|
||||||
|
||
|
Home > Registration code software |
Related keywords: Code Generation, code, bar code, registration, source code, Source Code, Code, zip code, code 39, postal code |
|
|
81. | PELock 1.06 (pelock.pac.pl) | ||
PELock features: • compression of the application (code, imports, resources), it's possible to decrease executable size even 70% of original file • encryption of code (publicly available cryptographic algorithms and algorithms build polymorphic ally) • reorganization of basic PE EXE structures in order to assure better ratio during compression • | |||
Updated: 9, 2005 | Rating: 0 | Author: Bartosz Wójcik | Size: 422 kb | Demo Go to category: Development > Other Similar programs | |||
82. | ProxyDesigner 1.0.1 (proxysource.com) | ||
Modeling Language). Users need to register on the author's web site at www.proxysource.com. Registration is free and only takes a few moments. A connection to the internet is required to register the product the first time you use it. After registration, the product can work normally with no internet connection, unless you wish to use the product to share and | |||
Updated: 9, 2005 | Rating: 200 | Author: Vince D'Onofrio | Size: 2147 kb | Freeware Go to category: Education > Teaching & Training Tools Similar programs | |||
83. | SecureCode 2.0 (aidsoft.com) | ||
reverse engineering and illegal decompilation. If you have important code and you do not want a competitor to see, use SecureCode !You can use as protection against reverse-engineering or you can use as additionnal protection with you current registration scheme.The security is internal at your software, it's an advantage for your application to prevent against generic | |||
Updated: 9, 2005 | Rating: 16 | Author: Bruno Branciforti | Size: 830 kb | Shareware Go to category: Development > Delphi Similar programs | |||
84. | SecureCode Protection 1.0.2 (aidsoft.com) | ||
your application on your terms.SecureCode is not trial protection or registration software, you can use as protection against reverse-engineering or you can use as additionnal protection with you current registration scheme.You have heard perhaps several times by many programmers that the best | |||
Updated: 9, 2005 | Rating: 0 | Author: Bruno Branciforti | Size: 350 kb | Shareware Go to category: Development > Other Similar programs | |||
85. | ShareGuard Copy Protection 3.6 (zappersoftware.com) | ||
or BMP and it will display your logo/favourite picture WITHOUT ANY CODING. (2) Key Program that YOU sell to your customers (optional method) - Allows your users to register the software using one of your valid certificate numbers. The ShareGuard Key program that users will buy from you will prevent the | |||
Updated: 9, 2005 | Rating: 0 | Author: William Bradshaw | Size: 11474 kb | Shareware Go to category: Development > Other Similar programs | |||
86. | ShareGuard V1 1 (zappersoftware.com) | ||
or BMP and it will display your logo/favourite picture WITHOUT ANY CODING. (2) Key Program that YOU sell to your customers (optional method) - Allows your users to register the software using one of your valid certificate numbers. The ShareGuard Key program that users will buy from you will prevent the | |||
Updated: 9, 2005 | Rating: 0 | Author: William Bradshaw | Size: 2490 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
87. | ESP Toolbar 1.5.7 (magi-au.com) | ||
available for purchase and use in your software development project. Registration includes the ESP Toolbar Bean, full Javadocs on the component's use, and full Java source code for the Bean's implementation. The ESP Toolbar Component is a 100% Pure Java, and JavaBeans Compliant software component that simulates the functionality of the Internet Explorer 6 Toolbar | |||
Updated: 9, 2005 | Rating: 0 | Author: Paul Atkinson | Size: 72 kb | Demo Go to category: Web Development > Java & JavaScript Similar programs | |||
88. | gReg 4.55 (gitanosoftware.com) | ||
that locks out thieves permanently. Smoke your competitors with gReg's advanced customer tracking and technical support history. You and your customer support staff can satisfy every customer quickly and efficiently with our system .Cut your advertising time and costs in half! Use gReg to distribute an | |||
Updated: 9, 2005 | Rating: 0 | Author: Jesus Moreno | Size: 5840 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
89. | HardKey License Manager 3.2 (softcomplete.com) | ||
(public keys) cryptography. HardKey Base Features : - Short registration key (by example: "29UD4-3K6GH-VE5SX-ZA7EK") - Key may contain following optional fields: - Hardware ID - Expiry Date It allows to create temporarily operating keys and keys working only on one computer. - Key always includes license type info (up to 8 types). - For single RegistrationName, you | |||
Updated: 9, 2005 | Rating: 536 | Size: 8054 kb | Shareware Go to category: Development > Management & Distribution Similar programs | |||
90. | KeyedAccess for MS Access 2.0 (peterssoftware.com) | ||
to generate an installation-specific Serial Number on the end-user's computer which can be unlocked with a corresponding Unlock Code. Using KeyedAccess means you can create shareware-type versions of your MS Access application where some functionality is locked and is only unlocked when the user enters a valid key. When using the Installation Serial Number and Unlock | |||
Updated: 9, 2005 | Rating: 0 | Author: Peter De Baets | Size: 774 kb | Demo Go to category: Development > Other Similar programs | |||
|
Home > Registration code software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|