|
||||||
|
||
|
Home > Verify security software |
Related keywords: security, Security, computer security, internet security, verify, security software, information security, SECURITY, file security, windows security |
|
|
41. | OpenSSL 0.9.7c (download.componentspot.com) | ||
take advantage of Secure Sockets Layer (SSL v2/v3), Transport Layer Security (TLS v1). The Open SSL library uses the included full-strength general-purpose cryptography library, which can be used by itself. Security features such as the following can be implemented: · Data integrity: An | |||
Updated: 9, 2005 | Rating: 0 | Author: Component Spot | Size: 2879 kb | Freeware Go to category: Development > C / C++ / C-sharp Similar programs | |||
42. | PELock 1.06 (pelock.pac.pl) | ||
between application and license key system • creation and verification of registration keys using public keys encryption algorithms (RSA) • ability to create trial keys and hardware dependent keys • keeping of the database and checkup of "stolen" (illegal) registration keys • ready to use samples of license key system in C/C++/Delphi • user-friendly interface • many | |||
Updated: 9, 2005 | Rating: 0 | Author: Bartosz Wójcik | Size: 422 kb | Demo Go to category: Development > Other Similar programs | |||
43. | LASsie (Light Application Security) for MS Access 4.3 (peterssoftware.com) | ||
(Light Application Security) is a Microsoft Access Add-In that enhances your Access application with a simplified user security system. Intended as an alternative to Access’ built-in security, LASsie offers a less complicated way to secure forms, reports, controls and certain records from unauthorized user access. With LASsie, you can prevent a user from opening | |||
Updated: 9, 2005 | Rating: 0 | Author: Peter De Baets | Size: 770 kb | Shareware Go to category: Development > Other Similar programs | |||
44. | Chilkat Encryption .NET Component 2.2.0 (chilkatsoft.com) | ||
to easily create digital signatures for files or memory data, or verify digital signatures against incoming data or files. It allows for the use of any Cryptographic Service Provider, including Smart Card implementations from 3rd-party vendors. It also provides easy access to information about digital certificates and the ability to add and delete certificates from certificate | |||
Updated: 9, 2005 | Rating: 42 | Author: Matt Fausey | Size: 2000 kb | Shareware Go to category: Development > Active X Similar programs | |||
45. | rapidHELP 2.1 (broadgun.de) | ||
The Internet connection option allows your customers to directly verify the status of any logged call. It is also possible to raise tickets and search the knowledge database via the web interface. Automatic Timing The duration of all support actions can be timed automatically. Automatical display of new tickets The system automatically informs every supporter about new | |||
Updated: 9, 2005 | Rating: 0 | Author: rapidHELP Software Hermes & Nolden GbR | Size: 46080 kb | Demo Go to category: System Utilities > Other Similar programs | |||
46. | SiteKiosk 5.5.45 (sitekiosk.com) | ||
keypad with a mouse. Plentiful options let you decide the amount of security your kiosk needs, from hard-disk protection to prohibiting specific Websites. The program can be used with either a direct network connection or Dial-Up Networking, providing Internet access "on demand." Other features include multiple-window support, automatic shutdown/restart, Shell-Replacement, hard-disk | |||
Updated: 9, 2005 | Rating: 42 | Author: Andreas Koepf | Size: 9022 kb | Shareware Go to category: Servers > Other Server Applications Similar programs | |||
47. | Disk Investigator 1.32 (diskcleaners.com) | ||
clusters, and system sectors. Undelete previously deleted files. Verify the effectiveness of file and disk wiping programs. Disk Investigator helps you to discover all that is hidden on your computer hard disk. It can also help you to recover lost data. Display the true drive contents by bypassing the operating system and directly reading the raw drive | |||
Updated: 9, 2005 | Rating: 455 | Author: Kevin Solway | Size: 350 kb | Freeware Go to category: System Utilities > File & Disk Management Similar programs | |||
48. | eResponse 6.1.3 (mail.bonafide.com) | ||
· Automatic credit card processing through Authorize.Net and IC Verify · Customized Inventory Management · Complete Customer History · Report Flexibility · Export Report Data · Email Report Data · Import Inventory Data · Security Level Setup · Customize your Invoices, Packing Slips, Emails, Invoices, and Shipping Labels · Custom Printer Setup · Easy to Use · | |||
Updated: 3, 2005 | Rating: 0 | Author: Art Canlas | Size: 22872 kb | Demo Similar programs | |||
49. | Splitty 3.0 (basta.com) | ||
is not just another file splitter, it has been optimized for speed, security, and efficiency. A checksum algorithm verifies the length and consistency of the split file, thus safely avoiding any file corruption issues. A packaging feature is included to facilitate the distribution of split | |||
Updated: 3, 2005 | Rating: 0 | Size: 494 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
50. | East-Tec File Shredder 1.0 (east-tec.com) | ||
or confidential letters. East-Tec File Shredder overwrites and verifies the destruction of every bit of the file, making recovery impossible. Deleting a file with Windows or with other programs will leave the file contents on your hard disk, easy to be recovered by anyone that has access to your computer. East-Tec File Shredder securely destroys sensitive and private files beyond | |||
Updated: 3, 2005 | Rating: 79 | Author: Horatiu Tanescu | Size: 709 kb | Freeware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
|
Home > Verify security software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|