|
||||||
|
||
|
Home > Verification software |
Related keywords: credit card verification, credit card number verification, creditcard verification, Email Verification, address verification, e mails verification, email verification |
|
|
81. | KeyIC ConneX 2.0 (keyic.com) | ||
An ActiveX DLL that allows secure, real-time payment processing. Supports Sale, Auth, Capture, Refund, Recurring Transactions, and ACH (Checking account) transactions. Supports Swipe Transactions as well. Full Membership Management capabilities integrate with Recurring Transactions and can completely | |||
Updated: 9, 2005 | Rating: 0 | Author: Brian Etzel | Size: 480 kb | Freeware Go to category: Development > Source Editors Similar programs | |||
82. | LASsie (Light Application Security) for MS Access 4.3 (peterssoftware.com) | ||
the user's network login username can be used. Once the user name is verified, his/her session is assigned a Security Level code that determines which forms or reports can be accessed, if data updates are allowed, and more. LASsie is called "light" application security because it is not intended to | |||
Updated: 9, 2005 | Rating: 0 | Author: Peter De Baets | Size: 770 kb | Shareware Go to category: Development > Other Similar programs | |||
83. | Speed SQL IDE Pro 1.6.8 (sqlXpress.com) | ||
and suitability (Code Complete, Auto Correct, Syntax Checking, Verify) SQL IDE's Object History - which stores a record of every object change - ensures that nothing is lost. Review and switch back to any version of any object. Seamless integration with Microsoft™ Visual SourceSafe™ and other SCC compliant version control systems allows object check out and check in directly | |||
Updated: 3, 2005 | Rating: 0 | Author: Bryan Oliver | Commercial Go to category: Business > Databases & Tools Similar programs | |||
84. | NTSet 1.14 (sam-solutions.net) | ||
security settings; - Control the privileges given to the users; - Verify users'credentials against Windows NT Domain; - Retrieve and set a variety of setting for network computers; - Send messages over the network to a remote computer; - Browse network resources and connected devices; - Monitor terminal service sessions; - Schedule tasks for execution on network computers; | |||
Updated: 9, 2005 | Rating: 0 | Author: SaM Solutions | Size: 1196 kb | Shareware Go to category: Development > Delphi Similar programs | |||
85. | Open and Save Dialogs Toolkit 2.0 (fcoder.com) | ||
Open and Save dialogs toolkit allows you to open 50 graphics file types and save to 27 graphics file types from your application. Just few lines of code will allow you to get your own working program. Dialogs use HBITMAP handle as input and output and even novice developer can learn how to work with it | |||
Updated: 9, 2005 | Rating: 213 | Author: Evgeny Shamin | Size: 3521 kb | Freeware Go to category: Development > Other Similar programs | |||
86. | OpenSSL 0.9.7c (download.componentspot.com) | ||
modified during transmission. · Authenticity: An application can verify the identity of the sender using certificates. · Privacy: An application can ensure that no intermediary between the sender and the recipient can understand the data. Transport Layer Security is an extension of SSL. It is now overseen by an international standards organization. It provides the same | |||
Updated: 9, 2005 | Rating: 0 | Author: Component Spot | Size: 2879 kb | Freeware Go to category: Development > C / C++ / C-sharp Similar programs | |||
87. | PELock 1.06 (pelock.pac.pl) | ||
between application and license key system • creation and verification of registration keys using public keys encryption algorithms (RSA) • ability to create trial keys and hardware dependent keys • keeping of the database and checkup of "stolen" (illegal) registration keys • ready to use samples of license key system in C/C++/Delphi • user-friendly interface • many | |||
Updated: 9, 2005 | Rating: 0 | Author: Bartosz Wójcik | Size: 422 kb | Demo Go to category: Development > Other Similar programs | |||
88. | Samaritan 2.0 (logiphase.com) | ||
file creation suite, including: - A configurable preprocessor that verifies your topics and points out the exact location of the errors it finds; - A Segmented Hypergraphic Editor to create sensible images; - A multilingual spell-checker; - A dynamic editor that allows you to jump to other topics | |||
Updated: 3, 2005 | Rating: 90 | Author: Daniel Potvin | Size: 2306 kb | Demo Go to category: Development > Other Similar programs | |||
89. | Spreadsheet Composer 2.0 (dfs.uh-hosting.co.uk) | ||
addressing for the selected cells. The add-in permits complete verification of a formula before it is stored within the database. The formula can be verified against its original definition and against its intended behaviour. If a formula gives an unintended output for a particular combination of inputs, then additional error trapping can be factored into the composed | |||
Updated: 9, 2005 | Rating: 0 | Author: Terry Johnson | Size: 1127 kb | Freeware Go to category: Development > Other Similar programs | |||
90. | MathStudio 1.0 (softconsortium.com) | ||
each element involved, checking it’s resolution step by step, verifying it’s results, reducing the possibilities of making mistakes.a number succesfully A big difference this program has among ordinary calculators is that this program enables you to see simultaneously each element involved, checking it’s resolution step by step, verifying it’s results, reducing the | |||
Updated: 3, 2005 | Rating: 82 | Author: Work Ar | Size: 1500 kb | Shareware Go to category: Education > Other Similar programs | |||
|
Home > Verification software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|