|
||||||
|
||
|
Home > Sectors software |
Related keywords: bad sectors |
|
|
141. | KeyIC ConneX 2.0 (keyic.com) | ||
An ActiveX DLL that allows secure, real-time payment processing. Supports Sale, Auth, Capture, Refund, Recurring Transactions, and ACH (Checking account) transactions. Supports Swipe Transactions as well. Full Membership Management capabilities integrate with Recurring Transactions and can completely | |||
Updated: 9, 2005 | Rating: 0 | Author: Brian Etzel | Size: 480 kb | Freeware Go to category: Development > Source Editors Similar programs | |||
142. | LASsie (Light Application Security) for MS Access 4.3 (peterssoftware.com) | ||
certain controls, filter certain records, all based on a user’s assigned Security Level. LASsie includes a friendly user sign-on form that prompts for a login user name and password. Users can change their own passwords via the included "change password" form. Optionally, the sign-on form can be bypassed and the user's network login username can be used. Once the user | |||
Updated: 9, 2005 | Rating: 0 | Author: Peter De Baets | Size: 770 kb | Shareware Go to category: Development > Other Similar programs | |||
143. | Licence Protector 2.4 (mirage-systems.de) | ||
You have developed an application and you want to protect it fast, easy, reliable and cost effective? Licence Protector from Mirage Computer Systems administrates licences and modules (license manager and control), generates Demo- and time limited versions (trial versions), provides you with software copy | |||
Updated: 2, 2006 | Rating: 0 | Author: Mirage Sales | Size: 14806 kb | Shareware Go to category: Development > Management & Distribution Similar programs | |||
144. | Lucigenic Crypt 4.4 (lucigenic.com) | ||
self-contained component that does not require any run-times for it's operation. The component is thread-safe and highly scalable. The component comes bundled with extensive sample source code. A .Net assembly is included for the component. Crypt can be used with all scripts and languages that are COM aware. Advanced cryptographic COM component that implements the Blowfish | |||
Updated: 3, 2005 | Rating: 0 | Size: 1800 kb | Shareware Go to category: Development > Other Similar programs | |||
145. | Lucigenic TCP 2.1 (lucigenic.com) | ||
small footprint component that does not require any runtimes for it's operation. You can easily add Internet capabilities to applications written in just about any development system, including C++, VB, ASP, Pearl, Delphi, Visual FoxPro, PowerBuilder, Access, and so on. Lucigenic TCP/IP is thread | |||
Updated: 3, 2005 | Rating: 0 | Size: 1750 kb | Shareware Go to category: Development > Components & Libraries Similar programs | |||
146. | MDBSecure 1.1.0 (mindwarp-consultancy-software.com) | ||
What is MDBSecure? An MS Access Security utility, providing protection for your databases. MDBSecure follows the recommended approach to securing Microsoft® Access databases, it will encrypt your access database and remove security weaknesses. Although nothing is ever 100% secure in computing, following this | |||
Updated: 9, 2005 | Rating: 82 | Author: Julian Moorhouse | Size: 1062 kb | Shareware Go to category: Development > Other Similar programs | |||
147. | MenuXP 1.0 (download.componentspot.com) | ||
CMenuXP is a small set of MFC classes that allow developers to add various graphical user interface elements with an Office XP look to their MFC apps. What this means is that developers can add the flat, non-3D, “water-color” UI controls that were first introduced in Office XP to their MFC applications | |||
Updated: 9, 2005 | Rating: 0 | Author: Component Spot | Size: 811 kb | Freeware Go to category: Development > Active X Similar programs | |||
148. | IDAutomation MICR Font Advantage 4.9 (bizfonts.com) | ||
Our MICR E-13B Font Advantage Package is much more then a few MICR fonts. This package includes: (1) several versions of the MICR fonts for proper alignment with your printer, (2) MICR print specifications documentation, (3) Security Fonts for printing secure names and amounts plus (4) a Visual Basic source | |||
Updated: 9, 2005 | Rating: 0 | Author: Technical Support | Size: 2398 kb | Demo Go to category: System Utilities > Other Similar programs | |||
149. | MoleBox Pro 2.5.5 (molebox.com) | ||
MoleBox Pro is runtime packer for Windows applications. It packages the application and all of its supplementary files into a single efficient executable file, which runs without extracting packed files to the hard drive. With MoleBox Pro you can protect your data files from viewing and modifications, and | |||
Updated: 2, 2006 | Rating: 52 | Author: Olga Marchevska | Size: 946 kb | Shareware Go to category: Development > Management & Distribution Similar programs | |||
150. | OpenSSL 0.9.7c (download.componentspot.com) | ||
the Advanced Encryption Standard, or AES, algorithm of the U.S. government), IDEA, DES, 3DES, RC2, RC4, and Blowfish. The asymmetric, or private/public key, encryption algorithms include RSA, DSA, and Diffie-Hellman. Also included are message digest algorithms such as MD2, MD5, MDC2, and SHA, whose resulting hashes can be used by digital signature schemes to digitally sign | |||
Updated: 9, 2005 | Rating: 0 | Author: Component Spot | Size: 2879 kb | Freeware Go to category: Development > C / C++ / C-sharp Similar programs | |||
|
Home > Sectors software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|