|
||||||
|
||
|
Home > Protect computer software |
Related keywords: protect, computer, computer security, computer game, Computer, Protect, password protect, protect files, computer software, computer backup |
|
|
41. | Code-Lock 2.35 (chosenbytes.com) | ||
serial is used. The registration serial will not be valid on another computer. The Registered version will only run on the registered user's computer. There is no need to download a Registered version by the registered user. Furthermore, the Registered version is watermarked and can be | |||
Updated: 9, 2005 | Rating: 16 | Author: Ryan Thian | Size: 2721 kb | Demo Go to category: Development > Management & Distribution Similar programs | |||
42. | Codelock 2.0 (codelock.co.nz) | ||
is a PHP and HTML code Encryptor for protecting your source code from thieves. You can encrypt your PHP scripts before distribution to make it unreadable by humans. Codelock allows you to limit your scripts to IP addresses, password protect your scripts and set an optional expiry time. Codelock is an easy to use, full-featured software encryption solution for PHP and HTML | |||
Updated: 9, 2005 | Rating: 101 | Author: Vince Edwards | Size: 279 kb | Demo Go to category: Development > Other Similar programs | |||
43. | HUSB Virtual Driver (HUSBVD) 2.0 (alarit.com) | ||
of this technology. LetOs suppose you have purchased the software protected by USB HASP KEY, but you want this product to be used on several computers, but in different time. If the computers are located close - it is not a problem to pull out the USB HASP KEY from one computer | |||
Updated: 9, 2005 | Rating: 39 | Author: Fernando Chavez | Size: 547 kb | Commercial Go to category: System Utilities > Other Similar programs | |||
44. | Laurel USB Virtual Driver 2.0 (itlaurel.com) | ||
of this technology. LetOs suppose you have purchased the software protected by USB HASP KEY, but you want this product to be used on several computers, but in different time. If the computers are located close - it is not a problem to pull out the USB HASP KEY from one computer | |||
Updated: 3, 2005 | Rating: 0 | Author: Janice Petros | Size: 290 kb | Commercial Go to category: Development > Other Similar programs | |||
45. | Licence Protector 2.4 (mirage-systems.de) | ||
have developed an application and you want to protect it fast, easy, reliable and cost effective? Licence Protector from Mirage Computer Systems administrates licences and modules (license manager and control), generates Demo- and time limited versions (trial versions), provides you with software copy protection and supports concurrent user (floating license) testing | |||
Updated: 2, 2006 | Rating: 0 | Author: Mirage Sales | Size: 14806 kb | Shareware Go to category: Development > Management & Distribution Similar programs | |||
46. | LLLib Licensing Library 2.04 (gppsoftware.com) | ||
and remote registration and unlocking. To date, software products protected by LLLIB have not been cracked by crackers! LLLIB is a library for protecting and controlling the use of your software. Increase registrations by limiting your software to encourage people to register! No longer do you need to worry about software being used for longer than it | |||
Updated: 9, 2005 | Rating: 0 | Author: Graham Plowman | Size: 1856 kb | Shareware Go to category: Development > Components & Libraries Similar programs | |||
47. | Multiport.USB 2.0 (intellidriver.com) | ||
of this technology. LetOs suppose you have purchased the software protected by USB HASP KEY, but you want this product to be used on several computers, but in different time. If the computers are located close - it is not a problem to pull out the USB HASP KEY from one computer | |||
Updated: 9, 2005 | Rating: 0 | Author: Marion Willis | Size: 547 kb | Commercial Go to category: Development > Other Similar programs | |||
48. | NewAge USB Virtual Driver 2.0 (newageit.com) | ||
of this technology. LetOs suppose you have purchased the software protected by USB HASP KEY, but you want this product to be used on several computers, but in different time. If the computers are located close - it is not a problem to pull out the USB HASP KEY from one computer | |||
Updated: 3, 2005 | Rating: 16 | Author: Matthew Jacobson | Size: 290 kb | Commercial Go to category: Development > Other Similar programs | |||
49. | PC Guard for Win32 5.00 (sofpro.com) | ||
and licensing system. With PC Guard for Win32 you can easily protect Windows 95/98/ME/2000/NT/XP 32bit EXE/DLL applications from illegal distribution and reverse engineering. Even more, you don't need any source code editing or programming experience for this. Everything is fully automatic! With PC Guard for Win32 you can protect unlimited number of your | |||
Updated: 9, 2005 | Rating: 48 | Author: Blagoje Ceklic | Size: 841 kb | Commercial Go to category: Development > Management & Distribution Similar programs | |||
50. | SignetSure 1.0 (SignetSure.com) | ||
application authenticates the file while running on your customer´s computer. Consider the following two scenarios. Scenario One: You push-publish programs and data over the Internet. Disaster would strike if hackers could impersonate you and send their own files to your subscribers. You have | |||
Updated: 9, 2005 | Rating: 0 | Author: Jim Serwer | Size: 696 kb | Shareware Go to category: Development > Delphi Similar programs | |||
|
Home > Protect computer software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|