public » Page 11 » Developer.Team

User Control 2014 14.619

User Control 2014 14.619
User Control 2014 14.619 | 25 Mb


Computers are great tools. However, a computer cannot, on its own, control the way in which it is used. However, this may be necessary to prevent problems, as when employees download pirated software from the web, or when students use a school computer for unintended purposes, or trade show attendees change the settings on a public computer. Our software is designed for small and medium-size companies, schools, public agencies, and, of course, also for individuals who are interested in protecting their computer.
Read more

High / Low Orbit Ion Cannon

High Orbit Ion Cannon

Public-sector IT managers and hackers are always in a constant struggle, especially since government websites are so often the targets of malicious attacks. Now agencies have one more thing to worry about. The hackers have got themselves a High Orbit Ion Cannon -- actually, an unlimited number of the new weapons.
Read more

User Control 2014 14.612

User Control 2014 14.612
User Control 2014 14.612 | 25 Mb


Computers are great tools. However, a computer cannot, on its own, control the way in which it is used. However, this may be necessary to prevent problems, as when employees download pirated software from the web, or when students use a school computer for unintended purposes, or trade show attendees change the settings on a public computer. Our software is designed for small and medium-size companies, schools, public agencies, and, of course, also for individuals who are interested in protecting their computer.
Read more

RAPWare EasyCrypt Enterprise v6.1.1 Full Source

RAPWare EasyCrypt Enterprise v6.1.1 Full Source
RAPWare EasyCrypt Enterprise v6.1.1 Full Source | 3 Mb


Easy Crypt brings the power of the Microsoft Cryptographic Technologies to your Delphi applications. With the provided components you get an easy way to hash, protect/unprotect, encrypt/decrypt strings and binary data. Both public/private-key and symmetric key cryptography are supported.
Read more

Smart Hide IP 2.8.5.8

Smart Hide IP 2.8.5.8
Smart Hide IP 2.8.5.8 | 3 Mb


Smart Hide IP is your choice if you want to: change your static IP address; surfing the Web anonymously, unban certain sites that forbids your entering; increase your online privacy and security; guard against hackers; run MSN or Kazaa behind firewalls; send anonymous emails; secure your PC when connecting to public wireless hotspots; block ISP eavesdropping; hide your IP while chatting in MIRC, ICQ, and MSN, etc.
Read more

User Control 2014 14.610

User Control 2014 14.610
User Control 2014 14.610 | 25 Mb


Computers are great tools. However, a computer cannot, on its own, control the way in which it is used. However, this may be necessary to prevent problems, as when employees download pirated software from the web, or when students use a school computer for unintended purposes, or trade show attendees change the settings on a public computer. Our software is designed for small and medium-size companies, schools, public agencies, and, of course, also for individuals who are interested in protecting their computer.
Read more

Smart Hide IP 2.8.5.6

Smart Hide IP 2.8.5.6
Smart Hide IP 2.8.5.6 | 3 Mb


Smart Hide IP is your choice if you want to: change your static IP address; surfing the Web anonymously, unban certain sites that forbids your entering; increase your online privacy and security; guard against hackers; run MSN or Kazaa behind firewalls; send anonymous emails; secure your PC when connecting to public wireless hotspots; block ISP eavesdropping; hide your IP while chatting in MIRC, ICQ, and MSN, etc.
Read more

User Control 2013 14.608

User Control 2013 14.608
User Control 2013 14.608 | 25 Mb


Computers are great tools. However, a computer cannot, on its own, control the way in which it is used. However, this may be necessary to prevent problems, as when employees download pirated software from the web, or when students use a school computer for unintended purposes, or trade show attendees change the settings on a public computer. Our software is designed for small and medium-size companies, schools, public agencies, and, of course, also for individuals who are interested in protecting their computer.
Read more

Smart Hide IP 2.8.5.2

Smart Hide IP 2.8.5.2
Smart Hide IP 2.8.5.2 | 3 Mb


Smart Hide IP is your choice if you want to: change your static IP address; surfing the Web anonymously, unban certain sites that forbids your entering; increase your online privacy and security; guard against hackers; run MSN or Kazaa behind firewalls; send anonymous emails; secure your PC when connecting to public wireless hotspots; block ISP eavesdropping; hide your IP while chatting in MIRC, ICQ, and MSN, etc.
Read more