|
||||||
|
||
|
Home > Security products software |
Related keywords: security, Security, computer security, internet security, security software, information security, sell products online, SECURITY, products, file security |
|
|
41. | wodSFTPdll 3.0.0.0 (weonlydo.com) | ||
over ActiveX version. Only limited support is available for this product. Customers using other programming environment should try using ActiveX instead*** The Secure File Transfer Protocol provides secure file transfer functionality over any reliable data stream, SSH in this case. It is the standard file transfer protocol for use with the SSH2 protocol. wodSFTPdll library | |||
Updated: 2, 2006 | Rating: 0 | Author: Kresimir Petric | Size: 1187 kb | Shareware Go to category: Network & Internet > FTP Clients Similar programs | |||
42. | wodImapServer 2.0.0.0 (weonlydo.com) | ||
implementation. All you need to do is to put it on VB form, call it's Start method and it's immediately accepting connections by your clients! It fully supports commands defined in RFC2060. Since wodImapServer is COM object and not the full application, there's few things developer | |||
Updated: 2, 2006 | Rating: 0 | Author: Kresimir Petric | Size: 1033 kb | Shareware Go to category: Development > Components & Libraries Similar programs | |||
43. | wodPop3Server 1.3.2.0 (weonlydo.com) | ||
implementation. All you need to do is to put it on VB form, call it's Start method and it's immediately accepting connections by your clients! It fully supports commands defined in RFC1939. Use your favorite mail client (such as Outlook Express or Eudora) to read mail provided by your own | |||
Updated: 2, 2006 | Rating: 0 | Author: Kresimir Petric | Size: 857 kb | Shareware Go to category: Development > Components & Libraries Similar programs | |||
44. | wodSSHServer 1.3.0.0 (weonlydo.com) | ||
will show you, step by step, how to manually respond to client's actions. You can make an interface that will talk to the clients (like an BBS system), they will enter commands and different type of values in your program where you can evaluate them. This is ideal for making restricted access area | |||
Updated: 2, 2006 | Rating: 0 | Author: Kresimir Petric | Size: 1368 kb | Shareware Go to category: Servers > Telnet Servers Similar programs | |||
45. | wodSSHTunnel 1.5.0.0 (weonlydo.com) | ||
you can allow or deny user to use secure channel - once again, it's your decision. If you allow user to connect and use channel, everything is done by wodSSHTunnel, and you don't need to do anything else wodSSHTunnel component is server-type component that will add secure tunneling (based on SSH protocol) capabilities to your application. Based on your rules and definitions, it will | |||
Updated: 2, 2006 | Rating: 42 | Author: Kresimir Petric | Size: 1317 kb | Shareware Go to category: Servers > Telnet Servers Similar programs | |||
46. | Note Studio for Windows 3.1.1 (dogmelon.com.au) | ||
say you make a note of something - a fact, a figure, anything. Regardless of where it is stored, if that information is not available to you when you absolutely need it, it may as well not exist. Note Studio aims squarely at addressing this issue. It is a powerful note-taking system which brings all your information together in one location. With Note Studio, the priority is on | |||
Updated: 2, 2006 | Rating: 0 | Author: Ant Wiese | Size: 10105 kb | Shareware Go to category: Home & Hobby > Personal Finance Similar programs | |||
47. | Silver Key 3.3 (filecryption.com) | ||
If you need to send sensitive data over the Internet you should encrypt it first. Anybody knows this. Right, but what about the other side? You correspondent will probably not like the idea of buying and learning some software just to decrypt your file. No problem here if you are using Silver Key | |||
Updated: 2, 2006 | Rating: 0 | Author: Inv Softworks | Size: 3935 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
48. | Windows Security Officer 6.8.1.1 (1securitycenter.com) | ||
Security Officer is an autonomous provider of log-on and resource restriction security application integrated with, yet independent of, the Windows operating system. It has the capability of providing extremely strong, secure control of who can access a personal computer resources, and exactly what they can do and when they can do it while they have access to those | |||
Updated: 2, 2006 | Rating: 0 | Author: Eugene Mihailov | Size: 1578 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
49. | Silver Key 3.3 (kryptel.com) | ||
If you need to send sensitive data over the Internet you should encrypt it first. Anybody knows this. Right, but what about the other side? You correspondent will probably not like the idea of buying and learning some software just to decrypt your file. No problem here if you are using Silver Key | |||
Updated: 2, 2006 | Rating: 0 | Author: Inv Softworks | Size: 3935 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
50. | BackToZIP 7.10 (aborange.de) | ||
I confess: there are a lot of backup utilities on the market. But when I was searching for a tool for my daily and weekly backups, I quickly realized that the available tools were either too complicated, too expensive or had other disadvantages. Clearly, these disadvantages would not only have been an | |||
Updated: 2, 2006 | Rating: 0 | Author: Mathias Gerlach | Size: 3217 kb | Shareware Go to category: System Utilities > Backup & Restore Similar programs | |||
|
Home > Security products software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|