|
||||||
|
||
|
Home > Secure information software |
|
|
281. | Citation 3.15.14 (radsoftware.org) | ||
that is specifically designed to enter and maintain traffic citation information into a database in an efficient, secure, and effective medium that is never lost, misfiled, or mishandled. Further, Citation has powerful searching tools that let you find any one citation instantly, or assemble a sub-list of citations that have some common element(s) that you define | |||
Updated: 2, 2006 | Rating: 0 | Author: Rad Software | Size: 1163 kb | Commercial Go to category: System Utilities > Shell Tools Similar programs | |||
282. | Import Wizard 8.2.0 (beside.com) | ||
and footers. The software will prove to be very useful to import information from web transactions, mainframe, non-windows based, or secured systems. The imported information can be manipulated as a table in the database into which it was imported. How does it work? Ninety-nine percent of software systems have a provision to print reports to a printer spool file instead | |||
Updated: 9, 2005 | Rating: 0 | Size: 1700 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
283. | StrongDisk Pro 3.0 (strongdisk.com) | ||
StrongDisk Pro protects sensitive data on your notebook or PC. It creates virtual encrypted disks, which work as common disks. All content of these disks is encrypting on-the-fly with strong crypto-algorithms. To mount disk a password and an external key is required. Any files, documents and databases can be | |||
Updated: 9, 2005 | Rating: 0 | Size: 1914 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
284. | Citation 3.15.14 (padfile.radsoftware.org) | ||
that is specifically designed to enter and maintain traffic citation information into a database in an efficient, secure, and effective medium that is never lost, misfiled, or mishandled. Further, Citation has powerful searching tools that let you find any one citation instantly, or assemble a sub-list of citations that have some common element(s) that you define | |||
Updated: 2, 2006 | Rating: 0 | Author: Rad Software | Size: 1163 kb | Commercial Go to category: System Utilities > Shell Tools Similar programs | |||
285. | wodSSH 2.3.7.0 (weonlydo.com) | ||
wodSSH does even more: it allows you to communicate encrypted (and secured, of course) with SSH1 and SSH2 (secure-shell) servers, as well as any other non-encrypted server (such as SMTP or POP3). For ones that don't know - the SSH transport layer is a secure low level transport protocol. It provides strong encryption, cryptographic host authentication, and integrity | |||
Updated: 2, 2006 | Rating: 42 | Author: Kresimir Petric | Size: 1231 kb | Shareware Go to category: Network & Internet > Remote Computing Similar programs | |||
286. | wodSSHServer 1.3.0.0 (weonlydo.com) | ||
start some program of their choice use internally provided SFTP (secure ftp) server, or open port forwarding for other programs All of this, of course, can be adjusted by your needs. By default, server will not allow anyone to login unless you specify so (using LoginPassword event that is fired when someone wants to login to your server). Once connected, you will get the | |||
Updated: 2, 2006 | Rating: 0 | Author: Kresimir Petric | Size: 1368 kb | Shareware Go to category: Servers > Telnet Servers Similar programs | |||
287. | wodSSHTunnel 1.5.0.0 (weonlydo.com) | ||
component is server-type component that will add secure tunneling (based on SSH protocol) capabilities to your application. Based on your rules and definitions, it will accept local connections, encrypt it and forward to SSH server (where they will be decrypted and sent to destination host). SSH server is required for this component to work - encryption will take place between | |||
Updated: 2, 2006 | Rating: 42 | Author: Kresimir Petric | Size: 1317 kb | Shareware Go to category: Servers > Telnet Servers Similar programs | |||
288. | wodSSH.NET 2.1.9.0 (weonlydo.com) | ||
console-type services. It allows you to communicate encrypted (and secured, of course) with SSH1 and SSH2 (secure-shell) servers, as well to Telnet servers (using Telnet protocol that is NOT encrypted). For ones that don't know - the SSH transport layer is a secure low level transport | |||
Updated: 2, 2006 | Rating: 0 | Author: Kresimir Petric | Size: 1076 kb | Shareware Go to category: Servers > Telnet Servers Similar programs | |||
289. | wodSFTP 3.0.0.0 (weonlydo.com) | ||
Secure File Transfer Protocol (SFTP Client) provides secure file transfer functionality over any reliable data stream, SSH in this case. It is the standard file transfer protocol for use with the SSH2 protocol. wodSFTP component implements client side of this protocol which is reliable and easy to use. SFTP protocol is designed to provide primarily file transfer, but also | |||
Updated: 2, 2006 | Rating: 0 | Author: Kresimir Petric | Size: 1261 kb | Shareware Go to category: Network & Internet > FTP Clients Similar programs | |||
290. | wodSFTP.NET 2.1.1.0 (weonlydo.com) | ||
Secure File Transfer Protocol provides secure file transfer functionality over any reliable data stream, SSH in this case. It is the standard file transfer protocol for use with the SSH2 protocol. wodSFTP.NET is a dotnet implemenation of client side of this protocol which is reliable and easy to use. SFTP protocol is designed to provide primarily file transfer, but also | |||
Updated: 2, 2006 | Rating: 0 | Author: Kresimir Petric | Size: 959 kb | Shareware Go to category: Network & Internet > FTP Clients Similar programs | |||
|
Home > Secure information software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|