|
||||||
|
||
|
Home > Information security software |
|
|
361. | KeyedAccess for MS Access 2.0 (peterssoftware.com) | ||
to generate an installation-specific Serial Number on the end-user's computer which can be unlocked with a corresponding Unlock Code. Using KeyedAccess means you can create shareware-type versions of your MS Access application where some functionality is locked and is only unlocked when the user enters a valid key. When using the Installation Serial Number and Unlock Code | |||
Updated: 9, 2005 | Rating: 0 | Author: Peter De Baets | Size: 774 kb | Demo Go to category: Development > Other Similar programs | |||
362. | MDBSecure 1.1.0 (mindwarp-consultancy-software.com) | ||
is MDBSecure? An MS Access Security utility, providing protection for your databases. MDBSecure follows the recommended approach to securing Microsoft® Access databases, it will encrypt your access database and remove security weaknesses. Although nothing is ever 100% secure in computing, following this approach will make an MS Access Database more secure. For more | |||
Updated: 9, 2005 | Rating: 82 | Author: Julian Moorhouse | Size: 1062 kb | Shareware Go to category: Development > Other Similar programs | |||
363. | Cryptocx v5 5.1.6 (easybyte.com) | ||
data using standards compliant algorithms to make sure that your information is totally secured. It is very easy to add Cryptocx to an existing application or web site backend. Why use Cryptocx? Use Cryptocx to encrypt your data, totally securing it. EasyByte Cryptocx v5 builds upon the previous releases of Cryptocx to add further powerful features in a very easy to use bundle | |||
Updated: 9, 2005 | Rating: 39 | Author: EasyByte Software | Size: 4099 kb | Demo Go to category: Development > Active X Similar programs | |||
364. | Alkonost ContraCopy 3.00 (contracopy.com) | ||
ordinary 1.44 MB floppy drive. ContraCopy diskettes contain unique information, that is readable only by your application. This means that every software protected via Alkonost ContraCopy will be have an unique key diskette, that must be placed to the floppy drive when your program is running. No | |||
Updated: 9, 2005 | Rating: 36 | Author: Alexander Turin | Size: 1060 kb | Demo Go to category: Development > Management & Distribution Similar programs | |||
365. | Chilkat Encryption .NET Component 2.2.0 (chilkatsoft.com) | ||
from 3rd-party vendors. It also provides easy access to information about digital certificates and the ability to add and delete certificates from certificate stores found in the registry, filesystem, or even directly in memory. Chilkat Crypt is an advanced .NET encryption component that offers both RSA public-key encryption with digital signatures as well as symmetric | |||
Updated: 9, 2005 | Rating: 42 | Author: Matt Fausey | Size: 2000 kb | Shareware Go to category: Development > Active X Similar programs | |||
366. | sqlDESKTOP 1.13 (sqldesktop.com) | ||
today business environment, information we need is located everywhere and anywhere: files in PC drive, database records on server, emails in Outlook, Web sites on the Internet. To find what we need, is like searching for a pair of socks stored in two different messy drawers. sqlDESKTOP is a computerized manual filing system arranged just like an ordinary office with pictures of real | |||
Updated: 9, 2005 | Rating: 0 | Author: Rene LEVANTINH | Size: 19401 kb | Freeware Go to category: Business > Databases & Tools Similar programs | |||
367. | Stock Predictor 1.1.212 (ashkon.com) | ||
strategy performance analysis software for financial market information. It allows to display several technical indicators for a single security on the same chart, maintain predefined lists of securities and test your own investment strategies. Stock Predictor has over a dozen built-in technical indicators and over four hundred investment strategies. One-click buy and sell | |||
Updated: 9, 2005 | Rating: 79 | Author: Ashkon Technology | Size: 16821 kb | Shareware Go to category: Business > Investment Tools Similar programs | |||
368. | TradingSolutions 3.1 (tradingsolutions.com) | ||
and step-by-step tutorials, 3) Perform calculations on a single security or multiple securities at once, 4) Model optimal actions and predict future prices with exclusive time-based neural networks, 5) Implement your own functions, systems, and complete trading solutions, 6) Evaluate trading models for profit potential using historical backtesting, 7) Optimize your models for maximum | |||
Updated: 9, 2005 | Rating: 0 | Author: NeuroDimension Incorporated | Size: 58568 kb | Demo Go to category: Business > Accounting & Finance Similar programs | |||
369. | PassMonster 2.25 (kamatoz.com) | ||
even hundreds of complex passwords to protect our access to private information. Passwords are given to us by network services, paging and cellular companies, software products, e-commerce services, banks, shops and many other institutions. Good password should comply to these simple rules: use as | |||
Updated: 9, 2005 | Rating: 0 | Author: Greg Arkadiev | Size: 678 kb | Shareware Go to category: Security & Privacy > Password Managers Similar programs | |||
370. | Password Organizer 2.1 (markosoft.net) | ||
today's world, there are new user names and passwords needed at every turn. Web pages, email accounts, voice mail accounts, and database logins are just a few of the things that we access daily that require login information. And, there are other common things such as software serial numbers | |||
Updated: 9, 2005 | Rating: 48 | Author: Mark Bowden | Size: 757 kb | Shareware Go to category: Security & Privacy > Password Managers Similar programs | |||
|
Home > Information security software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|