|
||||||
|
||
|
Home > Registration key software |
|
|
21. | AntiCrack Software Protector Basic 1.09 (anticrack.us) | ||
dll files step by step. AntiCrack Software Protector uses public keys encryption algorithms (RSA) to create and verify the registration keys and unlock some RSA key locked code,it has embedded cryptor against dump and unpacker. AntiCrack Software Protector also has many anti debug tricks.with specialized API system, mutual communication between loader and | |||
Updated: 9, 2005 | Rating: 535 | Author: Lusi Chen | Size: 1429 kb | Shareware Go to category: Development > Other Similar programs | |||
22. | AWinstall 4.0.2 (awinstall.com) | ||
to find very handy. These include creating dynamic folders, COM registration actions (DLL In-Proc servers, Type Libraries, Windows NT Services), own compression algorithm superior to ZIP, option to add own graphics to installation windows as well as multiple integration option with ActiveX and VBScript/JScript. Modern user interface, help system and wizards will allow you to create | |||
Updated: 2, 2006 | Rating: 84 | Author: Vitaly Brusentsev | Size: 1841 kb | Shareware Go to category: Development > Install & Setup Similar programs | |||
23. | ClearImage Repair 5.3 (inliteresearch.com) | ||
high quality images that support further data capture via OCR, or Key From Image. Setup the batch process and let the software determine what needs to be done and to what degree. ClearImage Repair is a comprehensive software tool for windows, used by professional imaging application vendors, that executes the following operations in an automatic manner, without operator | |||
Updated: 9, 2005 | Rating: 728 | Author: Michael Salzman | Size: 4500 kb | Commercial Go to category: Development > Basic / VB / VB DotNet Similar programs | |||
24. | Code-Lock 2.35 (chosenbytes.com) | ||
mainly because they use weak protection schemes. Most rely on Registration Codes that can be cracked by experienced crackers. Other protection schemes might include time checks or key files. But most shareware are, in effect, Registered versions and once the cracker patches the correct places, the shareware will behave as Registered version. The better form of protection | |||
Updated: 9, 2005 | Rating: 16 | Author: Ryan Thian | Size: 2721 kb | Demo Go to category: Development > Management & Distribution Similar programs | |||
25. | EXECryptor 2.3.7 (softcomplete.com) | ||
can be easily changed or combined EXECryptor contains flexible registration and license management system providing application with short serial numbers (12-16 characters). A serial number can be time-limited, may be locked to Hardware ID, can contain encrypted registration information such as license type, allowed features and other user defined information. It supports | |||
Updated: 2, 2006 | Rating: 140 | Author: Alex Sergeev | Size: 2865 kb | Shareware Go to category: Development > Management & Distribution Similar programs | |||
26. | HardKey License Manager 3.2 (softcomplete.com) | ||
and powerfull license manager and work with short (15-25 chars) keys. Program based on strong asymetric (public keys) cryptography. HardKey Base Features : - Short registration key (by example: "29UD4-3K6GH-VE5SX-ZA7EK") - Key may contain following optional fields: - Hardware ID - Expiry Date It allows to create temporarily operating | |||
Updated: 9, 2005 | Rating: 536 | Size: 8054 kb | Shareware Go to category: Development > Management & Distribution Similar programs | |||
27. | KeyedAccess for MS Access 2.0 (peterssoftware.com) | ||
that allows you to generate and validate 16 digit Reg ID/Product Keys, or to generate an installation-specific Serial Number on the end-user's computer which can be unlocked with a corresponding Unlock Code. Using KeyedAccess means you can create shareware-type versions of your MS Access application where some functionality is locked and is only unlocked when the user enters a | |||
Updated: 9, 2005 | Rating: 0 | Author: Peter De Baets | Size: 774 kb | Demo Go to category: Development > Other Similar programs | |||
28. | MSCCrypto for Linux 2.0 (miraplacid.com) | ||
of the best encryption and hashing algorithms: - RSA public key algorithm (512/1024/2048 bits key size) - AES symmetric block algorithm (128/192/256 bits key size) - Blowfish symmetric block algorithm (64 to 448 bits key size) - Cast5 (Cast 128) symmetric block algorithm (128 bits key size) - TripleDES symmetric block algorithm (192 bits | |||
Updated: 9, 2005 | Rating: 0 | Author: Miraplacid Software Development | Size: 225 kb | Shareware Go to category: Web Development > ASP & PHP Similar programs | |||
29. | PELock 1.06 (pelock.pac.pl) | ||
creation of application of evaluation-demo type, which use license key system. PELock features: • compression of the application (code, imports, resources), it's possible to decrease executable size even 70% of original file • encryption of code (publicly available cryptographic | |||
Updated: 9, 2005 | Rating: 0 | Author: Bartosz Wójcik | Size: 422 kb | Demo Go to category: Development > Other Similar programs | |||
30. | ProxyDesigner 1.0.1 (proxysource.com) | ||
designs and download those designs which may be of interest. Key benefits include: 1) Create graphical software designs using built-in catalogs of modeling language notations, patterns, and designs, 2)Create catalogs of custom symbols and notations, 3) Easy to use and learn user interface, 4) Extensive built-in formatting, alignment, and layout functions, 5) Full hard-copy | |||
Updated: 9, 2005 | Rating: 200 | Author: Vince D'Onofrio | Size: 2147 kb | Freeware Go to category: Education > Teaching & Training Tools Similar programs | |||
|
Home > Registration key software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|