|
||||||
|
||
|
Home > Lock computer software |
Related keywords: computer, lock, computer security, computer game, Computer, computer software, computer backup, lock folder, computer games, lock files |
|
|
11. | TurboNote 3.4 (turbonote.com) | ||
change note colours and sizes, have them ring alarms, print them, lock them and keep your screen uncluttered by hiding them. Notes even stay around when you turn your computer off. TurboNote's Quick Launch feature also lets you open Web addresses, programs and files which appear in notes, simply by double-clicking. Network support suits organisation-wide deployment and | |||
Updated: 9, 2005 | Rating: 1234 | Author: Peter Hyde | Size: 542 kb | Freeware Go to category: Business > Other Similar programs | |||
12. | TurboNote+ desktop sticky notes v6.0 (turbonote.com) | ||
Web and email addresses. Change note colors and sizes, set alarms, lock them and keep your screen uncluttered by hiding them. Use handy templates for common messages or make up your own style with optional rich text editing, transparency control and images. TurboNotes stay around when you turn your computer off, and are automatically backed up. TurboNote+'s Quick Launch | |||
Updated: 2, 2006 | Rating: 173 | Author: Vicki Hyde | Size: 1616 kb | Shareware Go to category: Business > Other Similar programs | |||
13. | 1Way 5.5 (atma-software.com) | ||
into time-limited shareware. A function library offering a flexible locking system with solid encryption. Generate serial numbers to register your application. Test program included. Easy to implement. Support for VB, C++, Delphi, other languages. AES (Rijndael) 256 bit encryption. Convert any | |||
Updated: 9, 2005 | Rating: 735 | Author: Mark Snegg | Size: 1787 kb | Shareware Go to category: Development > Components & Libraries Similar programs | |||
14. | Amirus Mirror Memory 1.4.40 (CitrusControls.com) | ||
of memory; the full license supports 64Mbyes. Both connect 32 computer systems in a single data network. Multicast techniques and a sophisticated data exchange protocol minimizes the probability of data collision, allowing the system to deliver deterministic performance on Ethernet or wireless networks. Fault-tolerance is built-in, with a multiple-node caching algorithm designed | |||
Updated: 9, 2005 | Rating: 24 | Author: Tony Cox | Size: 9454 kb | Shareware Go to category: Development > Other Similar programs | |||
15. | Code-Lock 2.35 (chosenbytes.com) | ||
pirates? Stop using your obsolete software protections. Code-Lock, an advanced, secure software protection system, will stop crackers in their tracks. Code-Lock, featuring CodeSecure Technology for Visual Basic, C#, VB.NET and Delphi applications, has never been cracked. It is time to keep crackers awake while you sleep in peace. A lot of shareware are cracked by | |||
Updated: 9, 2005 | Rating: 16 | Author: Ryan Thian | Size: 2721 kb | Demo Go to category: Development > Management & Distribution Similar programs | |||
16. | Codelock 2.0 (codelock.co.nz) | ||
HTML scripts. Codelock V2.0 works by encrypting your entire PHP page(s) (including HTML and Javascript). You simply browse your computer harddrive for your file(s) or specify your server path. Then, enter your options through the 2-step wizard. When you're ready, simply click on | |||
Updated: 9, 2005 | Rating: 101 | Author: Vince Edwards | Size: 279 kb | Demo Go to category: Development > Other Similar programs | |||
17. | Flash Editor 1.00 (colorpilot.com) | ||
into the Flash environment has considerably enhanced the program's capabilities and now Flash is not just a tool for developing the online web content. Macromedia Flash enjoys wide popularity with developers of the colorful presentations and computer games, as it noticeably facilitates the graphical design in comparison with the traditional applications development tools | |||
Updated: 3, 2005 | Rating: 12666 | Author: Ruben Gurgian | Size: 486 kb | Demo Go to category: Development > Other Similar programs | |||
18. | KeyedAccess for MS Access 2.0 (peterssoftware.com) | ||
to generate an installation-specific Serial Number on the end-user's computer which can be unlocked with a corresponding Unlock Code. Using KeyedAccess means you can create shareware-type versions of your MS Access application where some functionality is locked and is only unlocked when the user enters a valid key. When using the Installation Serial Number and Unlock | |||
Updated: 9, 2005 | Rating: 0 | Author: Peter De Baets | Size: 774 kb | Demo Go to category: Development > Other Similar programs | |||
19. | LLLib Licensing Library 2.04 (gppsoftware.com) | ||
product numbers, registration numbers, number of concurrent users, locking to a machine and remote registration and unlocking. To date, software products protected by LLLIB have not been cracked by crackers! LLLIB is a library for protecting and controlling the use of your software. Increase registrations by limiting your software to encourage people to register! No longer do you | |||
Updated: 9, 2005 | Rating: 0 | Author: Graham Plowman | Size: 1856 kb | Shareware Go to category: Development > Components & Libraries Similar programs | |||
20. | PC Guard for Win32 5.00 (sofpro.com) | ||
protection! Protect your software from illegal copying from one computer to another. - Simple and effective protection procedure! No need for additional programming. Source code is not required. - Application encryption! Protect your software from reverse engineering and analyzing. - Application password protection! Protect access to your application (EXE/DLL) with | |||
Updated: 9, 2005 | Rating: 48 | Author: Blagoje Ceklic | Size: 841 kb | Commercial Go to category: Development > Management & Distribution Similar programs | |||
|
Home > Lock computer software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|