CDLock 1.4 CDLock lets you set up rules for the local computer ActiveDiary 3.5 ActiveDiary is a password-protected diary application. The Type Pilot 3.0.1 Managing technical support may require that you type Event Log Janitor 1.0 Event Log Janitor Emails Event Logs at predefined Intervals BigBRAIN 1.6 An Adress-/Phonebook manager, appointment scheduler, CD Remind-Me 6.2 Remind-Me tracks and reminds you of important events before Logbook Pro 1.16.7 Pilot logbook software for Windows and PDA companions for U-Wipe 2.0 U-Wipe is a very easy-to-use utility that allows to Checklist 4.4 Checklist is a task management tool that helps you plan UpBackup 2.1 Lack of automated backup solutions makes it hard to
Universal Submitter Professional 2.3 Submit to more than 18590 Free For Alls and Search engines! Universal Submitter also has popularity checks, position checks, meta tag generator, meta tag extractor, profiles, reciprocal links database and more! Try the free demo!
Universal Submitter 2.3 Submit to more than 18590 Free For Alls and Search engines! Universal Submitter also has popularity checks, position checks, meta tag generator, meta tag extractor, profiles, reciprocal links database and more! Try the free demo!
Description: Source Encryption gives webmasters the tool to protect their HTML Source Code against un-authorized copying. The software actually encrypts the source code so that others can not view it.
The encryption scheme is based on a Java script text encryption that will allow your website to function normally while keeping the source code securly hidden. When a user goes to your encrypted website, they only see what you intend - not the code that make
Users Bypass Copy Protection on Portable Napster Users have found a way to skirtcopy protection on Napster Inc.'s portable musicsubscription service just days after its high-profile launch,potentially letting them make CDs with hundreds of thousands ofsongs for free.
Microsoft's Yukon Gets Encryption Protection Database administrators running SQL Server can look forward to a bit more free time and less worries about unauthorized access to sensitive data files, thanks to new database features announced by Microsoft Corp. at its TechEd 2004 conference on Tuesday .