|
||||||
|
||
|
Home > Address verification software |
Related keywords: address, address book, email address, Address, verification, Address Book, ip address, IP address, e mail address, Verification |
|
|
31. | Email Validation Component for .NET 1.0 (smtpcomponent.ca) | ||
validation made easy Fake email addresses are a big problem for busy web sites. Most form validation codes merely looks for a "@" and a "." in the email address. This is extremely inadequate. Databases get populated with bad email addresses, resulting in several important problems such as : When you are sending a mass email to your site's membership, a large | |||
Updated: 3, 2005 | Rating: 0 | Author: Patrick Mathieu | Size: 130 kb | Commercial Go to category: Development > Other Similar programs | |||
32. | Form1 Builder Software 30 (softswot.com) | ||
It provides a single file form (no cgi) with a hidden email delivery address and an extensive range of benefits and options including protection against form hijacking, email injection and email harvesting. Key features include: User friendly click and build interface. Capacity to develop basic to complex forms easily and quickly. Quick Form option to generate a form with a couple of | |||
Updated: 2, 2006 | Rating: 0 | Author: David Morcom | Size: 104 kb | Shareware Go to category: Web Development > HTML Tools Similar programs | |||
33. | HardKey License Manager 3.2 (softcomplete.com) | ||
file. - Automatic source code generation for end-application key verify unit (plugins, Delphi, C/C++) - Black list automathic support in key verification module. - EXECryptor & AsProtect integration on enciphering program code level. In many cases this garantees hard-stop hackink of your software product. - Clipboard automatic parser for program registration info | |||
Updated: 9, 2005 | Rating: 536 | Size: 8054 kb | Shareware Go to category: Development > Management & Distribution Similar programs | |||
34. | LASsie (Light Application Security) for MS Access 4.3 (peterssoftware.com) | ||
the user's network login username can be used. Once the user name is verified, his/her session is assigned a Security Level code that determines which forms or reports can be accessed, if data updates are allowed, and more. LASsie is called "light" application security because it is not intended to | |||
Updated: 9, 2005 | Rating: 0 | Author: Peter De Baets | Size: 770 kb | Shareware Go to category: Development > Other Similar programs | |||
35. | Licence Protector 2.4 (mirage-systems.de) | ||
You have developed an application and you want to protect it fast, easy, reliable and cost effective? Licence Protector from Mirage Computer Systems administrates licences and modules (license manager and control), generates Demo- and time limited versions (trial versions), provides you with software copy | |||
Updated: 2, 2006 | Rating: 0 | Author: Mirage Sales | Size: 14806 kb | Shareware Go to category: Development > Management & Distribution Similar programs | |||
36. | Speed SQL IDE Pro 1.6.8 (sqlXpress.com) | ||
and suitability (Code Complete, Auto Correct, Syntax Checking, Verify) SQL IDE's Object History - which stores a record of every object change - ensures that nothing is lost. Review and switch back to any version of any object. Seamless integration with Microsoft™ Visual SourceSafe™ and other SCC compliant version control systems allows object check out and check in directly | |||
Updated: 3, 2005 | Rating: 0 | Author: Bryan Oliver | Commercial Go to category: Business > Databases & Tools Similar programs | |||
37. | Open and Save Dialogs Toolkit 2.0 (fcoder.com) | ||
Open and Save dialogs toolkit allows you to open 50 graphics file types and save to 27 graphics file types from your application. Just few lines of code will allow you to get your own working program. Dialogs use HBITMAP handle as input and output and even novice developer can learn how to work with it | |||
Updated: 9, 2005 | Rating: 213 | Author: Evgeny Shamin | Size: 3521 kb | Freeware Go to category: Development > Other Similar programs | |||
38. | OpenSSL 0.9.7c (download.componentspot.com) | ||
modified during transmission. · Authenticity: An application can verify the identity of the sender using certificates. · Privacy: An application can ensure that no intermediary between the sender and the recipient can understand the data. Transport Layer Security is an extension of SSL. It is now overseen by an international standards organization. It provides the same | |||
Updated: 9, 2005 | Rating: 0 | Author: Component Spot | Size: 2879 kb | Freeware Go to category: Development > C / C++ / C-sharp Similar programs | |||
39. | PELock 1.06 (pelock.pac.pl) | ||
between application and license key system • creation and verification of registration keys using public keys encryption algorithms (RSA) • ability to create trial keys and hardware dependent keys • keeping of the database and checkup of "stolen" (illegal) registration keys • ready to use samples of license key system in C/C++/Delphi • user-friendly interface • many | |||
Updated: 9, 2005 | Rating: 0 | Author: Bartosz Wójcik | Size: 422 kb | Demo Go to category: Development > Other Similar programs | |||
40. | RC Localize 3.11 (mootools.com) | ||
and to edit them with the Visual Studio resources editor. Moreover, verification flags will help him to find the items, which have been modified and which need to be checked again. - Create more secure release of your application: all items of original resource are in the localized resource! It is | |||
Updated: 2, 2006 | Rating: 42 | Author: Manuel Jouglet Marcus | Size: 2122 kb | Shareware Go to category: Development > Other Similar programs | |||
|
Home > Address verification software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|