|
||||||
|
||
|
Home > Locks software |
|
|
391. | ShareGuard Copy Protection 3.6 (zappersoftware.com) | ||
to protect their software. Consists of 4 components: (1) ShareGuard Lock (2) ShareGuard Key (3) ShareGuard Locksmith (4) CRC Check. (1) ShareGuard Lock is the program that protects your software from reverse engineering and from being used longer than the specified demonstration period. This is | |||
Updated: 9, 2005 | Rating: 0 | Author: William Bradshaw | Size: 11474 kb | Shareware Go to category: Development > Other Similar programs | |||
392. | ShareGuard V1 1 (zappersoftware.com) | ||
to protect their software. Consists of 4 components: (1) ShareGuard Lock (2) ShareGuard Key (3) ShareGuard Locksmith (4) CRC Check. (1) ShareGuard Lock is the program that protects your software from reverse engineering and from being used longer than the specified demonstration period. This is | |||
Updated: 9, 2005 | Rating: 0 | Author: William Bradshaw | Size: 2490 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
393. | gReg 4.55 (gitanosoftware.com) | ||
out-strips the competition with state-of-the-art encryption that locks out thieves permanently. Smoke your competitors with gReg's advanced customer tracking and technical support history. You and your customer support staff can satisfy every customer quickly and efficiently with our system .Cut your advertising time and costs in half! Use gReg to distribute an evaluation version of | |||
Updated: 9, 2005 | Rating: 0 | Author: Jesus Moreno | Size: 5840 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
394. | KeyedAccess for MS Access 2.0 (peterssoftware.com) | ||
versions of your MS Access application where some functionality is locked and is only unlocked when the user enters a valid key. When using the Installation Serial Number and Unlock Code registration scheme, KeyedAccess pulls information from the end-user's computer hardware to build a Serial Number that requires a specific KeyedAccess-generated Unlock Code. An installation on a | |||
Updated: 9, 2005 | Rating: 0 | Author: Peter De Baets | Size: 774 kb | Demo Go to category: Development > Other Similar programs | |||
395. | LLLib Licensing Library 2.04 (gppsoftware.com) | ||
product numbers, registration numbers, number of concurrent users, locking to a machine and remote registration and unlocking. To date, software products protected by LLLIB have not been cracked by crackers! LLLIB is a library for protecting and controlling the use of your software. Increase registrations by limiting your software to encourage people to register! No longer do you | |||
Updated: 9, 2005 | Rating: 0 | Author: Graham Plowman | Size: 1856 kb | Shareware Go to category: Development > Components & Libraries Similar programs | |||
396. | ACProtect standard 1.20 (ultraprotect.com) | ||
to create and verify the registration keys and unlock some RSA key locked code. It has an Embedded Protector against file dumping and unpackers. It also has many anti-debug tricks with specialized API system. Mutual communication between loader and application can also be achieved! Special ACProtect Technics: Metamorph Engine- Metamorph decryption routines and several encrypted | |||
Updated: 9, 2005 | Rating: 152 | Author: risco software | Size: 1604 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
397. | AidAim CryptoPressStream 1.00 (aidaim.com) | ||
LoadFromStream, LoadFromFile, SaveToStream, SaveToFile methods, Lock and Unlock methods for multi-thread usage. CryptoPressStream includes TCPSManager thread-safe component that provides an easiest setting of compression and encryption parameters, and contains a list of opened streams. CryptoPressStream contains TCPSManager visual component, Component Reference, 7 demos, License | |||
Updated: 9, 2005 | Rating: 0 | Author: AidAim Software | Size: 1062 kb | Commercial Go to category: Development > Delphi Similar programs | |||
398. | Amirus Mirror Memory 1.4.40 (CitrusControls.com) | ||
design is peer-to-peer with no single point of failure. A global lock facility allows cooperating programs to coordinate access to shared memory, making AmirusMM an ideal platform for the rapid development of distributed applications. Locks can be requested at either Shared or Exclusive levels, allowing efficient and protected access to read-only and read-write memory | |||
Updated: 9, 2005 | Rating: 24 | Author: Tony Cox | Size: 9454 kb | Shareware Go to category: Development > Other Similar programs | |||
399. | AntiCrack Software Protector Basic 1.09 (anticrack.us) | ||
to create and verify the registration keys and unlock some RSA key locked code,it has embedded cryptor against dump and unpacker. AntiCrack Software Protector also has many anti debug tricks.with specialized API system, mutual communication between loader and application is also can be achieved! AntiCrack Software Protector is designed for such specific tasks as working with | |||
Updated: 9, 2005 | Rating: 535 | Author: Lusi Chen | Size: 1429 kb | Shareware Go to category: Development > Other Similar programs | |||
400. | ASP/VBA/COM ActiveX Dictionary object 1.0 (motobit.com) | ||
to another dictionary object in the same process (Connect method). Lock and Unlock methods to synchronize multithreaded tasks. Items and Keys enumerators. Other functionality Share Application/Session variables in ASP (see ASP - Share application variables sample) Free-threaded hi-speed | |||
Updated: 9, 2005 | Rating: 39 | Author: Antonin Foller | Size: 140 kb | Demo Go to category: Web Development > ASP & PHP Similar programs | |||
|
Home > Locks software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|