|
||||||
|
||
|
Home > Encryption component software |
Related keywords: component, encryption, Component, file encryption, Encryption, encryption software, encryption system, ASP Component, email encryption, ftp component |
|
|
1. | 2D/3D Horizontal Bar Graph Software 4.6 (jpowered.com) | ||
incorporation of bar graphs into web pages. It provides versatile components so that web authors and Java developers can easily build and publish dynamic and interactive bar graphs. We have built in many configurable features and functions to both the applet and servlet and as such, the documentation and examples are designed to give both a full understanding of every feature and | |||
Updated: 9, 2005 | Rating: 0 | Author: Patrick OBrien | Size: 308 kb | Shareware Go to category: Web Development > Java & JavaScript Similar programs | |||
2. | 2D/3D Pie Chart & Graph Software 4.65 (jpowered.com) | ||
incorporation of Pie Charts into web pages. It provides versatile components so that web authors and Java developers can easily build and publish dynamic and interactive Pie Charts. With many configurable features and functions to both applet and servlet, the documentation and examples are designed to | |||
Updated: 9, 2005 | Rating: 48 | Author: Patrick OBrien | Size: 303 kb | Shareware Go to category: Web Development > Java & JavaScript Similar programs | |||
3. | 3D Stacked Horizontal Bar Graph Software 4.1 (jpowered.com) | ||
solution for creating Stacked Horizontal Charts & Graphs. Versatile components for web authors and developers to easily build and publish dynamic and interactive bar graphs. Database Access Methods (Direct Data Binding and Multi-Tier) Template Scripts and Implementations (ASP, JSP, PHP and Servlet | |||
Updated: 9, 2005 | Rating: 82 | Author: Patrick OBrien | Size: 259 kb | Shareware Go to category: Web Development > Java & JavaScript Similar programs | |||
4. | ATAF 6.2.0 (ataf.dk) | ||
ATAF can automatic convert a MS-Access or ODBC database LikemySQL, MS-SQL server, Oracle, IBM DB2 or Lotus Notes database table in to a full grown ASP application as a HTML form with fields you select. ATAF creates the necessary Active server pages code (ASP), and navigation buttons. so you online can | |||
Updated: 9, 2005 | Rating: 45 | Author: Christian Rasmussen | Size: 7294 kb | Shareware Go to category: Business > Databases & Tools Similar programs | |||
5. | Cryptocx v5 5.1.6 (easybyte.com) | ||
is Cryptocx v5? Cryptocx is an encryption component designed for use in any modern development environment. Cryptocx encrypts and decrypts data using standards compliant algorithms to make sure that your information is totally secured. It is very easy to add Cryptocx to an existing application or web site backend. Why use Cryptocx? Use Cryptocx to encrypt your data | |||
Updated: 9, 2005 | Rating: 39 | Author: EasyByte Software | Size: 4099 kb | Demo Go to category: Development > Active X Similar programs | |||
6. | Cryptocx v6 6.1.3 (easybyte.com) | ||
is an encryption component designed for use in any modern development environment. Cryptocx encrypts and decrypts data using standards compliant algorithms to make sure that your information is totally secured. It is very easy to add Cryptocx to an existing application or web site backend. Use Cryptocx to encrypt your data, totally securing it. EasyByte Cryptocx v6 | |||
Updated: 2, 2006 | Rating: 0 | Author: EasyByte Software | Size: 3999 kb | Demo Go to category: System Utilities > Other Similar programs | |||
7. | CryptoText 3.0.0.0 (tmgdevelopment.co.uk) | ||
CryptoText encryption library contains COM and .NET components for cross-platform Microsoft Windows text and file encryption on Pocket PC and Desktop, including components for components for dotNet, .NET CF, COM / ActiveX, PocketPC. With CryptoText you can encrypt text on a | |||
Updated: 9, 2005 | Rating: 0 | Size: 751 kb | Commercial Go to category: Development > Other Similar programs | |||
8. | CryptoText 3.0.0.0 (tmgdevelopment.co.uk) | ||
CryptoText encryption library contains COM and .NET components for cross-platform Microsoft Windows text and file encryption on Pocket PC and Desktop, including components for components for dotNet, .NET CF, COM / ActiveX, PocketPC. With CryptoText you can encrypt text on a | |||
Updated: 9, 2005 | Rating: 0 | Size: 751 kb | Commercial Go to category: Development > Other Similar programs | |||
9. | CryptoText 3.0.0.1 (tmgdevelopment.co.uk) | ||
CryptoText encryption library contains COM and .NET components for cross-platform Microsoft Windows text and file encryption on Pocket PC and Desktop, including components for dotNet, .NET CF, COM / ActiveX, PocketPC. With CryptoText you can encrypt text on a Pocket PC using RC4 or 3DES, transfer the encrypted BinHex string up to a webserver and decrypt in ASP | |||
Updated: 9, 2005 | Rating: 0 | Size: 751 kb | Commercial Go to category: Development > Other Similar programs | |||
10. | e-Ticky 1.0 (freewebs.com) | ||
e-Ticky estimate the appropriate duration depending on the message's length. You can manually scroll the messages, using the navigation buttons: back and forward. You can add, delete and edit any message. E-mail tech support and all updates are for free Scrolling notes in the post-it You can define an attachment for each message you type. An attachment could be any file | |||
Updated: 3, 2005 | Rating: 0 | Author: Mouloud Siaci | Size: 317 kb | Shareware Go to category: Desktop > Other Similar programs | |||
11. | Ebook - The true cost of downtime 1.00 (bin95.com) | ||
The True Cost of Downtime by Don Fitchett, Business Industrial Network; 2002 ESBIN: C60-592B-1b38-40E8 Guide to process mapping production cost. Primarily explorers manufacturing cost metrics in an exhaustive effort to create awareness of the greatest cost savings opportunities in facilities today. Covers | |||
Updated: 9, 2005 | Rating: 0 | Author: Don Fitchett | Size: 961 kb | Freeware Go to category: Business > Other Similar programs | |||
12. | Ebook - The true cost of downtime 1.00 (bin95.com) | ||
The True Cost of Downtime by Don Fitchett, Business Industrial Network 2002 ESBIN C60 592B 1b38 40E8 Guide to process mapping production cost. Primarily explorers manufacturing cost metrics in an exhaustive effort to create awareness of the greatest cost savings opportunities in facilities today. Covers | |||
Updated: 3, 2005 | Rating: 0 | Author: Don Fitchett | Size: 961 kb | Freeware Similar programs | |||
13. | Encryption Toolkit 2003 Trial Edition 1.0 (nickellie.com) | ||
Encryption Toolkit includes all the tools you need to add file encryption and data encryption to your software applications. The toolkit includes COM encryption objects with a standard interface for both the Pocket PC and Windows desktop platforms. This enables you to use the same source code on both platforms to encrypt files and encrypt data to be transmitted | |||
Updated: 9, 2005 | Rating: 0 | Author: Daniel Maddox | Size: 1062 kb | Demo Go to category: Development > Components & Libraries Similar programs | |||
14. | Optimumcut-1D LITE 1.00 (optimumcut.com) | ||
Balustrading etc. Engineering Industry: Screw Manufacture, Linear Component Manufacture etc. Woodworking Industry: Cabinet Making, Joinery, Furniture. Lumber Industry: Cutting source materials from trees into stock sizes and stock lengths. Home Improvements : Curtain Rail Manufacture, Shelving, Tables, Wardrobes, Doors, Cabinets, Skirting Boards, Flooring etc. The list of Industries | |||
Updated: 2, 2006 | Rating: 90 | Author: Stephen Martin | Size: 2 kb | Shareware Go to category: Business > Other Similar programs | |||
15. | Retroskop 2.0.0.7 (lightdev.com) | ||
Retroskop simplyfies the set up of backups as directory snapshots (timestamped ZIP archives), directory synchronizations or entire release packages. Automatic change detection in source directories. Backups can be integrated with cron or task scheduler. Ideal backup solution for large amounts of data such as | |||
Updated: 3, 2005 | Rating: 39 | Author: Ulrich Hilger | Size: 756 kb | Commercial Go to category: System Utilities > Backup & Restore Similar programs | |||
16. | Siberix PDF Library 5.0 (siberix.com) | ||
PDF Library is a pure C# component for .NET designed to create industry standard PDF files. It provides a variety of methods to format text, create complex layouts, draw geometric figures and paths, insert images and other objects. Features: - Easy to use IGraphics interface (similar to GDI+) - Flate, JPEG and CCITT Group 4 compression - Grayscale or BW image transformation | |||
Updated: 2, 2006 | Rating: 71 | Author: Victor Motchaline | Size: 592 kb | Commercial Go to category: Development > Components & Libraries Similar programs | |||
17. | Super Password Guard 3.1 (topaim.net) | ||
master password (for enhanced security, master password is used as encryption/decryption key only and is not stored anywhere). You can also assign a short master password hint text so if you accidentally forget your master password, the hint will help you to recall it. 3. Make custom categories/subcategories to divide your accounts into logical categories for easier access. 4 | |||
Updated: 3, 2005 | Rating: 48 | Author: Cheng Zheng | Size: 2000 kb | Shareware Go to category: Security & Privacy > Password Managers Similar programs | |||
18. | VIDEOREG 3.0 (videoreg.com) | ||
This product allows saving images from webcam or other video capture device starting on motion detection or constantly with given time interval (ranging from 1 to 30 seconds). It is possible to save the defined amount of shots after motion has been detected. The built-in viewer allows viewing cam shots in | |||
Updated: 9, 2005 | Rating: 16 | Author: Victor Sarbash | Size: 2252 kb | Demo Go to category: Business > Databases & Tools Similar programs | |||
19. | VIDEOREG 3.0 (sarbash.com) | ||
This product allows saving images from webcam or other video capture device starting on motion detection or constantly with given time interval (ranging from 1 to 30 seconds). It is possible to save the defined amount of shots after motion has been detected. The built-in viewer allows viewing cam shots in | |||
Updated: 9, 2005 | Rating: 0 | Author: Victor Sarbash | Size: 2252 kb | Demo Go to category: Business > Databases & Tools Similar programs | |||
20. | VIDEOREG 3.0 (HTTP:) | ||
This product allows saving images from webcam or other video capture device starting on motion detection or constantly with given time interval (ranging from 1 to 30 seconds). It is possible to save the defined amount of shots after motion has been detected. The built-in viewer allows viewing cam shots in | |||
Updated: 9, 2005 | Rating: 0 | Author: Victor Sarbash | Size: 2252 kb | Demo Go to category: System Utilities > Other Similar programs | |||
21. | wodSFTP 3.0.0.0 (weonlydo.com) | ||
file transfer protocol for use with the SSH2 protocol. wodSFTP component implements client side of this protocol which is reliable and easy to use. SFTP protocol is designed to provide primarily file transfer, but also more general file system access on the remote server - in secure manner. SFTP protocol assumes it is running on secure channel (secure channel is implemented in | |||
Updated: 2, 2006 | Rating: 0 | Author: Kresimir Petric | Size: 1261 kb | Shareware Go to category: Network & Internet > FTP Clients Similar programs | |||
22. | wodSFTPdll 3.0.0.0 (weonlydo.com) | ||
***This is win32 dynamic dll library, provided only for VC (and similar) customers that prefer to use win32 dynamic library over ActiveX version. Only limited support is available for this product. Customers using other programming environment should try using ActiveX instead*** The Secure File Transfer | |||
Updated: 2, 2006 | Rating: 0 | Author: Kresimir Petric | Size: 1187 kb | Shareware Go to category: Network & Internet > FTP Clients Similar programs | |||
23. | wodSSH 2.3.7.0 (weonlydo.com) | ||
is a client component that provides support for communication with remote console-type services. Most commonly, it will be used for Telnet based servers (running on UNIX OS), but wodSSH does even more: it allows you to communicate encrypted (and secured, of course) with SSH1 and SSH2 (secure-shell) servers, as well as any other non-encrypted server (such as SMTP or POP3). For | |||
Updated: 2, 2006 | Rating: 42 | Author: Kresimir Petric | Size: 1231 kb | Shareware Go to category: Network & Internet > Remote Computing Similar programs | |||
24. | wodTelnetDLX 2.1.8.0 (weonlydo.com) | ||
is a telnet client component ready to connect to various terminal based clients, most commonly to UNIX telnet daemon. Besides supported Telnet protocol, it also supports secured communication (through encryption) using well known SSH (SSH1 and SSH2 are supported), as well as SSL/TLS (Secure Socket Layer protocol). ActiveX version of the component has its own | |||
Updated: 2, 2006 | Rating: 0 | Author: Kresimir Petric | Size: 1850 kb | Shareware Go to category: Network & Internet > Remote Computing Similar programs | |||
25. | Xceed Zip for .NET Compact Frameworks 2.0 (xceedsoft.com) | ||
method. Created by the makers of high-quality compression components since 1994, Xceed Zip for .NET Compact Framework represents the state of the art in compression libraries. It has been written completely in C# to offer .NET Compact Framework developers compact, highest performance code and maximum flexibility. It is also extremely easy to use, requiring only a single line of | |||
Updated: 9, 2005 | Rating: 0 | Author: Charles Duncan | Size: 21034 kb | Demo Go to category: Development > Other Similar programs | |||
|
Home > Encryption component software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|