|
||||||
|
||
|
Home > Secure server software |
Related keywords: server, secure, Server, web server, mail server, SQL Server, Secure, proxy server, sql server, server monitor |
|
|
71. | CodeCharge Studio 3.0 (codecharge.com) | ||
utilize a variety of forms and templates to generate sophisticated, secure Web applications in record time. Leverage the latest industry standards and Internet technology to develop dynamic Web applications that can include portals, commerce sites, task management systems, enterprise resource planning | |||
Updated: 2, 2006 | Rating: 16 | Author: Konrad Musial | Size: 31812 kb | Shareware Go to category: Web Development > HTML Tools Similar programs | |||
72. | cryptlib 3.0 (download.componentspot.com) | ||
from programmers, allowing them to quickly make their projects more secure. Some of the symmetric encryption (private key) and authentication algorithms that cryptlib supports include the following: · AES (Rijndael) · Blowfish · DES, 3DES · RC2, RC4, RC5 The following hash algorithms are available in the library: · MD2, MD4, MD5 · RIPEMD-160 · SHA It offers | |||
Updated: 9, 2005 | Rating: 0 | Author: ComponentSpot | Size: 1347 kb | Freeware Go to category: Development > Active X Similar programs | |||
73. | Cryptocx v5 5.1.6 (easybyte.com) | ||
compliant algorithms to make sure that your information is totally secured. It is very easy to add Cryptocx to an existing application or web site backend. Why use Cryptocx? Use Cryptocx to encrypt your data, totally securing it. EasyByte Cryptocx v5 builds upon the previous releases of | |||
Updated: 9, 2005 | Rating: 39 | Author: EasyByte Software | Size: 4099 kb | Demo Go to category: Development > Active X Similar programs | |||
74. | Cryptocx v6 6.1.3 (easybyte.com) | ||
compliant algorithms to make sure that your information is totally secured. It is very easy to add Cryptocx to an existing application or web site backend. Use Cryptocx to encrypt your data, totally securing it. EasyByte Cryptocx v6 builds upon the previous releases of Cryptocx to add further powerful features in a very easy to use bundle. Data security is becoming more and | |||
Updated: 2, 2006 | Rating: 0 | Author: EasyByte Software | Size: 3999 kb | Demo Go to category: System Utilities > Other Similar programs | |||
75. | IDAutomation Data Matrix Font and Encoder 4.1 (bizfonts.com) | ||
Reports. Hundreds of text characters and binary data can be stored securely and inexpensively with the Data Matrix symbology. Using Reed Solomon error correction, the printed DataMatrix symbol can also withstand damage without causing loss of data. This high level of error correction is far more advanced than one dimensional barcodes with check digits. Our DataMatrix bar code fonts | |||
Updated: 9, 2005 | Rating: 0 | Author: Brant Anderson | Size: 1609 kb | Demo Go to category: Development > Other Similar programs | |||
76. | DevSolutions FTP 1.0 (devsolutions.net) | ||
is included with the library allowing you to find out how that’s done. The DevSolutions FTP protocol is a relatively simple client-side component for rapid transfer of files from the local hard disk to an FTP server. Being a COM Component, ftp protocol that allows access to a remote file system in a standard way. It comprises commands for manipulating and navigating remote | |||
Updated: 3, 2005 | Rating: 0 | Author: supportTeam | Size: 1115 kb | Shareware Go to category: Development > Other Similar programs | |||
77. | EasyLicenser 2.0.02 (agilis-sw.com) | ||
key management for use with our companion Orion network license server product. EasyLicenser allows you to increase revenue by providing secure and non-intrusive protection for your software products for a small percentage of your product sales price. There are no extra runtime charges for multiple languages and platforms. EasyLicenser's non-intrusive operation will | |||
Updated: 9, 2005 | Rating: 56 | Author: Technical Support | Size: 3906 kb | Demo Go to category: Web Development > Java & JavaScript Similar programs | |||
78. | EDCrypt 3.1 (softuarium.com) | ||
MD2, MD4, MD5, RIPEMD128, RIPEMD160, SHA1, SHA256, SHA384, SHA512 - securely shreds files Help files and example projects in several languages are included in the package. EDCrypt is a stand-alone component. It does not require any other files to work. The control can be distributed royalty-free in an | |||
Updated: 9, 2005 | Rating: 0 | Author: Eric Sewillo | Size: 390 kb | Shareware Go to category: Development > Other Similar programs | |||
79. | Form1 Builder Software 30 (softswot.com) | ||
Builder runs in your web browser and allows you to easily build secure web forms. It provides a single file form (no cgi) with a hidden email delivery address and an extensive range of benefits and options including protection against form hijacking, email injection and email harvesting. Key features include: User friendly click and build interface. Capacity to develop basic to | |||
Updated: 2, 2006 | Rating: 0 | Author: David Morcom | Size: 104 kb | Shareware Go to category: Web Development > HTML Tools Similar programs | |||
80. | HIME: Huge Integer Math and Encryption 1.04 (users.skynet.be) | ||
encryption and digital signatures using the SHA-1, SHA-256 or MD5 Secure Hash Algorithm in your programs. HIME also contains functions for huge prime number generation, cryptographically secure random number generation (a.o. Blum-Blum-Shub and RSA), Diffie-Hellman key exchange algorithm and huge integer number mathematical operations. These mathematical functions can | |||
Updated: 9, 2005 | Rating: 949 | Author: E. Van Esch | Size: 747 kb | Shareware Go to category: Development > Components & Libraries Similar programs | |||
|
Home > Secure server software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|