExeShield will protect virtually any Win32 executable, including: Visual Basic Delphi C++ C++ Builder PowerBasic MASM Visual Studio With ExeShield it's easy to turn your | |||
Updated: 2, 2006 | Rating: 79 | Author: George Balla | Size: 947 kb | Shareware Go to category: Development > Basic / VB / VB DotNet Similar programs | |||
117. | Ghost Installer Studio 3.7.1 (ginstall.com) | ||
Windows applications, focused on enhanced reliability, stability, security and performance. Adobe, Xerox, NEC, Intel and many other companies rely on Ghost Installer Studio to create installations for their top notch software products. Designed to meet high-end expectations of installation technology, Ghost Installer Studio 3.7 offers full support for Microsoft's | |||
Updated: 3, 2005 | Rating: 96 | Author: gInstall Corp. | Size: 10503 kb | Demo Go to category: Development > Install & Setup Similar programs | |||
118. | gReg 4.55 (gitanosoftware.com) | ||
many people want your software, some are thieves. Don't take that chance, protect your work! gReg armors your software against thieves-and safeguards your revenues. Our protection is bulletproof! Our competitors offer only simple software licensing and authorization. gReg out-strips the | |||
Updated: 9, 2005 | Rating: 0 | Author: Jesus Moreno | Size: 5840 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
119. | HTML Guard 2.32 (aw-soft.com) | ||
you should have a look at HTML Guard. Among other features this software lets you encrypt your HTML source code and disable the right mouse button, text selection and the print function within a browser. Put an end to copying and modification of your HTML code, images and text by others thus protecting your copyright. While not offering absolute security, the combination of | |||
Updated: 2, 2006 | Rating: 0 | Author: Andreas Wulf | Size: 1057 kb | Shareware Go to category: Web Development > HTML Tools Similar programs | |||
120. | KeyedAccess for MS Access 2.0 (peterssoftware.com) | ||
This allows you to control where registered versions of your software are installed. KeyedAccess will let you set multiple "locks" so your application can be unlocked using keys generated for the current version of your software, for previous versions, or for all versions of your software (i.e.: A "master key"). A separate database file is provided to generate | |||
Updated: 9, 2005 | Rating: 0 | Author: Peter De Baets | Size: 774 kb | Demo Go to category: Development > Other Similar programs | |||
|
Home > Software security software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|