|
||||||
|
||
|
Home > Encrypt prevent software |
Related keywords: encrypt, prevent, Encrypt, file encrypt, encrypt file, ENCRYPT, encrypt visual basic, encrypt html, encrypt pdf, encrypt email |
|
|
141. | gReg 4.55 (gitanosoftware.com) | ||
Allows you to control the number of times the application is used. Prevent users from defeating the locking system when they reset the time or date. Save time and money by delivering an evaluation version that you convert to a full product without the expense or time of shipping a new product. Simply | |||
Updated: 9, 2005 | Rating: 0 | Author: Jesus Moreno | Size: 5840 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
142. | ICE License 2.01 (aidsoft.com) | ||
Code Tracing) * Sophisticated Asymmetric Encryption Technology (prevent against Key Generator) * Advanced Digital Autentification to prevent against patching * Advanced Code Encryption Protection to prevent against crack or dump * Transfer License to another PC (Trial License or Full License) * Create Key Generator for your partner or distributor - Network LAN Control | |||
Updated: 9, 2005 | Rating: 0 | Author: Bruno Branciforti | Size: 439 kb | Shareware Go to category: Development > Delphi Similar programs | |||
143. | LASsie (Light Application Security) for MS Access 4.3 (peterssoftware.com) | ||
certain records from unauthorized user access. With LASsie, you can prevent a user from opening specific forms/reports, restrict their ability to update data on a form, disable certain controls, filter certain records, all based on a user’s assigned Security Level. LASsie includes a friendly user | |||
Updated: 9, 2005 | Rating: 0 | Author: Peter De Baets | Size: 770 kb | Shareware Go to category: Development > Other Similar programs | |||
144. | ACProtect standard 1.20 (ultraprotect.com) | ||
Metamorph Engine- Metamorph decryption routines and several encrypted layers. The code being protected varies every time you protect your application. CodeReplace Engine - ACProtect can replace some of the protected program's code with its own codes without function loss and speed loss. This feature combine the protect code and the program code more closer and prevent | |||
Updated: 9, 2005 | Rating: 152 | Author: risco software | Size: 1604 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
145. | Help Desk Software - Service Log for Access 3.1 (icon.co.za) | ||
tools needed to provide the support and attention to detail, that prevents logs from falling between the cracks. Service Log is a multi-user workshop help desk solution, that is affordable, simple to install, and easy to use. Fast, easy help desk call logging, easy help desk call tracking, with the full history of all actions | |||
Updated: 9, 2005 | Rating: 0 | Author: Nic Martens | Size: 10107 kb | Shareware Go to category: Business > Other Similar programs | |||
146. | InfoSafe Plus 3.4.6 (wakefieldsoft.com) | ||
and MORE! Password Protection - Choose your own password to prevent unauthorized access to your data. The password is not stored on the handheld or PC, so no one else will be able to retrieve it. Data Encryption - Records are encrypted with 128 bit encryption for security. Customizable Fields List - Customize the fields list. Change any field name for any record! User | |||
Updated: 9, 2005 | Rating: 16 | Author: Shawn Wakefield | Size: 4687 kb | Shareware Go to category: Security & Privacy > Password Managers Similar programs | |||
147. | Break Time 1.4.50 (kadmi.com) | ||
Weariness arises as a result of long continuous work. It may be prevented if you take a break and do relaxing exercises. Relaxation will be enhanced if you listen to classical music during the break. Break Time tells you when you should take a break and provides soothing music during the break time. The program keeps track of the time you spend on the computer and can help you | |||
Updated: 9, 2005 | Rating: 0 | Author: Klikov Aleksander | Size: 1101 kb | Shareware Go to category: Home & Hobby > Cataloging Similar programs | |||
148. | CafeTimePro -Internet Cafe Software 4.0 (cafetime.com) | ||
CafeTimePro converts a desktop computer into a secure Internet Station or Kiosk. Ideal for Internet Cafes or stand alone kiosks. Now includes: CafeShop POS and Remote Reporter Free! Complete Internet Cafe Point of Sale System Major features are: Simple Interface: Customers start using the | |||
Updated: 9, 2005 | Rating: 558 | Author: Rory Keogh | Size: 5982 kb | Shareware Go to category: Network & Internet > Browsers Similar programs | |||
149. | CardFile Pegasus 3.0 (pindersoft.com) | ||
send it to your other machine and then import it - this data is encrypted for your security and prevents anyone from opening your text file and reading the contents. And you will no longer have to print out your data and then manually type it into another machine. Cardfile Pegasus is Internet and Email enabled. Cardfile Pegasus is Internet and Email enabled. You can launch | |||
Updated: 9, 2005 | Rating: 16 | Author: Steve Gertsch | Size: 5180 kb | Shareware Go to category: Business > PIMS & Calendars Similar programs | |||
150. | DriveCrypt 3.03a (drivecrypt.com) | ||
When data is written back to the hard disk, it is automatically re-encrypted. The encryption/ decryption process is completely transparent to the user or any application program -the data is caught "on the fly" as it transfers back and forth between the hard disk and memory. Consequently, users don't need to remember to decrypt or re-encrypt their data, or change the normal | |||
Updated: 9, 2005 | Rating: 0 | Author: Wilfried Hafner | Size: 3222 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
|
Home > Encrypt prevent software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|