|
||||||
|
||
|
Home > Secure software |
Related keywords: Secure Shell, secure delete, secure files, secure deletion, secure file, pdf secure, secure shell, secure server, secure internet connection, secure email |
|
|
861. | ABCpdf .NET 4.0 (websupergoo.com) | ||
and layout of multi-styled text. Create encrypted PDFs for secure storage of PDF documents. Use eForm placeholder fields in your template documents to position and lay out dynamically created elements. And much, much more… Visit us at http://www.websupergo.com/. Use ABCpdf .NET to dynamically create Adobe PDF documents from ASP.NET or .NET. Add text, images and graphics | |||
Updated: 9, 2005 | Rating: 0 | Author: WSG Developers | Size: 6000 kb | Commercial Go to category: Development > Basic / VB / VB DotNet Similar programs | |||
862. | ACProtect standard 1.20 (ultraprotect.com) | ||
ACProtect is an application that allows you to protect Windows executable files(PE files) against piracy. Using public keys encryption algorithms (RSA) to create and verify the registration keys and unlock some RSA key locked code. It has an Embedded Protector against file dumping and unpackers. It also has | |||
Updated: 9, 2005 | Rating: 152 | Author: risco software | Size: 1604 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
863. | axsStrongBox 2.1 (morello.co.uk) | ||
is a COM component which provides strong, secure data encryption (public and private key). It can be easily integrated into Visual Basic, Visual C++, Delphi and VBScript applications. StrongBox uses industry standard, public domain algorithms - choose between Rijndael (AES), Twofish, Blowfish, DES and Triple DES (private key) or RSA (public key). ECB and CBC modes are | |||
Updated: 9, 2005 | Rating: 116 | Author: Tom Duncan | Size: 473 kb | Demo Go to category: Development > Active X Similar programs | |||
864. | Bind to EXE library 1.1 (codeoffice.com) | ||
to increase their securities. Blowfish algorithm, one of the most secure encryption algorithms in the world, is employed to encrypt the files. In extracting stage, TExtractFromEXE can retrieve information about the collection of files embedded in the executable file, or just extract one or more files from the executable file specified by their names or IDs. Bind to EXE is an | |||
Updated: 9, 2005 | Rating: 0 | Author: Chong-Wei CHEN | Size: 1587 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
865. | BugCollector Pro 4.1 (nesbitt.com) | ||
through implementation. Now with BugCollector Administrator for secure, multi-user capability. BugCollector Pro has many powerful features, including a built-in report designer, customizable charts, user-definable filters, automatic email and a multi-level project tree. Completely compatible with BugCollector Web. BugCollector Pro is a powerful, multi-user database specifically | |||
Updated: 9, 2005 | Rating: 0 | Author: Kenn Nesbitt | Size: 14946 kb | Shareware Go to category: Development > Management & Distribution Similar programs | |||
866. | BugCollector Web 1.0 (nesbitt.com) | ||
contact to implementation. Now with BugCollector Administrator for secure, multi-user capability. BugCollector Web has many powerful features, including a built-in report designer, customizable charts, user-definable filters, automatic email and a multi-level project tree. Runs under IIS, PWS, Apache for Windows. Completely compatible with BugCollector Pro. BugCollector Web is a | |||
Updated: 9, 2005 | Rating: 0 | Author: Kenn Nesbitt | Size: 13829 kb | Shareware Go to category: Development > Other Similar programs | |||
867. | Chilkat Compression ActiveX Control 9.3.0 (zip-compression.com) | ||
single EXE. Create Self-Extracting EXEs Works with the Chilkat Zip 2 Secure EXE utility to access ZIPs embedded in EXEs created by that utility. Unzip Newer Unzips files based on last-modification time. Set Exclusions Exclude files matching wildcarded filenames, such as "*.log". Existing Zip Component Features Create New ZIPs Create new ZIPs from existing files, memory data, or other | |||
Updated: 9, 2005 | Rating: 0 | Author: Matt Fausey | Size: 2000 kb | Shareware Go to category: Development > Active X Similar programs | |||
868. | Chilkat Data Compression ActiveX 9.3.0 (zip-compression.com) | ||
single EXE. Create Self-Extracting EXEs Works with the Chilkat Zip 2 Secure EXE utility to access ZIPs embedded in EXEs created by that utility. Unzip Newer Unzips files based on last-modification time. Set Exclusions Exclude files matching wildcarded filenames, such as "*.log". Existing Zip Component Features Create New ZIPs Create new ZIPs from existing files, memory data, or other | |||
Updated: 9, 2005 | Rating: 0 | Author: Matt Fausey | Size: 2000 kb | Shareware Go to category: Development > Active X Similar programs | |||
869. | Chilkat File Compression ActiveX 9.3.0 (zip-compression.com) | ||
single EXE. Create Self-Extracting EXEs Works with the Chilkat Zip 2 Secure EXE utility to access ZIPs embedded in EXEs created by that utility. Unzip Newer Unzips files based on last-modification time. Set Exclusions Exclude files matching wildcarded filenames, such as "*.log". Existing Zip Component Features Create New ZIPs Create new ZIPs from existing files, memory data, or other | |||
Updated: 9, 2005 | Rating: 0 | Author: Matt Fausey | Size: 2000 kb | Shareware Go to category: Development > Active X Similar programs | |||
870. | Chilkat XML Messaging 1.0.6 (chilkatsoft.com) | ||
Send and receive XML messages. Integrates with Chilkat SSL for secure messaging over SSLv3 or TLSv1. Integrates with Chilkat Crypt for automatic encryption and decryption of messages using the Rijndael, Twofish, or Blowfish symmetric encryption algorithms. Integrates with the Chilkat Real-Time Compression component for automatic compression and decompression of messages. Send | |||
Updated: 9, 2005 | Rating: 0 | Author: Matt Fausey | Size: 1000 kb | Freeware Go to category: Web Development > XML/CSS Tools Similar programs | |||
|
Home > Secure software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|