В 1934 г. родился Васьков Семен Тимофеевич - российский ученый, член-корреспондент РАН (1991), член-корреспондент АН СССР с 1990. Автор трудов по разработке научных основ создания прецизионных систем ввода-вывода изобразительной информации в ЭВМ.
Licence Protector generates Demo- and time limited versions, extensive software copy protection, supports concurrent user testing, Web activation, electronic Software Distribution, protects multiple modules per application, available in 9 languages
Licence Protector 2.5 - You have developed an application and you want to protect it fast, easy, reliable and cost effective? Licence Protector from Mirage Computer Systems administrates licences and modules (license manager and control), generates Demo- and time limited versio
Licence Protector Multimedia Edition - Protect Flash, Video, Music, Images and other file types like PDF or Office Documents (Word, Excel, Powerpoint). Every document which can be printed with a printer driver can be protected. Predefined workflow without programming. Comes with an own Multime
Licence Protector - Licence Protector generates Demo- and time limited versions, extensive software copy protection, supports concurrent user testing, Web activation, electronic Software Distribution, protects multiple modules per application, multiple languages
SolidLicense .VB6 - SolidLicense is a software based license protection system for VB6 projects, Microsoft Office extensions and Microsoft Access based products. Fast and easy integration in your products. Also available for .NET.
Похожие англоязычные статьи:
Lizard Protector Web Content Security: By Invitation Only! - The web is a very convenient media for conveying information to the masses. However, not all information is made to be shared by everyone, especially where information is confidential and privy only to certain parties. The easiest way to shield sensitive information from prying eyes is to password-protect
Wireless Protector - a smart security tool for corporate networks - Corporate networks are usually a mix of standard and wireless connections with varying levels of security. The average corporate user rarely thinks about this aspect of the company’s infrastructure and uses any available connection to log in to the network. However, when a Wi-Fi enabled device is connected (via