|
||||||
|
||
|
Home > Key fields software |
Related keywords: fields, custom fields, IBE LOG FIELDS, custom database fields, Text to fields, form fields |
|
|
131. | ICE License 2.01 (aidsoft.com) | ||
of secret information over an open channel without a common secret key previously shared between the ends.ICE License Features : * Antidebugging & Antimonitors Protection (protect against Code Tracing) * Sophisticated Asymmetric Encryption Technology (prevent against Key Generator) * Advanced Digital Autentification to prevent against patching * Advanced Code Encryption | |||
Updated: 9, 2005 | Rating: 0 | Author: Bruno Branciforti | Size: 439 kb | Shareware Go to category: Development > Delphi Similar programs | |||
132. | Laurel USB Virtual Driver 2.0 (itlaurel.com) | ||
LetOs suppose you have purchased the software protected by USB HASP KEY, but you want this product to be used on several computers, but in different time. If the computers are located close - it is not a problem to pull out the USB HASP KEY from one computer and to insert into another. There is a problem when the computers are located in different premises, or it is worse than | |||
Updated: 3, 2005 | Rating: 0 | Author: Janice Petros | Size: 290 kb | Commercial Go to category: Development > Other Similar programs | |||
133. | Licence Protector 2.4 (mirage-systems.de) | ||
Licence Protector offers encrypted licence files with customer made keys per software project and Secure Activation Keys, which can be used only once. No royalty payments. Pay once - distribute as often as you like. Available with English, Dutch, German, French, Italian, Portuguese European, Portuguese Brazil, Swedish user interface. LICENCE PROTECTOR comes in 3 editions to | |||
Updated: 2, 2006 | Rating: 0 | Author: Mirage Sales | Size: 14806 kb | Shareware Go to category: Development > Management & Distribution Similar programs | |||
134. | MSCCrypto for Linux 2.0 (miraplacid.com) | ||
of the best encryption and hashing algorithms: - RSA public key algorithm (512/1024/2048 bits key size) - AES symmetric block algorithm (128/192/256 bits key size) - Blowfish symmetric block algorithm (64 to 448 bits key size) - Cast5 (Cast 128) symmetric block algorithm (128 bits key size) - TripleDES symmetric block algorithm (192 bits | |||
Updated: 9, 2005 | Rating: 0 | Author: Miraplacid Software Development | Size: 225 kb | Shareware Go to category: Web Development > ASP & PHP Similar programs | |||
135. | Multiport.USB 2.0 (intellidriver.com) | ||
LetOs suppose you have purchased the software protected by USB HASP KEY, but you want this product to be used on several computers, but in different time. If the computers are located close - it is not a problem to pull out the USB HASP KEY from one computer and to insert into another. There is a problem when the computers are located in different premises, or it is worse than | |||
Updated: 9, 2005 | Rating: 0 | Author: Marion Willis | Size: 547 kb | Commercial Go to category: Development > Other Similar programs | |||
136. | NewAge USB Virtual Driver 2.0 (newageit.com) | ||
LetOs suppose you have purchased the software protected by USB HASP KEY, but you want this product to be used on several computers, but in different time. If the computers are located close - it is not a problem to pull out the USB HASP KEY from one computer and to insert into another. There is a problem when the computers are located in different premises, or it is worse than | |||
Updated: 3, 2005 | Rating: 16 | Author: Matthew Jacobson | Size: 290 kb | Commercial Go to category: Development > Other Similar programs | |||
137. | OpenSSL 0.9.7c (download.componentspot.com) | ||
a multitude of encryption algorithms. The symmetric, or private key, encryption algorithms offered include Rijndael (now officially the Advanced Encryption Standard, or AES, algorithm of the U.S. government), IDEA, DES, 3DES, RC2, RC4, and Blowfish. The asymmetric, or private/public key, encryption algorithms include RSA, DSA, and Diffie-Hellman. Also included are | |||
Updated: 9, 2005 | Rating: 0 | Author: Component Spot | Size: 2879 kb | Freeware Go to category: Development > C / C++ / C-sharp Similar programs | |||
138. | PatchFactory 3.3 (agensoft.com) | ||
components that may have different target location on the end-user's machine. This innovation is based on the advanced functionality of the new release that includes improved byte-level patch building algorithm and innovative program interface. The innovative features of patching engine include cumulative patching to bring all in-field versions up-to-date using a single | |||
Updated: 2, 2006 | Rating: 0 | Author: AgenSoft Inc. | Size: 3387 kb | Shareware Go to category: Development > Install & Setup Similar programs | |||
139. | PC Guard for Win32 5.00 (sofpro.com) | ||
investments. You also don't need any additional hardware (hardware keys, dongles etc.) for proper execution of protected programs. PC Guard for Win32 is based only on complex software protection techniques and PC hardware details. PC Guard for Win32 features: - Advanced software copy protection! Protect your software from illegal copying from one computer to another | |||
Updated: 9, 2005 | Rating: 48 | Author: Blagoje Ceklic | Size: 841 kb | Commercial Go to category: Development > Management & Distribution Similar programs | |||
140. | PDF Creator Pilot 2.70 (colorpilot.com) | ||
detailed documentation together with the step-by-step tutorials. Key features: Extended set of methods and properties for easy PDF-file generation; Ability to create watermarks for each page; Ability to add thumbnails to a PDF document; Ability to use and embed True Type fonts using different font embedding styles; Full support for East European, Turkish, Baltic, Russian | |||
Updated: 2, 2006 | Rating: 16 | Author: Rais Garifoulline | Size: 1963 kb | Demo Go to category: Development > Active X Similar programs | |||
|
Home > Key fields software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|