|
||||||
|
||
|
Home > Securing software |
|
|
71. | wodImapServer 2.0.0.0 (weonlydo.com) | ||
WeOnlyDo! COM ImapServer ActiveX control is component that can be easily integrated into your applications to provide full IMAP4rev1 protocol server implementation. All you need to do is to put it on VB form, call it's Start method and it's immediately accepting connections by your clients! It fully supports | |||
Updated: 2, 2006 | Rating: 0 | Author: Kresimir Petric | Size: 1033 kb | Shareware Go to category: Development > Components & Libraries Similar programs | |||
72. | wodPop3Server 1.3.2.0 (weonlydo.com) | ||
WeOnlyDo! COM Pop3Server ActiveX control is a component that can be easily integrated into your applications to provide full Pop3 protocol server implementation. All you need to do is to put it on VB form, call it's Start method and it's immediately accepting connections by your clients! It fully supports | |||
Updated: 2, 2006 | Rating: 0 | Author: Kresimir Petric | Size: 857 kb | Shareware Go to category: Development > Components & Libraries Similar programs | |||
73. | wodFtpDLX 2.5.1.0 (weonlydo.com) | ||
files. It supports old, very common, FTP protocol, but also secured FTPS (FTP+SSL) and SFTP | |||
Updated: 2, 2006 | Rating: 0 | Author: Kresimir Petric | Size: 2967 kb | Shareware Go to category: Network & Internet > FTP Clients Similar programs | |||
74. | wodTelnetDLX 2.1.8.0 (weonlydo.com) | ||
telnet daemon. Besides supported Telnet protocol, it also supports secured communication (through encryption) using well known SSH (SSH1 and SSH2 are supported), as well as SSL/TLS (Secure Socket Layer protocol). ActiveX version of the component has its own Terminal GUI (Graphic user | |||
Updated: 2, 2006 | Rating: 0 | Author: Kresimir Petric | Size: 1850 kb | Shareware Go to category: Network & Internet > Remote Computing Similar programs | |||
75. | wodSSH 2.3.7.0 (weonlydo.com) | ||
wodSSH does even more: it allows you to communicate encrypted (and secured, of course) with SSH1 and SSH2 (secure-shell) servers, as well as any other non-encrypted server (such as SMTP or POP3). For ones that don't know - the SSH transport layer is a secure low level transport protocol. It provides strong encryption, cryptographic host authentication, and integrity | |||
Updated: 2, 2006 | Rating: 42 | Author: Kresimir Petric | Size: 1231 kb | Shareware Go to category: Network & Internet > Remote Computing Similar programs | |||
76. | wodSSHServer 1.3.0.0 (weonlydo.com) | ||
start some program of their choice use internally provided SFTP (secure ftp) server, or open port forwarding for other programs All of this, of course, can be adjusted by your needs. By default, server will not allow anyone to login unless you specify so (using LoginPassword event that is fired | |||
Updated: 2, 2006 | Rating: 0 | Author: Kresimir Petric | Size: 1368 kb | Shareware Go to category: Servers > Telnet Servers Similar programs | |||
77. | wodSSHTunnel 1.5.0.0 (weonlydo.com) | ||
component is server-type component that will add secure tunneling (based on SSH protocol) capabilities to your application. Based on your rules and definitions, it will accept local connections, encrypt it and forward to SSH server (where they will be decrypted and sent to destination host). SSH server is required for this component to work - encryption will take place between | |||
Updated: 2, 2006 | Rating: 42 | Author: Kresimir Petric | Size: 1317 kb | Shareware Go to category: Servers > Telnet Servers Similar programs | |||
78. | Silver Key 3.3 (filecryption.com) | ||
HIPAA-compliant encryption. Silver Key is the silver bullet for secure file transfer. It is a single-click solution if you want it simple, and offers a rich set of features when you want more power. Silver Key encrypts files or folders, producing encrypted parcels that can be safely sent over the | |||
Updated: 2, 2006 | Rating: 0 | Author: Inv Softworks | Size: 3935 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
79. | Citation 3.15.14 (padfile.radsoftware.org) | ||
traffic citation information into a database in an efficient, secure, and effective medium that is never lost, misfiled, or mishandled. Further, Citation has powerful searching tools that let you find any one citation instantly, or assemble a sub-list of citations that have some common element(s) that you define. Finally, Citation has flexible printing options that let you | |||
Updated: 2, 2006 | Rating: 0 | Author: Rad Software | Size: 1163 kb | Commercial Go to category: System Utilities > Shell Tools Similar programs | |||
80. | Windows Security Officer 6.8.1.1 (1securitycenter.com) | ||
system. It has the capability of providing extremely strong, secure control of who can access a personal computer resources, and exactly what they can do and when they can do it while they have access to those resources. If a user's time limit has been set and it has been reached, the computer shuts itself off and that user can not log-on again until their permitted time range | |||
Updated: 2, 2006 | Rating: 0 | Author: Eugene Mihailov | Size: 1578 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
|
Home > Securing software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|