|
||||||
|
||
|
Home > Business security software |
Related keywords: security, business, Security, Business, small business, business plan, computer security, internet security, security software, Small Business |
|
|
71. | Ariacom Report Manager 2.2 (shareware-promotion.com) | ||
pivot tables - Native line, bar, point and pie charts - Integrated security management limiting user access - Fully multilingual design (currently in English, French, German, Spanish) - Report results in various formats (html, csv, txt, xml with conversion to pdf) - Output to various devices | |||
Updated: 3, 2005 | Rating: 143 | Author: Ariacom | Size: 5719 kb | Freeware Go to category: Development > Active X Similar programs | |||
72. | Chilkat Create Self-Extracting EXE from Zip 8.1.0 (zip-compression.com) | ||
is much stronger than standard ZIP encryption, which is regarded by security experts as being unsecure. Chilkat's streaming compression and encryption technology allows the ChilkatZip Self-Extractor to create an EXE from any size ZIP file. The streaming compression and decryption technology also ensures that it will be possible to unzip the archive on your | |||
Updated: 9, 2005 | Rating: 0 | Author: Matt Fausey | Size: 300 kb | Freeware Go to category: System Utilities > File Compression Similar programs | |||
73. | Chilkat XML Messaging 1.0.6 (chilkatsoft.com) | ||
Compression, and Chilkat Crypt for automatic compression and security. Send and receive XML messages. Integrates with Chilkat SSL for secure messaging over SSLv3 or TLSv1. Integrates with Chilkat Crypt for automatic encryption and decryption of messages using the Rijndael, Twofish, or Blowfish symmetric encryption algorithms. Integrates with the Chilkat Real-Time | |||
Updated: 9, 2005 | Rating: 0 | Author: Matt Fausey | Size: 1000 kb | Freeware Go to category: Web Development > XML/CSS Tools Similar programs | |||
74. | DevSolutions FTP 1.0 (devsolutions.net) | ||
is included with the library allowing you to find out how that’s done. The DevSolutions FTP protocol is a relatively simple client-side component for rapid transfer of files from the local hard disk to an FTP server. Being a COM Component, ftp protocol that allows access to a remote file system in a standard way. It comprises commands for manipulating and navigating remote | |||
Updated: 3, 2005 | Rating: 0 | Author: supportTeam | Size: 1115 kb | Shareware Go to category: Development > Other Similar programs | |||
75. | Elegant InterFace 4.0 4.0 04-06-03 (pieproducts.com) | ||
comma delimited, MS Word Mail Merge and Excel spreadsheet formats. Security Administrator was designed to allow individual security right be set at runtime by the end user or system administrator. Easily manage user ID, Passwords and object rights including: open, read, write and delete permissions. Manipulate colors preferences and logos. Fast and accurate rescale routines | |||
Updated: 9, 2005 | Rating: 0 | Author: Mark Crum | Size: 6885 kb | Shareware Go to category: Graphic Apps > Other Similar programs | |||
76. | Engineers Edition 3.2 (solarwinds.net) | ||
The Engineers Edition contains 36 Network Discovery, Monitoring and Management tools. Build a DB of your network with NETWORK SONAR, or use IP NETWORK BROWSER to quickly discover an entire subnet. With the NETWORK PERFORMANCE MONITOR you can not only monitor traffic and bandwidth utilization but set alert | |||
Updated: 9, 2005 | Rating: 82 | Author: Doug Rogers | Size: 51286 kb | Shareware Go to category: Network & Internet > Other Similar programs | |||
77. | Enterprise Java Application Server 2.1 (essencomp.com) | ||
provide System - Level Services such as Transaction Management, Security, Client Connectivity and Database Access. Enterprise Java Beans provide a Component Model that will help you to build Business Application with your existing Databases, Applications, Systems, and Infrastructure Management. Enterprise Java Application Server (EJAS) offers you: Automatic Persistence | |||
Updated: 9, 2005 | Rating: 0 | Author: Apurva Parekh | Size: 17149 kb | Commercial Go to category: Web Development > Java & JavaScript Similar programs | |||
78. | EXECryptor 2.3.7 (softcomplete.com) | ||
PellesC, Visual Basic, PowerBASIC, IBASIC, PureBasic. All SDK's and samples are available. Powerful software tool used for an application code protection from reverse engineering, analysis and modifications, based on a brand new metamorphing code transformation technology, that provides with strong software | |||
Updated: 2, 2006 | Rating: 140 | Author: Alex Sergeev | Size: 2865 kb | Shareware Go to category: Development > Management & Distribution Similar programs | |||
79. | Ghost Installer Studio 3.7.1 (ginstall.com) | ||
Windows applications, focused on enhanced reliability, stability, security and performance. Adobe, Xerox, NEC, Intel and many other companies rely on Ghost Installer Studio to create installations for their top notch software products. Designed to meet high-end expectations of installation technology, Ghost Installer Studio 3.7 offers full support for Microsoft's | |||
Updated: 3, 2005 | Rating: 96 | Author: gInstall Corp. | Size: 10503 kb | Demo Go to category: Development > Install & Setup Similar programs | |||
80. | gReg 4.55 (gitanosoftware.com) | ||
that locks out thieves permanently. Smoke your competitors with gReg's advanced customer tracking and technical support history. You and your customer support staff can satisfy every customer quickly and efficiently with our system .Cut your advertising time and costs in half! Use gReg to distribute an | |||
Updated: 9, 2005 | Rating: 0 | Author: Jesus Moreno | Size: 5840 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
|
Home > Business security software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|