|
||||||
|
||
|
Home > Back up software |
|
|
521. | dtrt.NavBarWin 1.0 (dtrt.com) | ||
be implemented in a matter of minutes, a quick start guide gets you up and working in no time. Samples in VB.NET and C# are provided to show you a possible implementation. Programming parameter info's and quick info as well as an extensive help system (context-sensitive and standalone) aids you while | |||
Updated: 9, 2005 | Rating: 0 | Author: Raymond Tellenbach | Size: 4346 kb | Commercial Go to category: Development > Components & Libraries Similar programs | |||
522. | EasySec Firewall SDK 1.10b (effectmatrix.com) | ||
network protocols quickly and correctly. Application auditing avoids back door program leaking sensitive information, and generates application filter rule intelligently. Particular filter rules of net neighborhood can manage and control the shared resource, prevent information leaking from local network; Lots kinds of filter rules can achieve your requirement for managing network | |||
Updated: 9, 2005 | Rating: 48 | Author: Hanse wu | Size: 1055 kb | Shareware Go to category: Development > Other Similar programs | |||
523. | Java Help 2.0 (jsarma.phpwebhosting.com) | ||
on a word you want to search for and press a key; Java Help comes up instantaneously with a list to choose from. Most popular editors are supported, including CRiSP, EditPlus, Epsilon, jEdit, NoteTab, TextPad, UltraEdit, VEdit, WinEdit, ZeusEdit. Most others can be configured. INSTALLATION To | |||
Updated: 9, 2005 | Rating: 42 | Author: Vithal Kuchibhotla | Size: 1047 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
524. | MDBSecure 1.1.0 (mindwarp-consultancy-software.com) | ||
do to secure a database? 1.Create new workgroup, Join it, 2.Open up a database or create new one, 3.Create Super User with password, 4.Log out / then login in with it, 5.Create new database, Add passwords for Admin, 6.Start modifying permissions, Remove them from Admin and Admins Group, 7. Now Encrypt, 8. Add new groups and permissions, 9. Import tables etc from master database | |||
Updated: 9, 2005 | Rating: 82 | Author: Julian Moorhouse | Size: 1062 kb | Shareware Go to category: Development > Other Similar programs | |||
525. | Chilkat Compression ActiveX Control 9.3.0 (zip-compression.com) | ||
operation while in progress. AES Encryption Encrypt your data using up to 256-bit AES encryption. Also supports Blowfish and Twofish encryption algorithms. Embed ZIPs into EXEs Embed ZIP files directly into EXEs, and access them from your program. The ZIP is embedded as a named resource, and any number | |||
Updated: 9, 2005 | Rating: 0 | Author: Matt Fausey | Size: 2000 kb | Shareware Go to category: Development > Active X Similar programs | |||
526. | Chilkat Data Compression ActiveX 9.3.0 (zip-compression.com) | ||
operation while in progress. AES Encryption Encrypt your data using up to 256-bit AES encryption. Also supports Blowfish and Twofish encryption algorithms. Embed ZIPs into EXEs Embed ZIP files directly into EXEs, and access them from your program. The ZIP is embedded as a named resource, and any number | |||
Updated: 9, 2005 | Rating: 0 | Author: Matt Fausey | Size: 2000 kb | Shareware Go to category: Development > Active X Similar programs | |||
527. | Chilkat File Compression ActiveX 9.3.0 (zip-compression.com) | ||
operation while in progress. AES Encryption Encrypt your data using up to 256-bit AES encryption. Also supports Blowfish and Twofish encryption algorithms. Embed ZIPs into EXEs Embed ZIP files directly into EXEs, and access them from your program. The ZIP is embedded as a named resource, and any number | |||
Updated: 9, 2005 | Rating: 0 | Author: Matt Fausey | Size: 2000 kb | Shareware Go to category: Development > Active X Similar programs | |||
528. | Chilkat Zip ActiveX Compression Component 9.3.0 (chilkatsoft.com) | ||
while in progress. AES Encryption Encrypt your data using up to 256-bit AES encryption. Also supports Blowfish and Twofish encryption algorithms. Embed ZIPs into EXEs Embed ZIP files directly into EXEs, and access them from your program. The ZIP is embedded as a named resource, and any number of ZIPs can be embedded in a single EXE. Create Self-Extracting EXEs Works with | |||
Updated: 9, 2005 | Rating: 0 | Author: Matt Fausey | Size: 2000 kb | Shareware Go to category: Development > Other Similar programs | |||
529. | Chilkat Zip ActiveX - Affordable Zip ActiveX 9.3.0 (zip-compression.com) | ||
operation while in progress. AES Encryption Encrypt your data using up to 256-bit AES encryption. Also supports Blowfish and Twofish encryption algorithms. Embed ZIPs into EXEs Embed ZIP files directly into EXEs, and access them from your program. The ZIP is embedded as a named resource, and any number | |||
Updated: 9, 2005 | Rating: 0 | Author: Matt Fausey | Size: 2000 kb | Shareware Go to category: Development > Active X Similar programs | |||
530. | !Chilkat Zip ActiveX Control 9.3.0 (zip-compression.com) | ||
operation while in progress. AES Encryption Encrypt your data using up to 256-bit AES encryption. Also supports Blowfish and Twofish encryption algorithms. Embed ZIPs into EXEs Embed ZIP files directly into EXEs, and access them from your program. The ZIP is embedded as a named resource, and any number | |||
Updated: 9, 2005 | Rating: 16 | Author: Matt Fausey | Size: 2000 kb | Shareware Go to category: Development > Active X Similar programs | |||
|
Home > Back up software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|