|
||||||
|
||
|
Home > Secure information software |
|
|
41. | The Patentstein Browser 1.3.0.1 (patent.info) | ||
categories and save together with your comments. · Find relevant information fast using our Project Keyword highlighter and scrolling system. · Automatically save your nav trail to your search project. · Add detailed comments as you bookmark pertinent prior art. · Automatically rate all visited sites according to your search query or defined keywords. · Create executive | |||
Updated: 9, 2005 | Rating: 0 | Author: John Moetteli | Size: 3358 kb | Demo Go to category: Network & Internet > Other Similar programs | |||
42. | Access Forms and Reports Assistant 2.0 (cbacorp.com) | ||
Access version installed on your computer. If you work with several secured databases, AFRA can keep track of your security information so you just select the workgroup data with two mouse clicks. All writeable form and report properties for Access 2000, 2002, and 2003 are available except the HasModule property (that one could be a disaster, erasing all your form and report | |||
Updated: 2, 2006 | Rating: 149 | Author: Bob Flenniken | Size: 6165 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
43. | Bind to EXE library 1.1 (codeoffice.com) | ||
to increase their securities. Blowfish algorithm, one of the most secure encryption algorithms in the world, is employed to encrypt the files. In extracting stage, TExtractFromEXE can retrieve information about the collection of files embedded in the executable file, or just extract one or | |||
Updated: 9, 2005 | Rating: 0 | Author: Chong-Wei CHEN | Size: 1587 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
44. | Chilkat Digital Certificates Component 2.0.3 (chilkatsoft.com) | ||
Certificate makes it easy to get information about the security certificates that are stored on your computer. It also allows you to easily add certificates to a certificate store, remove certificates from a store, or find a certificate that should be used for a particular purpose, such as secure email. Chilkat Certificate makes it easy to get information about the | |||
Updated: 9, 2005 | Rating: 206 | Author: Matt Fausey | Size: 1000 kb | Freeware Go to category: Development > Other Similar programs | |||
45. | Clever Internet ActiveX Suite 5.0 (aidsoft.com) | ||
and post the Internet-resources asynchronously andobtain all related information without interfering with main application processes. The set of e-mail components can connectto mail servers via SSL, send emails with MIME encoded bodies and multiple file attachments.Features: Data compression while retrieving data; Working with cookies; Simulation web form POST requests; | |||
Updated: 9, 2005 | Rating: 0 | Author: Sergey S | Size: 1373 kb | Shareware Go to category: Development > Active X Similar programs | |||
46. | Cryptocx v5 5.1.6 (easybyte.com) | ||
data using standards compliant algorithms to make sure that your information is totally secured. It is very easy to add Cryptocx to an existing application or web site backend. Why use Cryptocx? Use Cryptocx to encrypt your data, totally securing it. EasyByte Cryptocx v5 builds upon the previous releases of Cryptocx to add further powerful features in a very easy | |||
Updated: 9, 2005 | Rating: 39 | Author: EasyByte Software | Size: 4099 kb | Demo Go to category: Development > Active X Similar programs | |||
47. | Cryptocx v6 6.1.3 (easybyte.com) | ||
data using standards compliant algorithms to make sure that your information is totally secured. It is very easy to add Cryptocx to an existing application or web site backend. Use Cryptocx to encrypt your data, totally securing it. EasyByte Cryptocx v6 builds upon the previous releases of Cryptocx to add further powerful features in a very easy to use bundle. Data | |||
Updated: 2, 2006 | Rating: 0 | Author: EasyByte Software | Size: 3999 kb | Demo Go to category: System Utilities > Other Similar programs | |||
48. | DevSolutions Crypt 1.0.1 (devsolutions.net) | ||
supports the new Rijndael Algorithm , which is a Federal Information Processing Standard (FIPS) approved Advanced Encryption Standard (AES) .It also supports Serpent, Mars, Triple DES,Blowfish algorithms. DevSolutionsCrypt component is designed to guard your client's or application's sensitive information with powerful byte/binary encryption | |||
Updated: 2, 2006 | Rating: 22 | Author: Customer Cell | Size: 651 kb | Shareware Go to category: Development > Active X Similar programs | |||
49. | Hex Workshop 4.23 (bpsoft.com) | ||
that closely resemble the C/C++ style struct definitions. For more information, please visit http://www.hexworkshop.com Hex Workshop is a set of hexadecimal development tools for Windows that combines advanced binary editing with the ease and flexibility of a word | |||
Updated: 9, 2005 | Rating: 82 | Author: BreakPoint Software | Size: 3734 kb | Commercial Go to category: Development > Management & Distribution Similar programs | |||
50. | IEWatch 3.0 (iewatch.com) | ||
headers, Cookies, GET queries and POST data. Even data sent over secure HTTPS can be viewed in unencrypted form. IEWatch allows the most extensive filtering, including filters on HTTP headers and response content. The HTML code window features color syntax highlighting and a breakdown of the HTML | |||
Updated: 2, 2006 | Rating: 0 | Author: IEWatch Software | Size: 870 kb | Shareware Go to category: Development > Other Similar programs | |||
|
Home > Secure information software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|