|
||||||
|
||
|
Home > Visitations software |
|
|
221. | SecureCode 2.0 (aidsoft.com) | ||
registration scheme.The security is internal at your software, it's an advantage for your application to prevent against generic crack. The SecureCode Protection is a based on 2 methods : Runtime Encryption or Runtime Extraction block code, this is a part of your code which will be executed when you insert a good key only else your code cannot be executed (e.g : you can protect | |||
Updated: 9, 2005 | Rating: 16 | Author: Bruno Branciforti | Size: 830 kb | Shareware Go to category: Development > Delphi Similar programs | |||
222. | SecureCode Protection 1.0.2 (aidsoft.com) | ||
SecureCode is a new software protection based on the lastest techniques protection to provide a strong security to protect your software against reverse engineering and illegal copying, confidence that people can only run your application on your terms.SecureCode is not trial protection or registration | |||
Updated: 9, 2005 | Rating: 0 | Author: Bruno Branciforti | Size: 350 kb | Shareware Go to category: Development > Other Similar programs | |||
223. | Selector for MS Access 2000 2000.3.1 (peterssoftware.com) | ||
SELECTOR is a configurable, multi-purpose record / value selection form that can be used in your Microsoft Access application to select a record prior to opening a form, or return a value for insertion into a text or combo box. SELECTOR is one Microsoft Access form that can be configured in different ways | |||
Updated: 9, 2005 | Rating: 0 | Author: Peter De Baets | Size: 780 kb | Shareware Go to category: Development > Other Similar programs | |||
224. | Selector for MS Access 2002 2002.3.1 (peterssoftware.com) | ||
SELECTOR is a configurable, multi-purpose record / value selection form that can be used in your Microsoft Access application to select a record prior to opening a form, or return a value for insertion into a text or combo box. SELECTOR is one Microsoft Access form that can be configured in different ways | |||
Updated: 9, 2005 | Rating: 0 | Author: Peter De Baets | Size: 828 kb | Shareware Go to category: Development > Other Similar programs | |||
225. | Selector for MS Access 97 97.3.6 (peterssoftware.com) | ||
SELECTOR is a configurable, multi-purpose record / value selection form that can be used in your Microsoft Access application to select a record prior to opening a form, or return a value for insertion into a text or combo box. SELECTOR is one Microsoft Access form that can be configured in different ways | |||
Updated: 9, 2005 | Rating: 0 | Author: Peter De Baets | Size: 687 kb | Shareware Go to category: Development > Other Similar programs | |||
226. | ShareGuard Copy Protection 3.6 (zappersoftware.com) | ||
is unlocked. (3) Locksmith Program allows YOU use to build your lock(s) and key(s). Many different options to allow customization of your methodology. You can build AND TEST (with your application even), a working lock and key within SECONDS without reading the manual. ShareGuard Locksmith generates message notifying you of possible problems, generates test code and code (C++ | |||
Updated: 9, 2005 | Rating: 0 | Author: William Bradshaw | Size: 11474 kb | Shareware Go to category: Development > Other Similar programs | |||
227. | ShareGuard V1 1 (zappersoftware.com) | ||
is unlocked. (3) Locksmith Program allows YOU use to build your lock(s) and key(s). Many different options to allow customization of your methodology. You can build AND TEST (with your application even), a working lock and key within SECONDS without reading the manual. ShareGuard Locksmith generates message notifying you of possible problems, generates test code and code (C++ | |||
Updated: 9, 2005 | Rating: 0 | Author: William Bradshaw | Size: 2490 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
228. | SignetSure 1.0 (SignetSure.com) | ||
to your subscribers. You have installed a program on the subscriber's machine that receives your files. This program must be able to authenticate files even against a hacker who has reverse-engineered your program. Scenario Two: You distribute registered software with a datafile that identifies | |||
Updated: 9, 2005 | Rating: 0 | Author: Jim Serwer | Size: 696 kb | Shareware Go to category: Development > Delphi Similar programs | |||
229. | Code Visual to Flow chart 3.5 (fatesoft.com) | ||
Code Visual to Flowchart is a program Flow chart generator for code flowcharting and visualization.It can perform automated reverse engineering of program code into programming flowcharts , help programmers to document,visualize and understand source code. Its Documentation Generator supports Visio, Word, It can reverse engineering a program , create programming flowchart from code, mostly used on flowcharting a program and documenting source code | |||
Updated: 2, 2006 | Rating: 748 | Author: fatesoft fatesoft | Size: 1208 kb | Shareware Go to category: Development > Other Similar programs | |||
230. | Spices.Net 4.5.6 (9rays.net) | ||
and reverse engineering .Net assemblies! Programming in Microsoft's .NET Framework gives additional horizons in realization of various ideas with an extensive set of features. Altogether with these powerful capabilities one major drawback is now also a reality: decompilation to Microsoft | |||
Updated: 2, 2006 | Rating: 133 | Author: Victor Victorov | Size: 2357 kb | Commercial Go to category: Development > Basic / VB / VB DotNet Similar programs | |||
|
Home > Visitations software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|