|
||||||
|
||
|
Home > Verify security software |
Related keywords: security, Security, computer security, internet security, verify, security software, information security, SECURITY, file security, windows security |
|
|
11. | LASsie (Light Application Security) for MS Access 4.3 (peterssoftware.com) | ||
(Light Application Security) is a Microsoft Access Add-In that enhances your Access application with a simplified user security system. Intended as an alternative to Access’ built-in security, LASsie offers a less complicated way to secure forms, reports, controls and certain records from unauthorized user access. With LASsie, you can prevent a user from opening | |||
Updated: 9, 2005 | Rating: 0 | Author: Peter De Baets | Size: 770 kb | Shareware Go to category: Development > Other Similar programs | |||
12. | NTSet 1.14 (sam-solutions.net) | ||
- Assign access rights for files on NTFS; - Configure registry security settings; - Control the privileges given to the users; - Verify users'credentials against Windows NT Domain; - Retrieve and set a variety of setting for network computers; - Send messages over the network to a remote computer; - Browse network resources and connected devices; - Monitor terminal | |||
Updated: 9, 2005 | Rating: 0 | Author: SaM Solutions | Size: 1196 kb | Shareware Go to category: Development > Delphi Similar programs | |||
13. | OpenSSL 0.9.7c (download.componentspot.com) | ||
take advantage of Secure Sockets Layer (SSL v2/v3), Transport Layer Security (TLS v1). The Open SSL library uses the included full-strength general-purpose cryptography library, which can be used by itself. Security features such as the following can be implemented: · Data integrity: An | |||
Updated: 9, 2005 | Rating: 0 | Author: Component Spot | Size: 2879 kb | Freeware Go to category: Development > C / C++ / C-sharp Similar programs | |||
14. | PELock 1.06 (pelock.pac.pl) | ||
between application and license key system • creation and verification of registration keys using public keys encryption algorithms (RSA) • ability to create trial keys and hardware dependent keys • keeping of the database and checkup of "stolen" (illegal) registration keys • ready to use samples of license key system in C/C++/Delphi • user-friendly interface • many | |||
Updated: 9, 2005 | Rating: 0 | Author: Bartosz Wójcik | Size: 422 kb | Demo Go to category: Development > Other Similar programs | |||
15. | Retirement Investment Required + 1.2 (benttreesoftware.com) | ||
under Win 95, 98, Me, NT4, XP, & 2000. Have you called the Social Security Hotline (1-800-772-1213) to verify your estimated monthly SS benefit so that you can evaluate the monthly shortfall you may experience? This program calculates the amount of money required to provide a given monthly income at retirement with or without withdrawing capital, which, when added to your | |||
Updated: 9, 2005 | Rating: 0 | Author: Carl Hooper | Size: 1212 kb | Shareware Go to category: Home & Hobby > Other Similar programs | |||
16. | Advanced Administrative Tools 5.92 (glocksoft.com) | ||
you been port scanned lately? Completely ignoring network security is not smart and ignorance isn't exactly bliss. If you access the Internet via a cable modem, DSL, or even a dial-up connection, someone is always knocking on your virtual front door, giving your system the once-over. Protect your data, privacy and valuable computer system with AA Tools. AATools investigates and | |||
Updated: 2, 2006 | Rating: 173 | Author: Alex Markov | Size: 3087 kb | Shareware Go to category: Network & Internet > Network Monitoring Similar programs | |||
17. | All in One SECRETMAKER 4.2.1 (secretmaker.com) | ||
Secretmaker combines several tools: a security watchdog, a intruder blocker, a spam fighter, a pop-up blocker, a banner blocker, a movie blocker, a privacy protector, history cleaners, a worm hunter and a cookie eraser. Security Watchdog recognizes malicious "mysteryware" and parasites that may assault your computer. Intruder blocker protects from Spyware, Trackware and | |||
Updated: 2, 2006 | Rating: 264 | Author: secretmaker team | Size: 1249 kb | Freeware Go to category: Security & Privacy > Anti-Spam & Anti-Spy Tools Similar programs | |||
18. | ASP/PHP Web Application Builder 7.01 (citybusinesslogic.com) | ||
for dates, and can lookup relational data in other tables. The security wizard lets you decide which user(s) have access to which tables/fields. For example, you may wish to allow anonymous users to search your product table, but you wouldn't want them to see the trade price, nor add/edit records. Customers may need to be allowed to update their own record, but not that of other | |||
Updated: 2, 2006 | Rating: 366 | Author: Development Manager | Size: 3803 kb | Shareware Go to category: Web Development > ASP & PHP Similar programs | |||
19. | EGuest PRO 4.1 (esoftpro.com) | ||
on the popular guestbook system EGuest. New features including Image Verification Code, Admin Interfaces, Theme, 250+ Emoticons, Advanced Search with Highlight, Auto Web/Email Links, IP/Word Banning, Blank Line Protection and much more. It excels other guestbook scripts, allowing you to have a truly | |||
Updated: 2, 2006 | Rating: 0 | Author: Eric Leung | Size: 313 kb | Shareware Go to category: Network & Internet > Other Similar programs | |||
20. | GetAnonymous 1.2 (getanonymous.com) | ||
Explorer. Now you can work within one environment with all the security options in vision. GetAnonymous is definitely the most Inclusive online privacy Software, at the lowest price available in the market. *You get the advantage of staying Anonymous when chatting Online on MSN GetAnonymous is the NEW technology offering a comprehensive online privacy service ,With GetAnonymous you | |||
Updated: 9, 2005 | Rating: 42 | Author: David Adreson | Size: 5996 kb | Shareware Go to category: Network & Internet > Other Similar programs | |||
|
Home > Verify security software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|