|
||||||
|
||
|
Home > Protect applications software |
Related keywords: protect, applications, Protect, password protect, protect files, multimedia applications, protect folders, hide applications, protect folder, protect privacy |
|
|
41. | Cryptocx v6 6.1.3 (easybyte.com) | ||
is totally secured. It is very easy to add Cryptocx to an existing application or web site backend. Use Cryptocx to encrypt your data, totally securing it. EasyByte Cryptocx v6 builds upon the previous releases of Cryptocx to add further powerful features in a very easy to use bundle. Data security is becoming more and more important, with developers wanting to add secure data | |||
Updated: 2, 2006 | Rating: 0 | Author: EasyByte Software | Size: 3999 kb | Demo Go to category: System Utilities > Other Similar programs | |||
42. | EasyLicenser 2.0.02 (agilis-sw.com) | ||
runtime charges for multiple languages and platforms. EasyLicenser's non-intrusive operation will encourage the ISV's users into compliance, thus further improving the bottom line.Most commonly used license models are supported, and you can further customize the licensing options to meet your | |||
Updated: 9, 2005 | Rating: 56 | Author: Technical Support | Size: 3906 kb | Demo Go to category: Web Development > Java & JavaScript Similar programs | |||
43. | EasySec Firewall SDK 1.10b (effectmatrix.com) | ||
software kit for developing network firewall, sniffer or analyzer applications for Microsoft Windows. Simple APIs of EasySec Firewall SDK include powerful functions: Double layer packet filter (application layer and kernel layer) can manage and control data packets of all kinds network | |||
Updated: 9, 2005 | Rating: 48 | Author: Hanse wu | Size: 1055 kb | Shareware Go to category: Development > Other Similar programs | |||
44. | EXECryptor 2.3.7 (softcomplete.com) | ||
is a software protection system for protect programs from reverse engineering, analysis, modifications and cracking. EXECryptor has powerful anticrack, antidebug, antitrace and import code protection features for stop the latest cracking software. and crackers issues. EXECryptor allows to turn program into trial, demo or evalutaion versions and vice versa. You can set | |||
Updated: 2, 2006 | Rating: 140 | Author: Alex Sergeev | Size: 2865 kb | Shareware Go to category: Development > Management & Distribution Similar programs | |||
45. | ExeShield 3.8 (exeshield.com) | ||
ExeShield it's easy to turn your applications into "try-before-you-buy" software with very little effort, and maximum protection against piracy, backdating, reverse-engineering or any kind of tampering. ExeShield will protect virtually any Win32 executable, including: Visual Basic Delphi C++ C++ Builder PowerBasic MASM Visual Studio With ExeShield | |||
Updated: 2, 2006 | Rating: 79 | Author: George Balla | Size: 947 kb | Shareware Go to category: Development > Basic / VB / VB DotNet Similar programs | |||
46. | Form1 Builder Software 30 (softswot.com) | ||
function. All processing code is server side php scripting and protects your delivery email address from email harvesters. Fully server based, no user JavaScript required. Auto Responder feature. Handles user Cookies and Variables. Detects Required variables. Includes email validity checks. Capacity to include an Email Copy. Processes all form fields automatically. From Email can be | |||
Updated: 2, 2006 | Rating: 0 | Author: David Morcom | Size: 104 kb | Shareware Go to category: Web Development > HTML Tools Similar programs | |||
47. | gReg 4.55 (gitanosoftware.com) | ||
want your software, some are thieves. Don't take that chance, protect your work! gReg armors your software against thieves-and safeguards your revenues. Our protection is bulletproof! Our competitors offer only simple software licensing and authorization. gReg out-strips the competition with state-of-the-art encryption that locks out thieves permanently. Smoke your competitors with | |||
Updated: 9, 2005 | Rating: 0 | Author: Jesus Moreno | Size: 5840 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
48. | HUSB Virtual Driver (HUSBVD) 2.0 (alarit.com) | ||
In order to refuel this opinion we present here some examples of application of this technology. LetOs suppose you have purchased the software protected by USB HASP KEY, but you want this product to be used on several computers, but in different time. If the computers are located close - it is not a problem to pull out the USB HASP KEY from one computer and to insert into | |||
Updated: 9, 2005 | Rating: 39 | Author: Fernando Chavez | Size: 547 kb | Commercial Go to category: System Utilities > Other Similar programs | |||
49. | ICE License 2.01 (aidsoft.com) | ||
copy using the power of Elliptic Curvesl Asymmetric Encryption to protect your application. Elliptic Curves encryption system allow transmission of secret information over an open channel without a common secret key previously shared between the ends.ICE License Features : * Antidebugging & | |||
Updated: 9, 2005 | Rating: 0 | Author: Bruno Branciforti | Size: 439 kb | Shareware Go to category: Development > Delphi Similar programs | |||
50. | LASsie (Light Application Security) for MS Access 4.3 (peterssoftware.com) | ||
(Light Application Security) is a Microsoft Access Add-In that enhances your Access application with a simplified user security system. Intended as an alternative to Access’ built-in security, LASsie offers a less complicated way to secure forms, reports, controls and certain records from unauthorized user access. With LASsie, you can prevent a user from opening specific | |||
Updated: 9, 2005 | Rating: 0 | Author: Peter De Baets | Size: 770 kb | Shareware Go to category: Development > Other Similar programs | |||
|
Home > Protect applications software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|