|
||||||
|
||
|
Home > Protect windows software |
Related keywords: windows, Windows, protect, Windows XP DDK, windows clipboard, windows ce, Windows 2000, Windows XP, Windows NT, windows explorer |
|
|
701. | ShareGuard V1 1 (zappersoftware.com) | ||
For Shareware developers who want to protect their software. Consists of 4 components: (1) ShareGuard Lock (2) ShareGuard Key (3) ShareGuard Locksmith (4) CRC Check. (1) ShareGuard Lock is the program that protects your software from reverse engineering and from being used longer than the specified demonstration period. This is called by your software and is displayed | |||
Updated: 9, 2005 | Rating: 0 | Author: William Bradshaw | Size: 2490 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
702. | SignetSure 1.0 (SignetSure.com) | ||
to your subscribers. You have installed a program on the subscriber's machine that receives your files. This program must be able to authenticate files even against a hacker who has reverse-engineered your program. Scenario Two: You distribute registered software with a datafile that identifies | |||
Updated: 9, 2005 | Rating: 0 | Author: Jim Serwer | Size: 696 kb | Shareware Go to category: Development > Delphi Similar programs | |||
703. | EasyLicenser 2.0.02 (agilis-sw.com) | ||
runtime charges for multiple languages and platforms. EasyLicenser's non-intrusive operation will encourage the ISV's users into compliance, thus further improving the bottom line.Most commonly used license models are supported, and you can further customize the licensing options to meet your | |||
Updated: 9, 2005 | Rating: 56 | Author: Technical Support | Size: 3906 kb | Demo Go to category: Web Development > Java & JavaScript Similar programs | |||
704. | EasySec Firewall SDK 1.10b (effectmatrix.com) | ||
network firewall, sniffer or analyzer applications for Microsoft Windows. Simple APIs of EasySec Firewall SDK include powerful functions: Double layer packet filter (application layer and kernel layer) can manage and control data packets of all kinds network protocols quickly and correctly. Application auditing avoids back door program leaking sensitive information, and generates | |||
Updated: 9, 2005 | Rating: 48 | Author: Hanse wu | Size: 1055 kb | Shareware Go to category: Development > Other Similar programs | |||
705. | HUSB Virtual Driver (HUSBVD) 2.0 (alarit.com) | ||
of this technology. LetOs suppose you have purchased the software protected by USB HASP KEY, but you want this product to be used on several computers, but in different time. If the computers are located close - it is not a problem to pull out the USB HASP KEY from one computer and to insert into | |||
Updated: 9, 2005 | Rating: 39 | Author: Fernando Chavez | Size: 547 kb | Commercial Go to category: System Utilities > Other Similar programs | |||
706. | LASsie (Light Application Security) for MS Access 4.3 (peterssoftware.com) | ||
certain controls, filter certain records, all based on a user’s assigned Security Level. LASsie includes a friendly user sign-on form that prompts for a login user name and password. Users can change their own passwords via the included "change password" form. Optionally, the sign-on form can be bypassed and the user's network login username can be used. Once the user | |||
Updated: 9, 2005 | Rating: 0 | Author: Peter De Baets | Size: 770 kb | Shareware Go to category: Development > Other Similar programs | |||
707. | ACProtect standard 1.20 (ultraprotect.com) | ||
is an application that allows you to protect Windows executable files(PE files) against piracy. Using public keys encryption algorithms (RSA) to create and verify the registration keys and unlock some RSA key locked code. It has an Embedded Protector against file dumping and unpackers. It also has many anti-debug tricks with specialized API system. Mutual communication | |||
Updated: 9, 2005 | Rating: 152 | Author: risco software | Size: 1604 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
708. | AlarIT Virtual USB Driver 2.1 (alarit.com) | ||
of this technology. LetOs suppose you have purchased the software protected by USB HASP KEY, but you want this product to be used on several computers, but in different time. If the computers are located close - it is not a problem to pull out the USB HASP KEY from one computer and to insert into | |||
Updated: 9, 2005 | Rating: 98 | Author: Max Zotov | Size: 547 kb | Commercial Go to category: System Utilities > Other Similar programs | |||
709. | Alkonost ContraCopy 3.00 (contracopy.com) | ||
a professional software system, that can create diskettes for a copy protected software distribution. It is a tool for programmers for C, C++, VB.NET, Visual Basic, Borland Delphi and C++ Builder. Alkonost ContraCopy enables you to prepare key diskettes using an ordinary 1.44 MB floppy drive | |||
Updated: 9, 2005 | Rating: 36 | Author: Alexander Turin | Size: 1060 kb | Demo Go to category: Development > Management & Distribution Similar programs | |||
710. | Amirus Mirror Memory 1.4.40 (CitrusControls.com) | ||
at either Shared or Exclusive levels, allowing efficient and protected access to read-only and read-write memory structures. The system can be integrated with an existing hardware reflective memory ring through a hardware-independent user-written library (available with installation of an additional license). Sections of memory on the hardware side can be mapped into AmirusMM | |||
Updated: 9, 2005 | Rating: 24 | Author: Tony Cox | Size: 9454 kb | Shareware Go to category: Development > Other Similar programs | |||
|
Home > Protect windows software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|