Home > By category > Security & Privacy >Encryption Tools > PHP Implementation of DKIM



PHP Implementation of DKIM

  • Downloads: 
  • Views: 
  • Rating:

PHP functions and classes to add a Domain Key Identified Mail (DKIM RFC 4871) signatures to emails sent by PHP. It is based on the openssl extensions of PHP. It can generate DKIM signature but cannot verify them.Developped and tested on PHP 4.0.

Free download from Shareware Connection - PHP functions and classes to add a Domain Key Identified Mail (DKIM RFC 4871) signatures to emails sent by PHP. It is based on the openssl extensions of PHP. It can generate DKIM signature but cannot verify them.Developped and tested on PHP 4.0.

Publisher: php-dkim.sourceforge.net | License: Freeware | Price: 0.00
Version: 1.0 | Size: 13 KB | Platform: WinOther
Released Date: 18-11-2012 | Rating: 0 | Title: PHP Implementation of DKIM

Author Url: http://php-dkim.sourceforge.net
Program Info Url: http://php-dkim.sourceforge.net
Download Url: http://switch.dl.sourceforge.net/project/php-dkim/php-dkim/v1.0/php-dkim.zip

PHP Implementation of DKIM related downloads:

Webuzo for PHP Point Of Sale - PHP Point Of Sale is a web based point of sale system

Answers 2000 Free PHP Hangman - Free PHP implementation of hangman. The computer thinks of a word, and your visitor has to guess it. You can customize the word list, the display (to fit with your site template), and all in game messages.

PHP Point Of Sale for osCommerce - PHP Point Of Sale (POS) is a web based point of sale system designed to help small businesses with keeping track of customers, items, and sales. This program works great for businesses that use cash, check, or account numbers for their sales.

PHP Point Of Sale - PHP Point Of Sale is designed to help small business's with keeping track of customers, items, inventory, and generate reports based on sales. This program works great for businesses that use cash, check, or account numbers for their sales.

PHP Exif Reader - A PHP implementation of a reader for the EXIF v2.2 standard. Reads the EXIF information from JPEG files without the PHP function read_exif_data/exif_read_data.

Shareware Connection periodically updates pricing and software information of 'PHP Implementation of DKIM' from company source 'php-dkim.sourceforge.net' , so some information may be slightly out-of-date. You should confirm all information before relying on it. Software piracy is theft,  Using 'PHP Implementation of DKIM' crack, password, serial numbers, registration codes, key generators is illegal and prevent future development of PHP Implementation of DKIM.

New Reviews

Safe In Cloud - It is quite difficult to find any computer users nowadays who do not need to use the web, for any purpose. Whether it is for education or entertainment, the web is your best resource. You also need to use various online services for banking, ...

360 Internet Security - Using a computer without having capable Security software installed is equivalent to sleeping with your house’s main door wide open. Whether you use a PC at home or manage a network of computers at the workplace, PC security suite has ...

Plants vs. Zombies 2 - These days there are lot of tower defense games on offer. Coming from the stable of Electronics Arts, which is one of the leading companies in the gaming arena, Plant vs. Zombies is a decent game particularly if you are interested in garden ...

Menu Uninstaller Ultra - For every Windows user it becomes necessary to remove some programs after prolonged usage. It can be necessary to free up disk space or the app may not simply suit the needs any more. Whatever is the reason, you need to uninstall third party apps ...

Qustodio Free Parental Control - Without using the Internet, it is extremely difficult to obtain information, seek entertainment or look for study references but there is a downside to it as well. While some tech savvy kids master the tricks to bypass monitoring of their parents ...

HDD Guardian - No matter how costly a desktop or laptop is, it is necessary to keep a tab on its hardware components. While you can spot signs and symptoms of hardware malfunction and impending failure in some instances, some mishaps may just strike you out of ...

Zebra Total Video Converter - Using video conversion software is something most PC users have become accustomed to nowadays. Given the fact nearly all smart phones, tablets sport HD recording features and cameras have become small enough to be put in pockets, recording voices ...

LastPass - Nearly every computer and internet users need to deal with a lot of passwords and this number only goes up with time! Remembering so many passwords becomes tedious with time and that can add to inconvenience. While you can assign the task of ...

dMaintenance - As a computer user, you may need to deal with several types of applications. For a lot of Windows users, the integrated tools of the OS may not suffice at times. They may need to use several third party apps for needs such as entertainment, ...

FortiClient Standard - Every computer user needs to have adequate protection for his system and this holds true for corporate and network users. In business setups, where multiple desktops and servers are connected to a network, using regular antivirus suite may be ...




New Downloads

Paranoia Text Encryption
for PC

Keep your notes, messages
(SMS, emails, ...),
cryptocurrency keys, and other
texts safe from all unwanted
readers. Using ...

PureVPN Windows VPN
Software

PureVPN \'s updated VPN app
for Windows offers enhanced
performance, is easier to use
& boasts unbreakable ...

CDR Data Analysis Software

CDR Data Analysis Software is
call data analysis software
which is track call
information from your CDR file
extract your ...

CryptoForge

Data encryption software from
CryptoForge provides email,
folder, and file encryption to
secure your data anywhere it
...

Password Confidential for
iOS

You will no longer have to
remember or keep track of
dozens of different passwords.
With the Password Confidential
mobile ...

Immunos

Immunos is a very
user-friendly malware-scanner
with a clean, simple but chic
interface and great detection
and removal ...

TrustPort Tools

A standalone solution for the
protection of sensitive
documents.

Accdb Password Get

APG can easily use to recover
the password for Microsoft
Access 2007/2010/2013 database
files. APG support to recover
...

Trend Micro Titanium
Maximum Security

Titanium Maximum Security 2013
- All-in-one security Trend
Micro Titanium+oOC?

Webm8 U3 Edition

With WebM8 U3, you can carry
all your usernames and
passwords securely encrypted
on your key ring. WebM8 will
remember ...

Cerberus Security Guard

Cerberus Security Guard is a
program devoted to security
challenges whose purpose is to
keep your computer safe from
...

DeviceTrack.net

DeviceTrack.