|
||||||
|
||
|
Home > Acrobat key software |
Related keywords: acrobat, Acrobat, Adobe Acrobat, adobe acrobat, Adobe Acrobat Reader, search adobe acrobat, compare adobe acrobat, index adobe acrobat, Acrobat file |
|
|
391. | Random Test Generator-PRO 8.2 (hirtlesoftware.com) | ||
or administed via the Internet. Since each test is unique, answer keys may be printed for every paper test developed. Printed tests and their associated answer keys are provided with the same ID number so they can easily be matched up. Tests administered on computer may be automatically graded | |||
Updated: 9, 2005 | Rating: 65 | Author: Tim Hirtle | Size: 12772 kb | Shareware Go to category: Education > Teaching & Training Tools Similar programs | |||
392. | Multiport.USB 2.0 (intellidriver.com) | ||
LetOs suppose you have purchased the software protected by USB HASP KEY, but you want this product to be used on several computers, but in different time. If the computers are located close - it is not a problem to pull out the USB HASP KEY from one computer and to insert into another. There is a problem when the computers are located in different premises, or it is worse than | |||
Updated: 9, 2005 | Rating: 0 | Author: Marion Willis | Size: 547 kb | Commercial Go to category: Development > Other Similar programs | |||
393. | OpenSSL 0.9.7c (download.componentspot.com) | ||
a multitude of encryption algorithms. The symmetric, or private key, encryption algorithms offered include Rijndael (now officially the Advanced Encryption Standard, or AES, algorithm of the U.S. government), IDEA, DES, 3DES, RC2, RC4, and Blowfish. The asymmetric, or private/public key, encryption algorithms include RSA, DSA, and Diffie-Hellman. Also included are | |||
Updated: 9, 2005 | Rating: 0 | Author: Component Spot | Size: 2879 kb | Freeware Go to category: Development > C / C++ / C-sharp Similar programs | |||
394. | PC Guard for Win32 5.00 (sofpro.com) | ||
investments. You also don't need any additional hardware (hardware keys, dongles etc.) for proper execution of protected programs. PC Guard for Win32 is based only on complex software protection techniques and PC hardware details. PC Guard for Win32 features: - Advanced software copy protection! Protect your software from illegal copying from one computer to another | |||
Updated: 9, 2005 | Rating: 48 | Author: Blagoje Ceklic | Size: 841 kb | Commercial Go to category: Development > Management & Distribution Similar programs | |||
395. | PDF Printer Pilot Pro 1.32 (colorpilot.com) | ||
password protection mode (using 40-bit and 128-bit encryption keys), and different compression and font embedding modes. PDF Printer Pilot converts any document to PDF. All you have to do is to print your document with this virtual printer and save the result as PDF file. The program coverts your documents with the maximum | |||
Updated: 9, 2005 | Rating: 48 | Author: Rais Garifoulline | Size: 1796 kb | Demo Go to category: Business > Other Similar programs | |||
396. | PELock 1.06 (pelock.pac.pl) | ||
creation of application of evaluation-demo type, which use license key system. PELock features: • compression of the application (code, imports, resources), it's possible to decrease executable size even 70% of original file • encryption of code (publicly available cryptographic | |||
Updated: 9, 2005 | Rating: 0 | Author: Bartosz Wójcik | Size: 422 kb | Demo Go to category: Development > Other Similar programs | |||
397. | Registry Pro 2.2.6 (evansprogramming.com) | ||
create, delete, read, write and rename of registry branches, keys and values. Includes methods to enumerate all registry hives, branches, keys and values. Supports all registry data types. All methods and properties support remote registry calls (reads and writes of a remote computers’ registry). Help file provides additional information on the registry and on registry | |||
Updated: 9, 2005 | Rating: 42 | Author: David Evans | Size: 1765 kb | Shareware Go to category: Development > Active X Similar programs | |||
398. | Repgen 2.25 (dotcomsolutionsinc.net) | ||
Advanced Replication installation. The implementation of primary key, replication triggers and multiple conflict resolution methods is included. Licensed customers of Repgen Enterprise Edition receive source code and the ability to make site-specific customization of the generated files via an external module. Free demo available for Windows, Solaris, Linux and MacOSX. You | |||
Updated: 9, 2005 | Rating: 0 | Author: David Simpson | Size: 1076 kb | Demo Go to category: System Utilities > Other Similar programs | |||
399. | SignetSure 1.0 (SignetSure.com) | ||
to your subscribers. You have installed a program on the subscriber's machine that receives your files. This program must be able to authenticate files even against a hacker who has reverse-engineered your program. Scenario Two: You distribute registered software with a datafile that identifies | |||
Updated: 9, 2005 | Rating: 0 | Author: Jim Serwer | Size: 696 kb | Shareware Go to category: Development > Delphi Similar programs | |||
400. | dtrt.NavBarWin 1.0 (dtrt.com) | ||
This can be achieved either by clicking on buttons, using shortcut keys, entering navigation commands in the display window or by selecting commands from the context menu. For additional purposes, developer-defined buttons can be activated. One set of buttons is defined for incremental navigation, which enables users to navigate a predefined number of records/data items (i.E. jump | |||
Updated: 9, 2005 | Rating: 0 | Author: Raymond Tellenbach | Size: 4346 kb | Commercial Go to category: Development > Components & Libraries Similar programs | |||
|
Home > Acrobat key software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|