Copy Protection Tool


Advertisement

IPod Copy Pack Tool

iPod Copy Pack is an all-in-one iPod copy solution. This Pack includes 2 software -- " iPod Transfer $19.95" and " iPod Transfer Photo $19.95". Now you can get this iPod Copy Pack at a very competitive price $29.95! Save $10!

PageLock Website Copy Protection

Protect your website's HTML code and design from theft using this easy to use program. PageLock encodes HTML in a way that makes it difficult to make unauthorised copies whilst still allowing the resulting webpage to be displayed in a JavaScript compatible ...





Advertisement

Logic Protect

Logic Protect supports all kinds of software activation (including Phone Activation and Software-as-a-Service (SaaS) features) that makes Logic Protect a flexible activation and copy protection tool for any software author and vendor.

DoneEx XCell Compiler  v.2.6

DoneEx XCell Compiler offers very easy and hassle free Microsoft Excel workbook copy protection.
You can compile Excel spreadsheet into EXE application with securely hidden formulas in binary format and protected VBA code. With registration/license ...

XCell Compiler  v.2.6

DoneEx XCell Compiler offers very easy and hassle free Microsoft Excel workbook copy protection.
You can compile Excel spreadsheet into EXE application with securely hidden formulas in binary format and protected VBA code. With registration/license ...

USB Drive Disabler Tool

USB drive data theft protection tool records all USB operations at client network in log files in text or html format and saves at user specified location with date and time. USB drive data leakage protection application supports all USB media such as ...

ITool DVD Copy  v.1.06.08

iTool DVD Copy is a fast, easy-to-use DVD copying software which is capable of copying DVD movies with removing any region code and DVD copy protection, it allows you to create/remove DVD menu, select subtitle and audio track, or even copy the original ...

Copy Protect  v.2.0.6

Copy Protect offers copy protection of your videos, audios, pictures and documents in an easy and feasible manner. You can prevent data duplication of your files and folders and restrict any illegal distribution by any means. This is made possible as ...

ELicenser Control  v.2. 2. 2003

eLicenser is a license-management and copy-protection technology used by many software companies. Here end-users are provided with the current and previous versions of the eLicenser Control (eLC) to ensure the reliability of eLicenser-protected software.

StarForce Content  v.3.1

StarForce Content is a unique service designed for copy protection of electronic documents against home copying and unauthorized use. StarForce Content allows you to solve the problem of information leakage, insider threats, of maintaining the confidentiality ...

Licence Protector  v.4

You have developed an application and you want to protect it fast, easy, reliable and cost effective?

Licence Protector from Mirage Computer Systems administrates licenses and modules (license manager and control), generates Demo- and time limited versions (trial versions), provides you with software copy protection and supports ...

Multimedia Protector  v.3.0.2



Feature:
* Content Protection.
* Software Copy Protection.
* USB stick protection .
* Time limited evaluation versions.
* Network licence per PC and per User (floating licence as an option).
...

CHM OwnerGuard  v.12.7.9

CHM OwnerGuard is the ultimate Digital Rights Managemet (DRM), Security, Copy Protection, Licensing, Watermarking and Distribution Management solution for Microsoft Compiled HTML Help Documents (CHM)

Brief Features
* Lock your CHM Documents ...

Flash OwnerGuard  v.12.7.5

Flash OwnerGuard is the ultimate Digital Rights Management (DRM), Security, Copy Protection, Licensing and Distribution Management solution for Adobe Flash SWF and FLV Video Files and a wide range of other Multimedia Files including (mp4, f4v, 3gp, ...

Sophos Windows Shortcut Exploit  v.1.0.1

The Windows Shortcut Exploit Protection tool runs whenever Windows tries to display an icon corresponding to a Windows shortcut. The tool intercepts this request and validates the shortcut. If the shortcut does not contain an exploit, the icon is displayed.

Pages : < 1 | 2
Newest Reviews