|
||||||
|
||
|
Home > Keyboard software software |
Related keywords: software, Software, keyboard, RAD Software, free software, spy software, backup software, dating software, shopping cart software, outlook software |
|
|
591. | HardKey License Manager 3.2 (softcomplete.com) | ||
code level. In many cases this garantees hard-stop hackink of your software product. - Clipboard automatic parser for program registration info (plugins, ShareIt, RegNow). - Template manager for registration keys delivery. (plugins, Bat, Outlook) - Wise installer integration - External keygen for redistribute (ShareIt keygen sample, Web-based keygen sample) - Bath serials | |||
Updated: 9, 2005 | Rating: 536 | Size: 8054 kb | Shareware Go to category: Development > Management & Distribution Similar programs | |||
592. | HUSB Virtual Driver (HUSBVD) 2.0 (alarit.com) | ||
devices through the network TCP/IP. These solutions contain, both software and the hardware. Our company as well has the like solution: it is a product for the remote control of consecutive devices ENSD. Nowadays there are more and more devices with interface USB as alternative to the parallel or consecutive connection, but there are still no decisions on the remote control of USB | |||
Updated: 9, 2005 | Rating: 39 | Author: Fernando Chavez | Size: 547 kb | Commercial Go to category: System Utilities > Other Similar programs | |||
593. | ICE License 2.01 (aidsoft.com) | ||
ICE License Protection is providing a high barrier against illegal copy using the power of Elliptic Curvesl Asymmetric Encryption to protect your application. Elliptic Curves encryption system allow transmission of secret information over an open channel without a common secret key previously shared between | |||
Updated: 9, 2005 | Rating: 0 | Author: Bruno Branciforti | Size: 439 kb | Shareware Go to category: Development > Delphi Similar programs | |||
594. | KeyedAccess for MS Access 2.0 (peterssoftware.com) | ||
to generate an installation-specific Serial Number on the end-user's computer which can be unlocked with a corresponding Unlock Code. Using KeyedAccess means you can create shareware-type versions of your MS Access application where some functionality is locked and is only unlocked when the user enters a valid key. When using the Installation Serial Number and Unlock Code | |||
Updated: 9, 2005 | Rating: 0 | Author: Peter De Baets | Size: 774 kb | Demo Go to category: Development > Other Similar programs | |||
595. | Mihov ASCII Master 2.0 (mihov.com) | ||
ASCII value of the key pressed - both in decimal and hex! Great for software developers! Mihov ASCII Master is a simple but useful utility that shows you ASCII value of the key pressed - both in decimal and hex! Great for software | |||
Updated: 9, 2005 | Rating: 0 | Author: Miha Psenica | Size: 387 kb | Freeware Go to category: Development > Management & Distribution Similar programs | |||
596. | MSCCrypto for Linux 2.0 (miraplacid.com) | ||
MSCCrypto is COM component for Active Server Pages and stand-alone applications. It includes collection of the best encryption and hashing algorithms: - RSA public key algorithm (512/1024/2048 bits key size) - AES symmetric block algorithm (128/192/256 bits key size) - Blowfish symmetric block Includes PGP/OpenPGP compatible component | |||
Updated: 9, 2005 | Rating: 0 | Author: Miraplacid Software Development | Size: 225 kb | Shareware Go to category: Web Development > ASP & PHP Similar programs | |||
597. | CodeVista II 2.0.61 (macrovista.biz) | ||
With CodeVista, programmers can store and organize snippets of code, whole classes or even complete program installation kits as well as any other type of files together with rich text formatted notes and descriptions, Internet links, whole HTML pages and much more! MVCodeVista is directed at programmers | |||
Updated: 9, 2005 | Rating: 0 | Author: Marek Vsechovsky | Size: 7831 kb | Shareware Go to category: Development > Other Similar programs | |||
598. | cryptlib 3.0 (download.componentspot.com) | ||
MD4, MD5 · RIPEMD-160 · SHA It offers services such as: · S/MIME · SSL/TLS · ssh It features various hashed message authentication code algorithms: · HMAC-MD5, HMAC-SHA, HMAC-RIPEMD-160 Finally, asymmetric (public/private key) encryption algorithms such as the following are | |||
Updated: 9, 2005 | Rating: 0 | Author: ComponentSpot | Size: 1347 kb | Freeware Go to category: Development > Active X Similar programs | |||
599. | Cryptocx v5 5.1.6 (easybyte.com) | ||
What is Cryptocx v5? Cryptocx is an encryption component designed for use in any modern development environment. Cryptocx encrypts and decrypts data using standards compliant algorithms to make sure that your information is totally secured. It is very easy to add Cryptocx to an existing application or web | |||
Updated: 9, 2005 | Rating: 39 | Author: EasyByte Software | Size: 4099 kb | Demo Go to category: Development > Active X Similar programs | |||
600. | CT Messenger 2.0 (ivrsoft.com) | ||
card. Unlike other programs of this type, CT Messenger uses software DSP algorithms for detecting the type of response (busy, no answer, voice answer). CT Messenger software does not rely on the answer detection capabilities of the underlying hardware, and it works with inexpensive voice modems. CT Messenger 2.0 (Mint Components Inc.) is a component software | |||
Updated: 9, 2005 | Rating: 0 | Author: IVR Software | Size: 6603 kb | Shareware Go to category: Development > Other Similar programs | |||
|
Home > Keyboard software software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|