|
||||||
|
||
|
Home > Protect html software |
Related keywords: html, HTML, protect, html editor, HTML editor, HTML Editor, Protect, password protect, protect files, text to html |
|
|
41. | PHP Processor 1.4.1.3 (gridinsoft.com) | ||
Processor is designed to help you protect your intellectual property when distributing PHP source files. The other use for PHP Processor is to optimize PHP source code and considerably decrease size of your source code files. PHP Processor provides a fast, intuitive way to obfuscate your PHP source code. Both variable and function names can be replaced with meaningless strings making | |||
Updated: 2, 2006 | Rating: 136 | Author: Dmitry Gridin | Size: 1317 kb | Shareware Go to category: Web Development > ASP & PHP Similar programs | |||
42. | Pretty Password 1.0 (apps-of-hawaii.com) | ||
Pretty Password is for the web designer that wants to add security, the ability to charge for website entry, monitor who and when the users are visiting, and/or control which web pages each user is directed to. When you purchase Pretty Password you receive 7 programs: 1. Pretty Password - the actual | |||
Updated: 3, 2005 | Rating: 0 | Author: Alan Linsky | Size: 392 kb | Shareware Go to category: Development > Other Similar programs | |||
43. | SecureCode 2.0 (aidsoft.com) | ||
on the lastest technique protection to provide a strong security to protect your software against reverse engineering and illegal decompilation. If you have important code and you do not want a competitor to see, use SecureCode !You can use as protection against reverse-engineering or you can use as | |||
Updated: 9, 2005 | Rating: 16 | Author: Bruno Branciforti | Size: 830 kb | Shareware Go to category: Development > Delphi Similar programs | |||
44. | SecureCode Protection 1.0.2 (aidsoft.com) | ||
on the lastest techniques protection to provide a strong security to protect your software against reverse engineering and illegal copying, confidence that people can only run your application on your terms.SecureCode is not trial protection or registration software, you can use as protection against reverse-engineering or you can use as additionnal protection with you current | |||
Updated: 9, 2005 | Rating: 0 | Author: Bruno Branciforti | Size: 350 kb | Shareware Go to category: Development > Other Similar programs | |||
45. | ShareGuard Copy Protection 3.6 (zappersoftware.com) | ||
For Shareware developers who want to protect their software. Consists of 4 components: (1) ShareGuard Lock (2) ShareGuard Key (3) ShareGuard Locksmith (4) CRC Check. (1) ShareGuard Lock is the program that protects your software from reverse engineering and from being used longer than the specified demonstration period. This is called by your software and is displayed to | |||
Updated: 9, 2005 | Rating: 0 | Author: William Bradshaw | Size: 11474 kb | Shareware Go to category: Development > Other Similar programs | |||
46. | ShareGuard V1 1 (zappersoftware.com) | ||
For Shareware developers who want to protect their software. Consists of 4 components: (1) ShareGuard Lock (2) ShareGuard Key (3) ShareGuard Locksmith (4) CRC Check. (1) ShareGuard Lock is the program that protects your software from reverse engineering and from being used longer than the specified demonstration period. This is called by your software and is displayed | |||
Updated: 9, 2005 | Rating: 0 | Author: William Bradshaw | Size: 2490 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
47. | Multiple Choice Quiz Maker 2.7.0 (tac-soft.com) | ||
the appropriate question and answer fields. To see how it looks in HTML, simply click on the View Quiz button and your well-rendered Web page will be displayed within seconds. There is immediate feedback on the correctness of an answer for the test-takers and, if required, a message with the quiz | |||
Updated: 2, 2006 | Rating: 0 | Author: John Turner | Size: 7686 kb | Shareware Go to category: Education > Teaching & Training Tools Similar programs | |||
48. | Avernum 2 1.0 (spiderwebsoftware.com) | ||
Avernum is a prison. It is an enormous warren of tunnels and caverns, far below the surface world. You were banished there by the cruel Empire, to spend the rest of your life in the underworld. However, what little safety and peace you had found there was short-lived. Your home has been invaded by | |||
Updated: 9, 2005 | Rating: 0 | Author: Jeff Vogel | Size: 9248 kb | Shareware Go to category: Games & Entertainment > Kids Similar programs | |||
49. | Deep Six 1.2 (sarnikdhtml.com) | ||
Deep Six is a unique and challenging adaptation of an obscure children's card game. The object of Deep Six is to score as few points as possible by matching cards of the same rank into columns and by playing low value cards on a 3 X 2 grid. As the game progresses and points accumulate, players are eliminated | |||
Updated: 9, 2005 | Rating: 0 | Author: David Lambert | Size: 73 kb | Shareware Go to category: Games & Entertainment > Card Similar programs | |||
50. | Easy Tank COMMBAT 1.0 (heartbone.com) | ||
The guest program does not need to be installed, and is not protected in any way. The guest program contains the full simulation, the only limitation is the guest version can only connect to a session hosted by the fully networked version. If you already have multiple computers in your home which are not networked, know that all of your systems have a serial port. A | |||
Updated: 9, 2005 | Rating: 0 | Author: Michael Clayton | Size: 8228 kb | Freeware Go to category: Games & Entertainment > Puzzle & Word Games Similar programs | |||
|
Home > Protect html software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|