|
||||||
|
||
|
Home > Security tools software |
Related keywords: security, tools, Tools, UML Tools, Modelling Tools, Security, computer security, internet security, security software, webmaster tools |
|
|
71. | DataObjects.NET 3.7 (x-tensive.com) | ||
relations, automatically updates database schema, provides NTFS-like security system, supports queries, full-text search, multilinguality, versioning, .NET Remoting and much more. DataObjects.NET is object-to-database persistence layer for .NET. It transparently handles persistence of your classes | |||
Updated: 2, 2006 | Rating: 82 | Size: 20744 kb | Freeware Go to category: Development > Other Similar programs | |||
72. | DBDocumentor 4.00 (pikauba.com) | ||
what other objects. The cross referencing extends to procedure and security usage, clearly showing which procedures are used where, and under what security context. These capabilities make DBDocumentor ideal for those wishing to learn the structure of a given database, or simply to document the database for future reference.  Extended capabilities include declarative | |||
Updated: 2, 2006 | Rating: 0 | Author: Tim Mackey | Size: 3660 kb | Shareware Go to category: Business > Databases & Tools Similar programs | |||
73. | Engineers Edition 3.2 (solarwinds.net) | ||
Edition contains 36 Network Discovery, Monitoring and Management tools. Build a DB of your network with NETWORK SONAR, or use IP NETWORK BROWSER to quickly discover an entire subnet. With the NETWORK PERFORMANCE MONITOR you can not only monitor traffic and bandwidth utilization but set alert thresholds for automatic notification. ADVANCED BANDWIDTH MONITOR provides graphing and | |||
Updated: 9, 2005 | Rating: 82 | Author: Doug Rogers | Size: 51286 kb | Shareware Go to category: Network & Internet > Other Similar programs | |||
74. | EXECryptor 2.3.7 (softcomplete.com) | ||
All SDK's and samples are available. Powerful software tool used for an application code protection from reverse engineering, analysis and modifications, based on a brand new metamorphing code transformation technology, that provides with strong software | |||
Updated: 2, 2006 | Rating: 140 | Author: Alex Sergeev | Size: 2865 kb | Shareware Go to category: Development > Management & Distribution Similar programs | |||
75. | Ghost Installer Studio 3.7.1 (ginstall.com) | ||
Installer Studio 3.7 offers all essential tools for rapidly building setups for Windows applications, focused on enhanced reliability, stability, security and performance. Adobe, Xerox, NEC, Intel and many other companies rely on Ghost Installer Studio to create installations for their top notch software products. Designed to meet high-end expectations of installation | |||
Updated: 3, 2005 | Rating: 96 | Author: gInstall Corp. | Size: 10503 kb | Demo Go to category: Development > Install & Setup Similar programs | |||
76. | LLLib Licensing Library 2.04 (gppsoftware.com) | ||
LLLIB is a Software Licensing Library, supplied as .DLLs and .LIB files for 32-bit development. Comprehensive help file including detailed API documentation. Examples in C/C++ and VB. Supports unregistered licenses, time limited licenses, run limited licenses and full registrations, product numbers, Increase registrations by limiting your software to encourage people to register! No longer do you need to worry about software being used for longer than it should | |||
Updated: 9, 2005 | Rating: 0 | Author: Graham Plowman | Size: 1856 kb | Shareware Go to category: Development > Components & Libraries Similar programs | |||
77. | MetaDataMiner Catalogue PRO 4.2.19 (peccatte.karefil.com) | ||
lines, words, characters, notes, slides, Manager, Company, Category, Security flags, Creation, Last accessed, print date, Edition time - Standard or User-defined ie customized file properties, Mac comments, - Windows 2000 file propertes, - PDF documents properties, - OpenOffice.org, StarOffice | |||
Updated: 2, 2006 | Rating: 632 | Author: Patrick Peccatte | Size: 2688 kb | Shareware Go to category: Web Development > XML/CSS Tools Similar programs | |||
78. | Network Investigation Suite 1.13 (microolap.com) | ||
Suite allows you to use all power of Delphi/C++Builder as RAD tools for creating network applications working with raw network adapter traffic. This components set supports the following operation systems: Windows 95 Windows 98 Windows ME Windows NT 4.0 Windows Windows 2000 Windows XP Net Investigation Suite can be used with Borland Delphi 5 and 6, as well as with C++ Builder 5 and | |||
Updated: 8, 2004 | Rating: 0 | Author: microOLAP Technologies | Size: 1416 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
79. | PE Corrector 1.84 (gigamindsystems.com) | ||
trash in the header. But also it may contain even your personal security data from your disks (passwords, for example). PE Corrector can correct this problem. It simply clean the headers in safe mode and erase all illegal information. Also you can insert your own info into header (copyright information, for example).; - Some compilers inserts into PE files some export functions | |||
Updated: 9, 2005 | Rating: 0 | Author: GigaMind Systems | Size: 630 kb | Shareware Go to category: Development > Source Editors Similar programs | |||
80. | PELock 1.06 (pelock.pac.pl) | ||
tracing • counteraction to dumping application memory with the tools like ProcDump, LordPE... • application integrity check • many anty-debug and anty-trace tricks • advanced import table protection (so called "api redirection") • application password protection • simple in use license key | |||
Updated: 9, 2005 | Rating: 0 | Author: Bartosz Wójcik | Size: 422 kb | Demo Go to category: Development > Other Similar programs | |||
|
Home > Security tools software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|