|
||||||
|
||
|
Home > Important files software |
Related keywords: files, hide files, Files, PDF files, compare files, protect files, duplicate files, delete files, recover files, multiple files |
|
|
361. | SignetSure 1.0 (SignetSure.com) | ||
use SignetSure to sign files and authenticate those files. You create a digital signature at development time. Your application authenticates the file while running on your customer´s computer. Consider the following two scenarios. Scenario One: You push-publish programs and data over the Internet. Disaster would strike if hackers could impersonate you and | |||
Updated: 9, 2005 | Rating: 0 | Author: Jim Serwer | Size: 696 kb | Shareware Go to category: Development > Delphi Similar programs | |||
362. | Enterprise Java Application Server 2.1 (essencomp.com) | ||
Server (EJAS) offers you: Automatic Persistence (Database and File Access), Automatic Declarative Transaction Models, Client Authentication and Access Control at the Method Level, Resource Management for Threads, Network, and Database Connections, Bean Caching, Bean Life-Cycle Management for Creating, Finding, and Destroying Beans, Concurrency Control, External Configuration of | |||
Updated: 9, 2005 | Rating: 0 | Author: Apurva Parekh | Size: 17149 kb | Commercial Go to category: Web Development > Java & JavaScript Similar programs | |||
363. | Cryptocx v5 5.1.6 (easybyte.com) | ||
a very easy to use bundle. Data security is becoming more and more important, with developers wanting to add secure data encryption facilities to their programs and web sites. The versatility of Cryptocx, combined with the fastest file encryption available anywhere, full PGP support and the | |||
Updated: 9, 2005 | Rating: 39 | Author: EasyByte Software | Size: 4099 kb | Demo Go to category: Development > Active X Similar programs | |||
364. | CT Messenger 2.0 (ivrsoft.com) | ||
COM objects that enable a Windows or Web application to bring important information to its users in the form of text pages, phone calls or SMS messages via any TAPI compliant hardware including a voice modem or telephony card. Unlike other programs of this type, CT Messenger uses software DSP algorithms for detecting the type of response (busy, no answer, voice answer). CT | |||
Updated: 9, 2005 | Rating: 0 | Author: IVR Software | Size: 6603 kb | Shareware Go to category: Development > Other Similar programs | |||
365. | ACProtect standard 1.20 (ultraprotect.com) | ||
is an application that allows you to protect Windows executable files(PE files) against piracy. Using public keys encryption algorithms (RSA) to create and verify the registration keys and unlock some RSA key locked code. It has an Embedded Protector against file dumping and unpackers. It also has many anti-debug tricks with specialized API system. Mutual communication | |||
Updated: 9, 2005 | Rating: 152 | Author: risco software | Size: 1604 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
366. | Affiliate Creator 1.0 (affiliate-creator.com) | ||
Why use Affiliate Creator? - Save time and concentrate on the important thing. Affiliate Creator helps you create custom builds quickly. All you need to do is adding 3 or 4 lines of code to your application and clicking the Build button on Affiliate Creator. - Save web traffic and money. With Affiliate Creator, you can build Self-Creator for your affiliates to build | |||
Updated: 9, 2005 | Rating: 0 | Author: James Dong | Size: 1850 kb | Shareware Go to category: Development > Install & Setup Similar programs | |||
367. | Aurigma Graphics Mill 2.0 (aurigma.com) | ||
Mill 2.0 is a "must have" imaging component. It supplies the most important features: load/save popular formats, apply effects, draw text/shapes, use color management, etc. It provides a solid basis to build professional imaging software. When other imaging component vendors left ActiveX platform and focused on .NET market, Aurigma decided that it is too early to drop the ActiveX | |||
Updated: 9, 2005 | Rating: 16 | Author: Fedor Skvortsov | Size: 5386 kb | Shareware Go to category: Development > Other Similar programs | |||
368. | Task Manager for Excel 2.0 (djicomputer.com) | ||
It is completely compatible with Excel 2000/XP and higher. It's ideal for keeping track of all your tasks and projects, or you can use it as your Personal Information Manager. It will operate invisibly in the background to remind you of all your important tasks. This version (2.0) is an upgrade of version 1.x and provides several new features and interface enhancements as | |||
Updated: 9, 2005 | Rating: 165 | Author: Daniel Ireland | Size: 445 kb | Shareware Go to category: Business > Other Similar programs | |||
369. | Task Plus Professional 4.3.0 (contactplus.com) | ||
private flag, rich text format notes, alarms, completion notes, file attachments and assignees. Additionally, the task note may contain embedded websites and e-mail addresses so you or others can access a website contained within the note by a single click. Individual holidays/vacations are noted on the calendar and checked for conflicts. Powerful filters show only those | |||
Updated: 9, 2005 | Rating: 0 | Author: Ed Trujillo | Size: 6217 kb | Shareware Go to category: Business > PIMS & Calendars Similar programs | |||
370. | TCS 4.20 (telsys.it) | ||
the trends of data mainly over a long period of time and to store important data for successive review. It can be useful also to follow the relevant parameters of a server to control and optimize the performances in peak activities periods, as can be a sustained alarms period in a supervision system. The maximum number of points data the program can manage is 10,000. The daily | |||
Updated: 9, 2005 | Rating: 0 | Author: Giorgio Castellani | Size: 8510 kb | Shareware Go to category: Business > Databases & Tools Similar programs | |||
|
Home > Important files software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|