|
||||||
|
||
|
Home > File encryption software software |
Related keywords: software, file, Software, encryption, File, RAD Software, free software, spy software, file transfer, file management |
|
|
121. | Cryptocx v5 5.1.6 (easybyte.com) | ||
is Cryptocx v5? Cryptocx is an encryption component designed for use in any modern development environment. Cryptocx encrypts and decrypts data using standards compliant algorithms to make sure that your information is totally secured. It is very easy to add Cryptocx to an existing application or web site backend. Why use Cryptocx? Use Cryptocx to encrypt your data, totally | |||
Updated: 9, 2005 | Rating: 39 | Author: EasyByte Software | Size: 4099 kb | Demo Go to category: Development > Active X Similar programs | |||
122. | Cryptocx v6 6.1.3 (easybyte.com) | ||
is an encryption component designed for use in any modern development environment. Cryptocx encrypts and decrypts data using standards compliant algorithms to make sure that your information is totally secured. It is very easy to add Cryptocx to an existing application or web site backend. Use Cryptocx to encrypt your data, totally securing it. EasyByte Cryptocx v6 builds upon | |||
Updated: 2, 2006 | Rating: 0 | Author: EasyByte Software | Size: 3999 kb | Demo Go to category: System Utilities > Other Similar programs | |||
123. | CT Messenger 2.0 (ivrsoft.com) | ||
card. Unlike other programs of this type, CT Messenger uses software DSP algorithms for detecting the type of response (busy, no answer, voice answer). CT Messenger software does not rely on the answer detection capabilities of the underlying hardware, and it works with inexpensive voice modems. CT Messenger 2.0 (Mint Components Inc.) is a component software | |||
Updated: 9, 2005 | Rating: 0 | Author: IVR Software | Size: 6603 kb | Shareware Go to category: Development > Other Similar programs | |||
124. | DBDocumentor 4.00 (pikauba.com) | ||
the SQL dialect, the object types to include and the source files to process. Within a few minutes DBDocumentor generates a fully cross referenced view of the SQL database, including where data is sourced from and what objects are modifying data in what other objects. The cross referencing extends to procedure and security usage, clearly showing which procedures are used where | |||
Updated: 2, 2006 | Rating: 0 | Author: Tim Mackey | Size: 3660 kb | Shareware Go to category: Business > Databases & Tools Similar programs | |||
125. | Encryption Toolkit 2003 Trial Edition 1.0 (nickellie.com) | ||
Encryption Toolkit includes all the tools you need to add file encryption and data encryption to your software applications. The toolkit includes COM encryption objects with a standard interface for both the Pocket PC and Windows desktop platforms. This enables you to | |||
Updated: 9, 2005 | Rating: 0 | Author: Daniel Maddox | Size: 1062 kb | Demo Go to category: Development > Components & Libraries Similar programs | |||
126. | EXECryptor 2.3.7 (softcomplete.com) | ||
is a software protection system for protect programs from reverse engineering, analysis, modifications and cracking. EXECryptor has powerful anticrack, antidebug, antitrace and import code protection features for stop the latest cracking software. and crackers issues. EXECryptor allows to turn program into trial, demo or evalutaion versions and vice versa. You can set | |||
Updated: 2, 2006 | Rating: 140 | Author: Alex Sergeev | Size: 2865 kb | Shareware Go to category: Development > Management & Distribution Similar programs | |||
127. | eZediaMX 3.1.5 (ezedia.com) | ||
is easy-to-use cross-platform multimedia authoring and editing software for creating digital portfolios, storyboards, business presentations, multimedia slide shows, animations, and interactive CD-ROMs. It allows users to combine and edit all major media formats including video, graphics, animation, sound, MP3s, VRs, and text; add interactivity; and incorporate sophisticated logic | |||
Updated: 2, 2006 | Rating: 0 | Size: 19272 kb | Demo Go to category: Graphic Apps > Other Similar programs | |||
128. | HardKey License Manager 3.2 (softcomplete.com) | ||
ability. - Database export in Excel - E-Mail list export in text file. - Automatic source code generation for end-application key verify unit (plugins, Delphi, C/C++) - Black list automathic support in key verification module. - EXECryptor & AsProtect integration on enciphering program | |||
Updated: 9, 2005 | Rating: 536 | Size: 8054 kb | Shareware Go to category: Development > Management & Distribution Similar programs | |||
129. | HTML Guard 2.32 (aw-soft.com) | ||
you should have a look at HTML Guard. Among other features this software lets you encrypt your HTML source code and disable the right mouse button, text selection and the print function within a browser. Put an end to copying and modification of your HTML code, images and text by others thus protecting your copyright. While not offering absolute security, the combination of several | |||
Updated: 2, 2006 | Rating: 0 | Author: Andreas Wulf | Size: 1057 kb | Shareware Go to category: Web Development > HTML Tools Similar programs | |||
130. | Leap SE 3.0 (leapse.com) | ||
specification (SRS). By translating English into logical models for software development, Leap SE achieves RAD from the source, dramatically shortening the systems analysis phase of software projects. Project managers can reduce their systems engineering staffing needs with Leap SE, while promoting the development of quality requirements. Twenty-two templates and a Requirement | |||
Updated: 9, 2005 | Rating: 0 | Author: Brian Smith | Size: 3936 kb | Commercial Go to category: System Utilities > Other Similar programs | |||
|
Home > File encryption software software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|