|
||||||
|
||
|
Home > Business applications software |
Related keywords: business, Business, applications, small business, business plan, Small Business, business software, business card, mail order business, e business |
|
|
301. | ICE License 2.01 (aidsoft.com) | ||
the power of Elliptic Curvesl Asymmetric Encryption to protect your application. Elliptic Curves encryption system allow transmission of secret information over an open channel without a common secret key previously shared between the ends.ICE License Features : * Antidebugging & Antimonitors Protection (protect against Code Tracing) * Sophisticated Asymmetric Encryption Technology | |||
Updated: 9, 2005 | Rating: 0 | Author: Bruno Branciforti | Size: 439 kb | Shareware Go to category: Development > Delphi Similar programs | |||
302. | IDAutomation Interleaved 2 of 5 Font Advantage 4.9 (bizfonts.com) | ||
macros and source code to help you integrate the fonts into your application. Complies to AIM USS, ANSI and European (CEN) standards. Includes examples for Microsoft® Word, Excel, Access and Crystal Reports. Note: This demo version contains a watermark in the upper portion of the barcode. For testing purposes, a successful scan can be obtained by scanning the lower 25% of the barcode | |||
Updated: 9, 2005 | Rating: 16 | Author: Brant Anderson | Size: 1714 kb | Demo Go to category: Development > Other Similar programs | |||
303. | Janino 2.3.18 (janino.net) | ||
I don't like the idea of carrying around huge libraries for simple applications. See Parser for the list of implemented and missing language features. When do you need an efficient expression evaluator? Say you build an e-commerce system, which computes the shipping cost for the items that the user | |||
Updated: 2, 2006 | Rating: 197 | Author: Arno Unkrig | Size: 104 kb | Freeware Go to category: Development > Other Similar programs | |||
304. | JNIWrapper 3.1 (jniwrapper.com) | ||
Access to Windows Registry; - Windows Decoration; - Tray icon for application, balloon tips. JNIWrapper eliminates difficulties in working with the native code from Java programs using standard JNI approach. With JNIWrapper there is no need to create native libraries to call a function of the operating system API or a function from a | |||
Updated: 2, 2006 | Rating: 63 | Author: JNIWrapper Team | Size: 3601 kb | Commercial Go to category: Development > Components & Libraries Similar programs | |||
305. | KeyedAccess for MS Access 2.0 (peterssoftware.com) | ||
to generate an installation-specific Serial Number on the end-user's computer which can be unlocked with a corresponding Unlock Code. Using KeyedAccess means you can create shareware-type versions of your MS Access application where some functionality is locked and is only unlocked when the user enters a valid key. When using the Installation Serial Number and Unlock Code | |||
Updated: 9, 2005 | Rating: 0 | Author: Peter De Baets | Size: 774 kb | Demo Go to category: Development > Other Similar programs | |||
306. | LASsie (Light Application Security) for MS Access 4.3 (peterssoftware.com) | ||
(Light Application Security) is a Microsoft Access Add-In that enhances your Access application with a simplified user security system. Intended as an alternative to Access’ built-in security, LASsie offers a less complicated way to secure forms, reports, controls and certain records from unauthorized user access. With LASsie, you can prevent a user from opening specific | |||
Updated: 9, 2005 | Rating: 0 | Author: Peter De Baets | Size: 770 kb | Shareware Go to category: Development > Other Similar programs | |||
307. | Leap SE 3.0 (leapse.com) | ||
flexible composition. Every time a new requirement is saved, Leap SE's object model database is updated to reflect the new entities, relationships, attributes and methods. From this database, a directory of header files can be generated at any time to give software engineering a much-needed head start | |||
Updated: 9, 2005 | Rating: 0 | Author: Brian Smith | Size: 3936 kb | Commercial Go to category: System Utilities > Other Similar programs | |||
308. | Licence Protector 2.4 (mirage-systems.de) | ||
have developed an application and you want to protect it fast, easy, reliable and cost effective? Licence Protector from Mirage Computer Systems administrates licences and modules (license manager and control), generates Demo- and time limited versions (trial versions), provides you with software copy protection and supports concurrent user (floating license) testing. Automatic | |||
Updated: 2, 2006 | Rating: 0 | Author: Mirage Sales | Size: 14806 kb | Shareware Go to category: Development > Management & Distribution Similar programs | |||
309. | Lucigenic DNS 1.1 (lucigenic.com) | ||
component packaged as a COM server. Lucigenic DNS provides a simple application interface for domain name server lookups. Synchronous as well as asynchronous queries are supported. The component has a scalable event driven architecture. Lucigenic DNS supports the concurrent creation of an arbitrarily large number of query sessions. Queries are persisted to an in-memory database and | |||
Updated: 3, 2005 | Rating: 0 | Size: 1300 kb | Shareware Go to category: Development > Other Similar programs | |||
310. | MakeCDROM 4.3 (killersoftware.com) | ||
is a FREE application to help you create a fully cusomizable front end menu program that can also be launched from a CDROM. The easy interface guides you through the steps to create hotspots. (a location and action when you mouse over an image) Using the FREE version of MakeCDROM you can create up to 3 hotspots. MakeCDROM is a FREE application to help you create a fully | |||
Updated: 3, 2005 | Rating: 16 | Author: Rob Zino | Size: 1 kb | Shareware Go to category: Business > Other Similar programs | |||
|
Home > Business applications software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|