|
||||||
|
||
|
Home > Sectors software |
Related keywords: bad sectors |
|
|
71. | wodImapServer 2.0.0.0 (weonlydo.com) | ||
implementation. All you need to do is to put it on VB form, call it's Start method and it's immediately accepting connections by your clients! It fully supports commands defined in RFC2060. Since wodImapServer is COM object and not the full application, there's few things developer | |||
Updated: 2, 2006 | Rating: 0 | Author: Kresimir Petric | Size: 1033 kb | Shareware Go to category: Development > Components & Libraries Similar programs | |||
72. | wodPop3Server 1.3.2.0 (weonlydo.com) | ||
implementation. All you need to do is to put it on VB form, call it's Start method and it's immediately accepting connections by your clients! It fully supports commands defined in RFC1939. Use your favorite mail client (such as Outlook Express or Eudora) to read mail provided by your own | |||
Updated: 2, 2006 | Rating: 0 | Author: Kresimir Petric | Size: 857 kb | Shareware Go to category: Development > Components & Libraries Similar programs | |||
73. | wodFtpDLX 2.5.1.0 (weonlydo.com) | ||
and is not visible on the form, or GUI ActiveX version that has it's own Explorer-alike window where you can give end users ability to interact directly with the server Features: FTP, FTP+SSL with and without encrypted data channel, and SFTP (SSH subsystem) protocols Certificate authentication | |||
Updated: 2, 2006 | Rating: 0 | Author: Kresimir Petric | Size: 2967 kb | Shareware Go to category: Network & Internet > FTP Clients Similar programs | |||
74. | wodTelnetDLX 2.1.8.0 (weonlydo.com) | ||
wodTelnetDLX is a telnet client component ready to connect to various terminal based clients, most commonly to UNIX telnet daemon. Besides supported Telnet protocol, it also supports secured communication (through encryption) using well known SSH (SSH1 and SSH2 are supported), as well as SSL/TLS (Secure | |||
Updated: 2, 2006 | Rating: 0 | Author: Kresimir Petric | Size: 1850 kb | Shareware Go to category: Network & Internet > Remote Computing Similar programs | |||
75. | wodSSH 2.3.7.0 (weonlydo.com) | ||
It also supports blocking and non-blocking operations, thus it's suitable for many environments, such as ASP. Using WaitFor and Execute methods, it will behave just like expect command known from UNIX systems. When you're unsure when to send actual command, wodSSH may help also. Using it's unique Prompt property, it can fire event for you whenever remote server sent | |||
Updated: 2, 2006 | Rating: 42 | Author: Kresimir Petric | Size: 1231 kb | Shareware Go to category: Network & Internet > Remote Computing Similar programs | |||
76. | wodSSHServer 1.3.0.0 (weonlydo.com) | ||
will show you, step by step, how to manually respond to client's actions. You can make an interface that will talk to the clients (like an BBS system), they will enter commands and different type of values in your program where you can evaluate them. This is ideal for making restricted access area | |||
Updated: 2, 2006 | Rating: 0 | Author: Kresimir Petric | Size: 1368 kb | Shareware Go to category: Servers > Telnet Servers Similar programs | |||
77. | wodSSHTunnel 1.5.0.0 (weonlydo.com) | ||
you can allow or deny user to use secure channel - once again, it's your decision. If you allow user to connect and use channel, everything is done by wodSSHTunnel, and you don't need to do anything else wodSSHTunnel component is server-type component that will add secure tunneling (based on SSH protocol) capabilities to your application. Based on your rules and definitions, it will | |||
Updated: 2, 2006 | Rating: 42 | Author: Kresimir Petric | Size: 1317 kb | Shareware Go to category: Servers > Telnet Servers Similar programs | |||
78. | Silver Key 3.3 (filecryption.com) | ||
If you need to send sensitive data over the Internet you should encrypt it first. Anybody knows this. Right, but what about the other side? You correspondent will probably not like the idea of buying and learning some software just to decrypt your file. No problem here if you are using Silver Key | |||
Updated: 2, 2006 | Rating: 0 | Author: Inv Softworks | Size: 3935 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
79. | Citation 3.15.14 (padfile.radsoftware.org) | ||
or assemble a sub-list of citations that have some common element(s) that you define. Finally, Citation has flexible printing options that let you print any one citation, or any list of citations. Altogether, Citation is a powerful, flexible tool for entering and maintaining a searchable, printable database of your agency's traffic citations. Citation is law enforcement | |||
Updated: 2, 2006 | Rating: 0 | Author: Rad Software | Size: 1163 kb | Commercial Go to category: System Utilities > Shell Tools Similar programs | |||
80. | Windows Security Officer 6.8.1.1 (1securitycenter.com) | ||
they can do it while they have access to those resources. If a user's time limit has been set and it has been reached, the computer shuts itself off and that user can not log-on again until their permitted time range arrives. Windows Security Officer enables you to protect and totally control access to | |||
Updated: 2, 2006 | Rating: 0 | Author: Eugene Mihailov | Size: 1578 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
|
Home > Sectors software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|