|
||||||
|
||
|
Home > Protect software software |
Related keywords: software, Software, protect, RAD Software, free software, spy software, backup software, dating software, shopping cart software, outlook software |
|
|
581. | Origin Keyring 1.1 (membres.lycos.fr) | ||
Easy to use, well documented, it takes less than few minutes to protect your software. You can use it in any developpement environnement accepting dll's. The package contains a dll to include to the encrypted software, a software generator, and sample programme to test the générated serials. The source files of these two programs are fully documented and | |||
Updated: 3, 2005 | Rating: 0 | Author: Kébir Jbil | Size: 912 kb | Shareware Go to category: Development > Install & Setup Similar programs | |||
582. | E.Box 1.0.3 (jpsoft.dk) | ||
via normal SMTP server or by DNS through MX lookup. Use E.Box to protect your mailbox from vira, account lockup and spammers that keep hitting at you E.Box is a professional e-mail accounts management tool allowing you to preview your mailbox on the server prior to downloading messages from the server. E.Box shows all mail headers and detailed information on | |||
Updated: 3, 2005 | Rating: 0 | Author: Jan Pedersen | Size: 858 kb | Shareware Go to category: Communications > E-Mail Clients Similar programs | |||
583. | eBookSnap Ebook Creator Software 1.2 (ebooksnap.com) | ||
over which pages of your ebook people may access. You can password-protect one, ten or all of your pages (such as with unregistered users). You can also add an expiry date or disable your book after a given number of days or views.Your book is compatible with Flash, Quicktime, JavaScript, XML, PDF and any other media and IE-compatible language currently used. Your book can be a | |||
Updated: 3, 2005 | Rating: 42 | Author: Konrad Kasior | Size: 1200 kb | Demo Go to category: Business > Other Similar programs | |||
584. | Silent Spy 2.0.4 (silent-spy.com) | ||
graphical summary reports from simple setup and operation. Password protected and completely invisible to the user. Activity monitoring for network or home use, report on all user activity. Detailed activity recording including keystrokes and graphical summary reports from simple setup and operation. Password protected and completely invisible to the | |||
Updated: 3, 2005 | Rating: 116 | Size: 3685 kb | Shareware Go to category: Business > Other Similar programs | |||
585. | CapLendar 2.1 (pages.infinit.net) | ||
Now you can... Here is an overview of what you can do with this software: Select a background picture for each month; Select a color set to match each month picture; Protect your file with a password (AES encryption); Print up to seven events per day/cell; Preview and print the calendar; Manage a list of events that occurs on daily, monthly, weekly, biweekly or yearly basis | |||
Updated: 3, 2005 | Rating: 48 | Author: Pascal Tremblay | Size: 9494 kb | Shareware Go to category: Business > Accounting & Finance Similar programs | |||
586. | Pass-IT 1/5 (moonlight-software.com) | ||
have any "unzipping" utility to open your archive! You can password-protect your archives for extra security, and you can select any file within your Pass-IT archive and have it automatically open or run as soon when your archive is opened. Great for presentations, slide shows, and more! Free trial | |||
Updated: 3, 2005 | Rating: 0 | Author: George Balla | Size: 982 kb | Shareware Go to category: Audio & Multimedia > Other Similar programs | |||
587. | PC Tattletale Parental Control & Surveillance Software 7.4.01 (pctattletale.com) | ||
parental control software & Internet monitoring software captures everything your child does online; what they see, where they go & even who they talk to! This easy to use Internet monitoring & parental control software makes it easy to help protect your children when they go online, use instant messaging, chat rooms or anytime children are online. PC | |||
Updated: 8, 2004 | Rating: 0 | Author: Don Schnure | Size: 230134 kb | Demo Go to category: System Utilities > Other Similar programs | |||
588. | Heidi R. Stealthy (TM) 2.0 (owendigital.com) | ||
Fun. Inexpensive. Who's that looking over your shoulder right now? Protect your Privacy. With a single mouse-click, Heidi R. Stealthy (TM) allows you to instantly conceal your current PC or laptop activities from your friends, family, coworkers, roommates, casual onlookers and | |||
Updated: 8, 2004 | Rating: 0 | Size: 1172 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
589. | Advanced HTMLCoder 3.0 (raysion.com) | ||
to shrink the size of your Web pages, restrict access to them and protect your code from unauthorized viewing. Use this utility to optimize the HTML, CSS and JavaScript code by removing redundant spaces, lines and characters and changing styles, classes and variable names for the shorter ones. It can also compress the pages making them smaller and their code - human-unreadable (all | |||
Updated: 8, 2004 | Rating: 59 | Author: Raysion Software Team | Size: 635 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
590. | hCrypt 3.0 (raysion.com) | ||
friendly and easy-to-use program that helps you encrypt and password-protect Web pages that are not intended for public access. The program features clear wizard-style interface that enables you to process multiple files at a time and configure various advanced protection settings in a few simple steps. For strong protection you can use powerful Blowfish (448 bit encryption, password | |||
Updated: 8, 2004 | Rating: 0 | Author: Raysion Software Team | Size: 623 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
|
Home > Protect software software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|