|
||||||
|
||
|
Home > Securing software |
|
|
121. | Clever Internet Suite 5.0 (aidsoft.com) | ||
Multipart Multitreading downloading; Allowsyou to work by the secured channel (HTTPS) using SSL; Ability of resuming broken or stopped downloads from where they leftoff on both HTTP/HTTPS and FTP servers; Delphi and C++Builder demos code; FTP Server with multithreading support.Installations for Delphi 5, 6, 7 and 2005 and C Builder 5, 6. MIME support.The components allow you to | |||
Updated: 9, 2005 | Rating: 0 | Author: Sergey S | Size: 2081 kb | Shareware Go to category: Development > Delphi Similar programs | |||
122. | Code-Lock 2.35 (chosenbytes.com) | ||
using your obsolete software protections. Code-Lock, an advanced, secure software protection system, will stop crackers in their tracks. Code-Lock, featuring CodeSecure Technology for Visual Basic, C#, VB.NET and Delphi applications, has never been cracked. It is time to keep crackers awake while you | |||
Updated: 9, 2005 | Rating: 16 | Author: Ryan Thian | Size: 2721 kb | Demo Go to category: Development > Management & Distribution Similar programs | |||
123. | CodeCharge Studio 3.0 (codecharge.com) | ||
utilize a variety of forms and templates to generate sophisticated, secure Web applications in record time. Leverage the latest industry standards and Internet technology to develop dynamic Web applications that can include portals, commerce sites, task management systems, enterprise resource planning | |||
Updated: 2, 2006 | Rating: 16 | Author: Konrad Musial | Size: 31812 kb | Shareware Go to category: Web Development > HTML Tools Similar programs | |||
124. | commandLine .NET 1.0.0.8 (asprosoft.com) | ||
Secure and managed .net component that executes DOS and console commands. Each command executes asynchronously and raises events containing current output, completion status, and DOS ERRORLEVEL. Users can also set timeouts, abort commands, and simulate user input. Includes binaries, merge module | |||
Updated: 3, 2005 | Rating: 0 | Author: Anthony Sebastian | Size: 133 kb | Demo Go to category: Development > Basic / VB / VB DotNet Similar programs | |||
125. | conv_for_bas 4.1 (2m2s.com) | ||
Thousand VB lines written in one click! You have FORTRAN programs and you wish to migrate or renovate them : we propose a very good tool for FORTRAN to Visual BASIC source code conversion. It manages to translate more than 90 % (in some cases 100 %) of FORTRAN commands into VB. The Fortran/VB converter | |||
Updated: 9, 2005 | Rating: 89 | Author: Joel Ollivier | Size: 1661 kb | Shareware Go to category: Development > Other Similar programs | |||
126. | cryptlib 3.0 (download.componentspot.com) | ||
from programmers, allowing them to quickly make their projects more secure. Some of the symmetric encryption (private key) and authentication algorithms that cryptlib supports include the following: · AES (Rijndael) · Blowfish · DES, 3DES · RC2, RC4, RC5 The following hash algorithms are available in the library: · MD2, MD4, MD5 · RIPEMD-160 · SHA It offers | |||
Updated: 9, 2005 | Rating: 0 | Author: ComponentSpot | Size: 1347 kb | Freeware Go to category: Development > Active X Similar programs | |||
127. | Cryptocx v5 5.1.6 (easybyte.com) | ||
compliant algorithms to make sure that your information is totally secured. It is very easy to add Cryptocx to an existing application or web site backend. Why use Cryptocx? Use Cryptocx to encrypt your data, totally securing it. EasyByte Cryptocx v5 builds upon the previous releases of | |||
Updated: 9, 2005 | Rating: 39 | Author: EasyByte Software | Size: 4099 kb | Demo Go to category: Development > Active X Similar programs | |||
128. | Cryptocx v6 6.1.3 (easybyte.com) | ||
compliant algorithms to make sure that your information is totally secured. It is very easy to add Cryptocx to an existing application or web site backend. Use Cryptocx to encrypt your data, totally securing it. EasyByte Cryptocx v6 builds upon the previous releases of Cryptocx to add further powerful features in a very easy to use bundle. Data security is becoming more and | |||
Updated: 2, 2006 | Rating: 0 | Author: EasyByte Software | Size: 3999 kb | Demo Go to category: System Utilities > Other Similar programs | |||
129. | IDAutomation Data Matrix Font and Encoder 4.1 (bizfonts.com) | ||
Reports. Hundreds of text characters and binary data can be stored securely and inexpensively with the Data Matrix symbology. Using Reed Solomon error correction, the printed DataMatrix symbol can also withstand damage without causing loss of data. This high level of error correction is far more advanced than one dimensional barcodes with check digits. Our DataMatrix bar code fonts | |||
Updated: 9, 2005 | Rating: 0 | Author: Brant Anderson | Size: 1609 kb | Demo Go to category: Development > Other Similar programs | |||
130. | DevSolutions Crypt 1.0.1 (devsolutions.net) | ||
with powerful byte/binary encryption algorithms.You can use it to secure your sensitive information such as passwords and credit card numbers when storing them in a databas DevSolutionsCrypt library is a powerful and easy to use cryptographic ActiveX and DLL component for Windows developers that allows applications to encrypt/decrypt data or files using the latest industry standard | |||
Updated: 2, 2006 | Rating: 22 | Author: Customer Cell | Size: 651 kb | Shareware Go to category: Development > Active X Similar programs | |||
|
Home > Securing software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|