|
||||||
|
||
|
Home > Secure software |
Related keywords: Secure Shell, secure delete, secure files, secure deletion, secure file, pdf secure, secure shell, secure server, secure internet connection, secure email |
|
|
141. | KeyIC ConneX 2.0 (keyic.com) | ||
ActiveX DLL that allows secure, real-time payment processing. Supports Sale, Auth, Capture, Refund, Recurring Transactions, and ACH (Checking account) transactions. Supports Swipe Transactions as well. Full Membership Management capabilities integrate with Recurring Transactions and can completely manage a membership site. Comes with examples in Access and ASP and full | |||
Updated: 9, 2005 | Rating: 0 | Author: Brian Etzel | Size: 480 kb | Freeware Go to category: Development > Source Editors Similar programs | |||
142. | LASsie (Light Application Security) for MS Access 4.3 (peterssoftware.com) | ||
Access built-in security, LASsie offers a less complicated way to secure forms, reports, controls and certain records from unauthorized user access. With LASsie, you can prevent a user from opening specific forms/reports, restrict their ability to update data on a form, disable certain controls | |||
Updated: 9, 2005 | Rating: 0 | Author: Peter De Baets | Size: 770 kb | Shareware Go to category: Development > Other Similar programs | |||
143. | Licence Protector 2.4 (mirage-systems.de) | ||
licence files with customer made keys per software project and Secure Activation Keys, which can be used only once. No royalty payments. Pay once - distribute as often as you like. Available with English, Dutch, German, French, Italian, Portuguese European, Portuguese Brazil, Swedish user interface. LICENCE PROTECTOR comes in 3 editions to satisfy different requirements: Starter | |||
Updated: 2, 2006 | Rating: 0 | Author: Mirage Sales | Size: 14806 kb | Shareware Go to category: Development > Management & Distribution Similar programs | |||
144. | Lucigenic Crypt 4.4 (lucigenic.com) | ||
(Rijndael) encryption algorithms. The component also implements the Secure Hash Algorithm (SHA-1) and the Base64 encoding algorithm. ECB, CBC, CFB and OFB cipher modes are implemented. One step methods are provided to compress and encrypt files and strings. Self decrypting archives can be created for files and strings in a single step. Aside from providing core string and file | |||
Updated: 3, 2005 | Rating: 0 | Size: 1800 kb | Shareware Go to category: Development > Other Similar programs | |||
145. | Lucigenic TCP 2.1 (lucigenic.com) | ||
for the HTTP protocol, DNS resolver services and 442 bit secure sockets. Lucigenic TCP/IP is a completely self-contained, very small footprint component that does not require any runtimes for it's operation. You can easily add Internet capabilities to applications written in just about any development system, including C++, VB, ASP, Pearl, Delphi, Visual FoxPro, PowerBuilder | |||
Updated: 3, 2005 | Rating: 0 | Size: 1750 kb | Shareware Go to category: Development > Components & Libraries Similar programs | |||
146. | MDBSecure 1.1.0 (mindwarp-consultancy-software.com) | ||
for your databases. MDBSecure follows the recommended approach to securing Microsoft Access databases, it will encrypt your access database and remove security weaknesses. Although nothing is ever 100% secure in computing, following this approach will make an MS Access Database more | |||
Updated: 9, 2005 | Rating: 82 | Author: Julian Moorhouse | Size: 1062 kb | Shareware Go to category: Development > Other Similar programs | |||
147. | MenuXP 1.0 (download.componentspot.com) | ||
starting a new project who are looking for a simpler, more secure library may wish to consider other options. MFC classes to add flat, non-3D, “water-color” Office XP-style UI controls to MFC apps. They have no raised edges, do not look “pushed in” when clicked, and are not “shadowed” (except for | |||
Updated: 9, 2005 | Rating: 0 | Author: Component Spot | Size: 811 kb | Freeware Go to category: Development > Active X Similar programs | |||
148. | IDAutomation MICR Font Advantage 4.9 (bizfonts.com) | ||
print specifications documentation, (3) Security Fonts for printing secure names and amounts plus (4) a Visual Basic source code example of printing a bank check. Compatible with Windows, Pocket PC, Macintosh, UNIX, Linux and others. TrueType, PostScript and PCL laserjet soft fonts are provided. The MICR E13B fonts were created according to ISO (International Standards Organization) | |||
Updated: 9, 2005 | Rating: 0 | Author: Technical Support | Size: 2398 kb | Demo Go to category: System Utilities > Other Similar programs | |||
149. | MoleBox Pro 2.5.5 (molebox.com) | ||
your media files, data files and DLLs from unauthorized access. - Secure application integrity and avoid DLL conflict. - Create level packs, add-ons, updates, patches minimizing their file size. - Compress and encrypt your application and all the files it requires. - Make program cracking extremely difficult. - Add splash screen to your application. MoleBox supports the | |||
Updated: 2, 2006 | Rating: 52 | Author: Olga Marchevska | Size: 946 kb | Shareware Go to category: Development > Management & Distribution Similar programs | |||
150. | OpenSSL 0.9.7c (download.componentspot.com) | ||
library, developers can write applications that take advantage of Secure Sockets Layer (SSL v2/v3), Transport Layer Security (TLS v1). The Open SSL library uses the included full-strength general-purpose cryptography library, which can be used by itself. Security features such as the following can be | |||
Updated: 9, 2005 | Rating: 0 | Author: Component Spot | Size: 2879 kb | Freeware Go to category: Development > C / C++ / C-sharp Similar programs | |||
|
Home > Secure software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|