|
||||||
|
||
|
Home > Id software |
|
|
71. | ANPOP POP3 Component Build 6.0 (emailarchitect.net) | ||
downloading the whole email from server; - Get email size/message-id from server; - Delete/Undelete email; - Log file to record all sessions between client and server; - Load email from file or binary stream; - Save email to file or IMSGSTORE interface; - Get specified header value of email; | |||
Updated: 2, 2006 | Rating: 205 | Author: Adminsystem Development Team | Size: 843 kb | Shareware Go to category: Development > Components & Libraries Similar programs | |||
72. | cryptlib 3.0 (download.componentspot.com) | ||
MD4, MD5 · RIPEMD-160 · SHA It offers services such as: · S/MIME · SSL/TLS · ssh It features various hashed message authentication code algorithms: · HMAC-MD5, HMAC-SHA, HMAC-RIPEMD-160 Finally, asymmetric (public/private key) encryption algorithms such as the following are | |||
Updated: 9, 2005 | Rating: 0 | Author: ComponentSpot | Size: 1347 kb | Freeware Go to category: Development > Active X Similar programs | |||
73. | CSpot SMTPClient 0.4 (download.componentspot.com) | ||
can behave differently depending on the OS of the computer it’s running on. CDONTS is also said to be resource-intensive and more complex to configure, and to have limitations, and even be unstable. The component is written in 100% managed C# and is CLS compliant; therefore, developers can use the component in any .NET Framework programming language, such as C#, VB.NET, J# | |||
Updated: 9, 2005 | Rating: 0 | Author: Component Spot | Size: 862 kb | Freeware Go to category: Development > Components & Libraries Similar programs | |||
74. | DBPix 2.0.3.2 (ammara.com) | ||
* Intuitive user-interface * Drag and drop * DBPix is ideal for ID systems, personnel databases, product databases, real-estate, security, membership cards, inventory, law enforcement, and many more applications. Try DBPix now! DBPix - The Image Control for Access. Add Images to Access, Easily and Efficiently. Avoid storage overhead, complex coding and all common problems. * Easy | |||
Updated: 3, 2006 | Rating: 380 | Author: Development DBPix | Size: 380 kb | Commercial Go to category: Development > Components & Libraries Similar programs | |||
75. | Dialgo Wave Modem ActiveX 1.0 (research-lab.com) | ||
Wave Modem ActiveX SDK Features Caller ID Extraction, Digit Monitor and Playback, Wave File Playback and Recording on Phone Line. You get to save your Wave File in 20+ Audio Formats. Inputs CCITT u-Law Compressed Wave Files for Playback. This compact telephony control reduces your development time by 4 months. More the Registered Version supports SAPI5.1 Text To Speech and Speech | |||
Updated: 9, 2005 | Rating: 0 | Author: Sandeep Thite | Size: 1233 kb | Shareware Go to category: Communications > Telephony Similar programs | |||
76. | DocAnywhere 1 (lightdev.com) | ||
DocAnywhere converts your help sets in JavaHelp formats to PDF manuals in one step. Table of contents as found in help set is transformed to PDF with similar functionality, i.e. click on TOC entry opens chapter. Preserves internal and external links, i.e. click on link opens link target as in JavaHelp or web | |||
Updated: 3, 2005 | Rating: 0 | Author: Ulrich Hilger | Size: 1126 kb | Commercial Go to category: Development > Other Similar programs | |||
77. | EDCrypt 3.1 (softuarium.com) | ||
Softuarium EDCrypt is an ActiveX control performing following functions: - encrypts and decrypts text and files using symmetrical ciphers: BLOWFISH, CAST128, GOST, RC2, RIJNDAEL, TWOFISH - computes hashes (message digests) of text and files using hashing algorithms: ADLER32, CRC32, CRC32B, GOST, HAVAL128 | |||
Updated: 9, 2005 | Rating: 0 | Author: Eric Sewillo | Size: 390 kb | Shareware Go to category: Development > Other Similar programs | |||
78. | Elegant InterFace 4.0 4.0 04-06-03 (pieproducts.com) | ||
runtime by the end user or system administrator. Easily manage user ID, Passwords and object rights including: open, read, write and delete permissions. Manipulate colors preferences and logos. Fast and accurate rescale routines. Object Viewer allows viewing, printing and exportation of your data. Set individual security rights at runtime. Manage user ID, Passwords and object | |||
Updated: 9, 2005 | Rating: 0 | Author: Mark Crum | Size: 6885 kb | Shareware Go to category: Graphic Apps > Other Similar programs | |||
79. | EXECryptor 2.3.7 (softcomplete.com) | ||
A serial number can be time-limited, may be locked to Hardware ID, can contain encrypted registration information such as license type, allowed features and other user defined information. It supports black list database of 'stolen' illegal keys. EXECryptor uses cryptographically strong serial number generation algorithm that compmletely prevents illegal creation of | |||
Updated: 2, 2006 | Rating: 140 | Author: Alex Sergeev | Size: 2865 kb | Shareware Go to category: Development > Management & Distribution Similar programs | |||
80. | ez_XLS2PDF PDF Converter 1.0 (civiltools.com) | ||
Quickly and rapidly convert and distribute XLS files Once converted to PDF, XLS files are perfectly suited for easy distribution and viewing over the Internet. ez-XLS2PDF utilizes the native engine of MS Excel to convert the spreadsheets to PDF for optimum quality. Therefore, MS Excel is required. Select | |||
Updated: 3, 2005 | Rating: 0 | Author: Jeff Lin | Size: 8359 kb | Demo Go to category: Business > Other Similar programs | |||
|
Home > Id software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|