|
||||||
|
||
|
Home > C encryption software |
Related keywords: encryption, file encryption, Encryption, encryption software, encryption system, email encryption, data encryption, hard disk encryption, ENCRYPTION, disk encryption |
|
|
121. | SecureBlackbox (VCL) 4.3 (secureblackbox.com) | ||
components SecureBlackbox contains original implementation of all encryption algorithms and security protocols, used in the package, and doesn't depend on third-party libraries SecureBlackbox is split to several packages: * PKIBlackbox - offers support for Public Key Infrastructure (X.509 certificates, certificate requests, certificate revokation lists, certificate storages etc.) | |||
Updated: 2, 2006 | Rating: 16 | Author: EldoS Corporation | Size: 42127 kb | Commercial Go to category: Development > Delphi Similar programs | |||
122. | SecureCode 2.0 (aidsoft.com) | ||
is a new software protection for Borland Delphi or C++ Builder, based on the lastest technique protection to provide a strong security to protect your software against reverse engineering and illegal decompilation. If you have important code and you do not want a competitor to see, use SecureCode !You can use as protection against reverse-engineering or you can use as | |||
Updated: 9, 2005 | Rating: 16 | Author: Bruno Branciforti | Size: 830 kb | Shareware Go to category: Development > Delphi Similar programs | |||
123. | Siberix PDF Library 5.0 (siberix.com) | ||
PDF Library is a pure C# component for .NET designed to create industry standard PDF files. It provides a variety of methods to format text, create complex layouts, draw geometric figures and paths, insert images and other objects. Features: - Easy to use IGraphics interface (similar to GDI+) - Flate, JPEG and CCITT Group 4 compression - Grayscale or BW image transformation | |||
Updated: 2, 2006 | Rating: 71 | Author: Victor Motchaline | Size: 592 kb | Commercial Go to category: Development > Components & Libraries Similar programs | |||
124. | SignetSure 1.0 (SignetSure.com) | ||
to your subscribers. You have installed a program on the subscriber's machine that receives your files. This program must be able to authenticate files even against a hacker who has reverse-engineered your program. Scenario Two: You distribute registered software with a datafile that identifies | |||
Updated: 9, 2005 | Rating: 0 | Author: Jim Serwer | Size: 696 kb | Shareware Go to category: Development > Delphi Similar programs | |||
125. | SkinCrafter 1.8.1 (skincrafter.com) | ||
create easily skinnable end-user applications. Support for MS Visual C++, MS Visual Basic, Delphi, Windows Forms (.NET), and all Win32 languages that support COM objects. Flexible controls customization for all Windows elements with total control over the title bar, window borders, MDI applications | |||
Updated: 2, 2006 | Rating: 61 | Author: Dmitry Narizhnykh | Size: 10195 kb | Demo Go to category: Development > Active X Similar programs | |||
126. | smtp activex, smtp component, smtp control 4.3.1 (emailcomponent.com) | ||
and receiving email. Packed with advanced features including: full S/MIME capability for sending and receiving signed and encrypted email, MHTML for sending HTML email with embedded images and style sheets, multipart/alternative, multipart/related, attachments, advanced AES encryption, automated international character encoding conversion, Outlook integration, progress | |||
Updated: 9, 2005 | Rating: 16 | Author: Matt Fausey | Size: 2000 kb | Shareware Go to category: Development > Components & Libraries Similar programs | |||
127. | Solid File System 2.2 (eldos.org) | ||
such as support for streams inside of files, file and stream encryption, compression, journalling (support for data integrity), file and storage metadata, symbolic links etc. Using SolFS you can simplify or completely solve the problem of managing large number of supplementary files, needed to your application. Now your customers won't be confused by unknown files, populating | |||
Updated: 9, 2005 | Rating: 0 | Author: EldoS Corporation | Size: 5577 kb | Commercial Go to category: Development > Components & Libraries Similar programs | |||
128. | Solid File System 2.2 (eldos.org) | ||
such as support for streams inside of files, file and stream encryption, compression, journalling (support for data integrity), file and storage metadata, symbolic links etc. Using SolFS you can simplify or completely solve the problem of managing large number of supplementary files, needed to your application. Now your customers won't be confused by unknown files, populating | |||
Updated: 9, 2005 | Rating: 0 | Author: EldoS Corporation | Size: 5577 kb | Commercial Go to category: Development > Components & Libraries Similar programs | |||
129. | Solid File System 2.2 (eldos.org) | ||
such as support for streams inside of files, file and stream encryption, compression, journalling (support for data integrity), file and storage metadata, symbolic links etc. Using SolFS you can simplify or completely solve the problem of managing large number of supplementary files, needed to your application. Now your customers won't be confused by unknown files, populating | |||
Updated: 9, 2005 | Rating: 0 | Author: EldoS Corporation | Size: 5577 kb | Commercial Go to category: Development > Components & Libraries Similar programs | |||
130. | Meaning and Structure in C. Bronte 2003 (e-dition.net) | ||
style, making it highly readable. The work points out Bronte's use of symbolism to achieve structure; and from this, meaning in her novels becomes clear. Common threads flow through her novels; and one can see how the novels evolved from her first and unsuccessful attempt to her two masterpieces, Jane Eyre and Villette. The work on Charlotte Bronte was written over two decades | |||
Updated: 3, 2005 | Rating: 0 | Author: Andre Casault | Size: 3299 kb | Shareware Go to category: Education > Other Similar programs | |||
|
Home > C encryption software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|