|
||||||
|
||
|
Home > Secure software |
Related keywords: Secure Shell, secure delete, secure files, secure deletion, secure file, pdf secure, secure shell, secure server, secure internet connection, secure email |
|
|
851. | KeyIC ConneX 2.0 (keyic.com) | ||
ActiveX DLL that allows secure, real-time payment processing. Supports Sale, Auth, Capture, Refund, Recurring Transactions, and ACH (Checking account) transactions. Supports Swipe Transactions as well. Full Membership Management capabilities integrate with Recurring Transactions and can completely manage a membership site. Comes with examples in Access and ASP and full | |||
Updated: 9, 2005 | Rating: 0 | Author: Brian Etzel | Size: 480 kb | Freeware Go to category: Development > Source Editors Similar programs | |||
852. | LASsie (Light Application Security) for MS Access 4.3 (peterssoftware.com) | ||
Access built-in security, LASsie offers a less complicated way to secure forms, reports, controls and certain records from unauthorized user access. With LASsie, you can prevent a user from opening specific forms/reports, restrict their ability to update data on a form, disable certain controls | |||
Updated: 9, 2005 | Rating: 0 | Author: Peter De Baets | Size: 770 kb | Shareware Go to category: Development > Other Similar programs | |||
853. | MDBSecure 1.1.0 (mindwarp-consultancy-software.com) | ||
for your databases. MDBSecure follows the recommended approach to securing Microsoft Access databases, it will encrypt your access database and remove security weaknesses. Although nothing is ever 100% secure in computing, following this approach will make an MS Access Database more | |||
Updated: 9, 2005 | Rating: 82 | Author: Julian Moorhouse | Size: 1062 kb | Shareware Go to category: Development > Other Similar programs | |||
854. | MenuXP 1.0 (download.componentspot.com) | ||
starting a new project who are looking for a simpler, more secure library may wish to consider other options. MFC classes to add flat, non-3D, “water-color” Office XP-style UI controls to MFC apps. They have no raised edges, do not look “pushed in” when clicked, and are not “shadowed” (except for | |||
Updated: 9, 2005 | Rating: 0 | Author: Component Spot | Size: 811 kb | Freeware Go to category: Development > Active X Similar programs | |||
855. | IDAutomation MICR Font Advantage 4.9 (bizfonts.com) | ||
print specifications documentation, (3) Security Fonts for printing secure names and amounts plus (4) a Visual Basic source code example of printing a bank check. Compatible with Windows, Pocket PC, Macintosh, UNIX, Linux and others. TrueType, PostScript and PCL laserjet soft fonts are provided. The MICR E13B fonts were created according to ISO (International Standards Organization) | |||
Updated: 9, 2005 | Rating: 0 | Author: Technical Support | Size: 2398 kb | Demo Go to category: System Utilities > Other Similar programs | |||
856. | conv_for_bas 4.1 (2m2s.com) | ||
Thousand VB lines written in one click! You have FORTRAN programs and you wish to migrate or renovate them : we propose a very good tool for FORTRAN to Visual BASIC source code conversion. It manages to translate more than 90 % (in some cases 100 %) of FORTRAN commands into VB. The Fortran/VB converter | |||
Updated: 9, 2005 | Rating: 89 | Author: Joel Ollivier | Size: 1661 kb | Shareware Go to category: Development > Other Similar programs | |||
857. | cryptlib 3.0 (download.componentspot.com) | ||
from programmers, allowing them to quickly make their projects more secure. Some of the symmetric encryption (private key) and authentication algorithms that cryptlib supports include the following: · AES (Rijndael) · Blowfish · DES, 3DES · RC2, RC4, RC5 The following hash algorithms are available in the library: · MD2, MD4, MD5 · RIPEMD-160 · SHA It offers | |||
Updated: 9, 2005 | Rating: 0 | Author: ComponentSpot | Size: 1347 kb | Freeware Go to category: Development > Active X Similar programs | |||
858. | Cryptocx v5 5.1.6 (easybyte.com) | ||
compliant algorithms to make sure that your information is totally secured. It is very easy to add Cryptocx to an existing application or web site backend. Why use Cryptocx? Use Cryptocx to encrypt your data, totally securing it. EasyByte Cryptocx v5 builds upon the previous releases of | |||
Updated: 9, 2005 | Rating: 39 | Author: EasyByte Software | Size: 4099 kb | Demo Go to category: Development > Active X Similar programs | |||
859. | IDAutomation Data Matrix Font and Encoder 4.1 (bizfonts.com) | ||
Reports. Hundreds of text characters and binary data can be stored securely and inexpensively with the Data Matrix symbology. Using Reed Solomon error correction, the printed DataMatrix symbol can also withstand damage without causing loss of data. This high level of error correction is far more advanced than one dimensional barcodes with check digits. Our DataMatrix bar code fonts | |||
Updated: 9, 2005 | Rating: 0 | Author: Brant Anderson | Size: 1609 kb | Demo Go to category: Development > Other Similar programs | |||
860. | ABCpdf ASP 4.0 (websupergoo.com) | ||
and layout of multi-styled text. Create encrypted PDFs for secure storage of PDF documents. Use eForm placeholder fields in your template documents to position and lay out dynamically created elements. And much, much more Visit us at http://www.websupergo.com/. Use ABCpdf to dynamically create Adobe PDF documents from ASP or VB. Add text, images and graphics. Designed for a | |||
Updated: 9, 2005 | Rating: 0 | Author: WSG Developers | Size: 8000 kb | Commercial Go to category: Development > Other Similar programs | |||
|
Home > Secure software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|