|
||||||
|
||
|
Home > Facility security software |
Related keywords: security, Security, computer security, internet security, security software, information security, SECURITY, file security, windows security, network security |
|
|
511. | OpenSSL 0.9.7c (download.componentspot.com) | ||
take advantage of Secure Sockets Layer (SSL v2/v3), Transport Layer Security (TLS v1). The Open SSL library uses the included full-strength general-purpose cryptography library, which can be used by itself. Security features such as the following can be implemented: · Data integrity: An | |||
Updated: 9, 2005 | Rating: 0 | Author: Component Spot | Size: 2879 kb | Freeware Go to category: Development > C / C++ / C-sharp Similar programs | |||
512. | PE Corrector 1.84 (gigamindsystems.com) | ||
trash in the header. But also it may contain even your personal security data from your disks (passwords, for example). PE Corrector can correct this problem. It simply clean the headers in safe mode and erase all illegal information. Also you can insert your own info into header (copyright information, for example).; - Some compilers inserts into PE files some export functions | |||
Updated: 9, 2005 | Rating: 0 | Author: GigaMind Systems | Size: 630 kb | Shareware Go to category: Development > Source Editors Similar programs | |||
513. | PELock 1.06 (pelock.pac.pl) | ||
• compression of the application (code, imports, resources), it's possible to decrease executable size even 70% of original file • encryption of code (publicly available cryptographic algorithms and algorithms build polymorphic ally) • reorganization of basic PE EXE structures in order to assure better ratio during compression • deletion of unnecessary structures in executable | |||
Updated: 9, 2005 | Rating: 0 | Author: Bartosz Wójcik | Size: 422 kb | Demo Go to category: Development > Other Similar programs | |||
514. | EDCrypt 3.1 (softuarium.com) | ||
Softuarium EDCrypt is an ActiveX control performing following functions: - encrypts and decrypts text and files using symmetrical ciphers: BLOWFISH, CAST128, GOST, RC2, RIJNDAEL, TWOFISH - computes hashes (message digests) of text and files using hashing algorithms: ADLER32, CRC32, CRC32B, GOST, HAVAL128 | |||
Updated: 9, 2005 | Rating: 0 | Author: Eric Sewillo | Size: 390 kb | Shareware Go to category: Development > Other Similar programs | |||
515. | Elegant InterFace 4.0 4.0 04-06-03 (pieproducts.com) | ||
comma delimited, MS Word Mail Merge and Excel spreadsheet formats. Security Administrator was designed to allow individual security right be set at runtime by the end user or system administrator. Easily manage user ID, Passwords and object rights including: open, read, write and delete permissions. Manipulate colors preferences and logos. Fast and accurate rescale routines | |||
Updated: 9, 2005 | Rating: 0 | Author: Mark Crum | Size: 6885 kb | Shareware Go to category: Graphic Apps > Other Similar programs | |||
516. | Engineers Edition 3.2 (solarwinds.net) | ||
The Engineers Edition contains 36 Network Discovery, Monitoring and Management tools. Build a DB of your network with NETWORK SONAR, or use IP NETWORK BROWSER to quickly discover an entire subnet. With the NETWORK PERFORMANCE MONITOR you can not only monitor traffic and bandwidth utilization but set alert | |||
Updated: 9, 2005 | Rating: 82 | Author: Doug Rogers | Size: 51286 kb | Shareware Go to category: Network & Internet > Other Similar programs | |||
517. | FTP Component 1.0 (download.componentspot.com) | ||
.NET Framework class library contains no classes that will allow developers to access File Transfer Protocol (FTP) services directly. KCommon’s FTP component was designed to compensate for the fact that .NET lacks FTP support. With this FTP component, programmers can build either Windows Forms or ASP.NET (Web Forms) applications that will allow users to send or | |||
Updated: 9, 2005 | Rating: 0 | Author: Component Spot | Size: 843 kb | Freeware Go to category: Development > C / C++ / C-sharp Similar programs | |||
518. | gReg 4.55 (gitanosoftware.com) | ||
that locks out thieves permanently. Smoke your competitors with gReg's advanced customer tracking and technical support history. You and your customer support staff can satisfy every customer quickly and efficiently with our system .Cut your advertising time and costs in half! Use gReg to distribute an | |||
Updated: 9, 2005 | Rating: 0 | Author: Jesus Moreno | Size: 5840 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
519. | Installgen 1.75 (dotcomsolutionsinc.net) | ||
Functionality for Solaris, Windows, Linux and Mac OS X -- Improved Security Implementation -- Implement Oracle Best Practices -- 15 Database Recovery Scenarios Documented -- RMAN Backup Process -- Multiple Backup Processes Supported -- Disaster Recovery Script Runs Nightly -- Pre-Install | |||
Updated: 9, 2005 | Rating: 39 | Author: David Simpson | Size: 2296 kb | Commercial Go to category: Business > Databases & Tools Similar programs | |||
520. | KeyedAccess for MS Access 2.0 (peterssoftware.com) | ||
to generate an installation-specific Serial Number on the end-user's computer which can be unlocked with a corresponding Unlock Code. Using KeyedAccess means you can create shareware-type versions of your MS Access application where some functionality is locked and is only unlocked when the user enters a valid key. When using the Installation Serial Number and Unlock Code | |||
Updated: 9, 2005 | Rating: 0 | Author: Peter De Baets | Size: 774 kb | Demo Go to category: Development > Other Similar programs | |||
|
Home > Facility security software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|