|
||||||
|
||
|
Home > Important software |
Related keywords: important document, important dates, important files, but important information close at hand |
|
|
581. | SecureCode 2.0 (aidsoft.com) | ||
against reverse engineering and illegal decompilation. If you have important code and you do not want a competitor to see, use SecureCode !You can use as protection against reverse-engineering or you can use as additionnal protection with you current registration scheme.The security is internal at your software, it's an advantage for your application to prevent against generic crack | |||
Updated: 9, 2005 | Rating: 16 | Author: Bruno Branciforti | Size: 830 kb | Shareware Go to category: Development > Delphi Similar programs | |||
582. | Setup Specialist 2002 SR-3 (setupspecialist.com) | ||
that leaves your customers with a good first impression is an important key-element for the success of your application. With its award-winning innovative visual development environment Setup Specialist 2002 offers you a powerful, flexible, yet easy way to deploy your application to your customers. The advanced customization capabilities of Setup Specialist's visual development | |||
Updated: 9, 2005 | Rating: 0 | Author: TG Byte Software GmbH | Size: 4841 kb | Shareware Go to category: Development > Install & Setup Similar programs | |||
583. | SignetSure 1.0 (SignetSure.com) | ||
user (e.g. user name, product serial number, et cetera). It is important that users not be able to modify their own registration information, even if someone reverse-engineers your program. SignetSure solves the problems of both these scenarios. SignetSure uses RSA public key cryptography. First create an encryption key and sign a file using a simple GUI application. Then | |||
Updated: 9, 2005 | Rating: 0 | Author: Jim Serwer | Size: 696 kb | Shareware Go to category: Development > Delphi Similar programs | |||
584. | Enterprise Java Application Server 2.1 (essencomp.com) | ||
The Container controls the Enterprise Beans and provides them with important Systems-Level Services. The Container provides the following services to Enterprise Bean: 1) Transaction Management. 2) Security. 3) Remote Client Connectivity. 4) Life Cycle Management. 5) Database Connection Pooling. The Enterprise Java Application Server (EJAS) is a framework for developing and | |||
Updated: 9, 2005 | Rating: 0 | Author: Apurva Parekh | Size: 17149 kb | Commercial Go to category: Web Development > Java & JavaScript Similar programs | |||
585. | Cryptocx v5 5.1.6 (easybyte.com) | ||
a very easy to use bundle. Data security is becoming more and more important, with developers wanting to add secure data encryption facilities to their programs and web sites. The versatility of Cryptocx, combined with the fastest file encryption available anywhere, full PGP support and the ability to | |||
Updated: 9, 2005 | Rating: 39 | Author: EasyByte Software | Size: 4099 kb | Demo Go to category: Development > Active X Similar programs | |||
586. | CT Messenger 2.0 (ivrsoft.com) | ||
COM objects that enable a Windows or Web application to bring important information to its users in the form of text pages, phone calls or SMS messages via any TAPI compliant hardware including a voice modem or telephony card. Unlike other programs of this type, CT Messenger uses software DSP algorithms for detecting the type of response (busy, no answer, voice answer). CT | |||
Updated: 9, 2005 | Rating: 0 | Author: IVR Software | Size: 6603 kb | Shareware Go to category: Development > Other Similar programs | |||
587. | Able Submitter 2.2 (aes.safeworld.info) | ||
try out Able Submitter today. This tool submits websites in several important international searchengines. It is very easy to use and very fast. Just insert the URL, Email and other important data in a form. Free URL submitter to Search Engines, Directories and Link | |||
Updated: 9, 2005 | Rating: 302 | Size: 1269 kb | Freeware Go to category: Network & Internet > Other Similar programs | |||
588. | ACProtect standard 1.20 (ultraprotect.com) | ||
(OEP) when rebuilding your Import table. Dynamic En/Decrypt- Important code of ur program can be decrypted before running and encrypt again after finished running. RSA-Lock Codes - With RSA keys system a cracker can not write a KeyGen (or KeyMaker) for your product without the RSA private key (the RSA private key is only in the author's hand). You may also specify some code to | |||
Updated: 9, 2005 | Rating: 152 | Author: risco software | Size: 1604 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
589. | Affiliate Creator 1.0 (affiliate-creator.com) | ||
Why use Affiliate Creator? - Save time and concentrate on the important thing. Affiliate Creator helps you create custom builds quickly. All you need to do is adding 3 or 4 lines of code to your application and clicking the Build button on Affiliate Creator. - Save web traffic and money. With Affiliate Creator, you can build Self-Creator for your affiliates to build | |||
Updated: 9, 2005 | Rating: 0 | Author: James Dong | Size: 1850 kb | Shareware Go to category: Development > Install & Setup Similar programs | |||
590. | Aurigma Graphics Mill 2.0 (aurigma.com) | ||
Mill 2.0 is a "must have" imaging component. It supplies the most important features: load/save popular formats, apply effects, draw text/shapes, use color management, etc. It provides a solid basis to build professional imaging software. When other imaging component vendors left ActiveX platform and focused on .NET market, Aurigma decided that it is too early to drop the ActiveX | |||
Updated: 9, 2005 | Rating: 16 | Author: Fedor Skvortsov | Size: 5386 kb | Shareware Go to category: Development > Other Similar programs | |||
|
Home > Important software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|