Security Icon Set 2011.1

Security Icon Set 2011.1
Publisher: Aha-soft Date added: 23 December, 2012
License: Demo Size: 2.3 MB
Price: $49.00
Editor rating: 5 Stars

Security Icon Set is a collection of wonderfully-crafted stock icons for use in commercial and personal products, including software applications, websites and presentations. Includes 219 icons with bright colors, smooth and well-rounded edges.

Advertisements
   

Description:

Security Icon Set is a collection of 219 royalty-free stock icons for use in commercial and personal products, including software applications, websites, blogs, and presentations.

The icons have been carefully created pixel by pixel by professional artists. They shine with a bright palette of colors, smooth and well-rounded edges. Superb in their quality, the icons will help a developer to place a truly professional feel to his project's interfaces without the need to hire a designer or spend days and even weeks on designing icons on his own.

Your web products and security software will look more modern and attractive with Security Icon Set. Color formats include Windows XP and 8-bit formats. Available sizes are 16x16, 24x24, 32x32, 48x48 and 256x256. This icon set includes security related icons: login, guard, firewall, signature, lock, key, shield, card file and others.

You can take any main icon for your application from the above icons. Upcoming Windows Vista requires 265x256 icon sizes and our icon collection contains such icon size. Be ready for Windows Vista!

Aha-Soft also plans to release the following icon sets: Design Icons for Vista, Application Icons for Vista, Professional Icons for Vista, Button Icons for Vista, Trash Icons for Vista, Factory Icons for Vista, Love Icons for Vista, Software Icons for Vista, Stock Icons for Vista.

Express your passion for quality graphic design with love-icons.com.

Tags: Stockicons, Stock, Icon, Icons, Set, Ico, Clelection, Collection, Icone
Platforms: Handheld , Linux , Mac , OS/2 , Other , Palm OS , Pocket PC , Unix , Windows , Windows CE , WinME , Handheld/Mobile Other , Linux GPL , Linux Gnome , Linux Open Source , Mac OS X , Mac Other , Mac PPC , OS/2 Warp , OS/2 Warp 4 , AS/400 , Java , Palm OS 6.0 , 2000 , 2003 , 95/98 , Win 3.1x , Win95 , Win98 , WinNT 3.x , WinNT 4.x , Windows Vista , Windows2000 , Windows2003 , XP , Win7 x32 , Win7 , Windows Mobile 2003 , Windows Mobile 2005 , WinXP
Requirements: Not specified
Latest Downloads

3D Printing Icons for professionals! 3D Printing Icons deliver professionally created icons which will ensure a great look for any 3d printing related application or business presentation. Available in sizes 16x16 to 512x512, and in ICO, BMP, GIF and PNG file formats and for just $99!

A mega-pack of web 2.0 icons for developers All Perfect Icons is a collection of more than twenty royalty-free icon sets. Including thousands of unique images, the All Perfect Icons pack supplies all web 2.0 icons in a variety of sizes, color resolutions, visual states and file formats.

Liven your desktop with a medical icon bundle If you are feeling glum around the office at your job in a medical or healthcare setting, perhaps what you need is an exciting and professional healthcare themed icon bundle. These icons are great for making your office fun again!

Mega-pack of stock icons All Icon Sets assembles over 200 icon sets, each dedicated to a certain topic. This mega-set of desktop, mobile and Web icons offers a great opportunity to save. With over 25,000 icons, this is the ultimate set fit for every purpose you can imagine.

3D Glossy Icons professional icon toolkit! 3D Glossy Icons delivers professionally created icons which will deliver a great look and feel to any website., application or business presentation. Available in sizes 16x16 thru' 64x64, and in ICO, BMP, GIF and PNG file formats and for just $99.95!

Edit and find icons and manage icon libraries Find, extract, edit and create Windows icons in color depths up to 32-bit True Color. Import and export ICO, Vista ICO, CUR, BMP, JPG, PNG, PSD, WBMP, GIF images. Create and manage icon libraries. Create and store images with several layers.

Convert any image to an icon via a wizard Any to Icon Pro is a wizard-style converter for producing attractive Windows or Mac OS icons from an image. Many graphic formats are supported. Output customization includes options such as icon size, color depth, and transparency.

Collection of network-related windows icons Vista Network Icon Library is a collection of network-related windows icons. The collection is distributed as BMP, PNG, GIF, ICO files. Each icon has 16x16, 24x24, 32x32, 48x48 and 256x256 pixel versions, as well as variants with and without shadows.

Want to know if your employees abuse email? Mail Access Monitor is a simple tool that analyses mail server logs and shows how much traffic is being used by e-mail, who sends and receives most messages, where the messages are being send to and if e-mail abuse takes place in your office.

Security Icon Set 2011.1 - Post Your Review
 * 
 * 
     
 * 
Related Downloads

Easy illustration and design software Turn yourself into an artist and create stunning graphic designs and art for your business or just for fun. You can create web buttons, icons, logos, website graphics, cartoons, t-shirt designs, posters or anything else.

Vista-style electronic hardware icons Save development time. Cut contracting expenses. Enhance your software with readily available Icons-Land Vista Style Hardware & Devices Icon Set. This stylish set of ready-made icons represent items of modern electronic hardware.

Free stock quote monitoring and tracking. Stock Stalker is a FREE stock quote monitoring and tracking application with tons of features including; Streaming, real-time quotes. Compact and simple interface. Minimizes to a system tray icon. Over 40 columns of available data.

Professional tool for creating Web Buttons. Professional tool for creating Web Buttons. With this software you can create a variety of 2D and 3D glassy, metallic, plastic and even XP or Vista style buttonss. HTML & Java Script is automatically created! Creating roll-over and animated buttons!

Create your own database quickly and easily. Create your own database quickly and easily. The main feature of the program - records are not in the form of rows, and in the form of cards. This method of editing the records you have not tried!

EXE to ICO Converter EXE to ICO Converter is an easy to use application that allows you to convert EXE, DLL, and OCX to ICO.

PDF joiner and splitter divide break PDF file PDF joiner and splitter software allow working with number of standard options like divide, merge, Cut, delete, break, remove, join, add, append, extract, combine, compare, concatenate etc. Program allows securing PDF document.

Simple database for the home and office. TablePro is a simple, convenient, and very versatile database for the home and office, with fast and powerful search options, sorting on all fields, adjustment of the user interface, very fast loading and processing of huge quantities of records.

Simple database for the home and office. TablePro is a simple, convenient, and very versatile database for the home and office, with fast and powerful search options, sorting on all fields, adjustment of the user interface, very fast loading and processing of huge quantities of records.

Create your own database quickly and easily. Create your own database quickly and easily. The main feature of the program - records are not in the form of rows, and in the form of cards. This method of editing the records you have not tried!

Collection of network-related windows icons Vista Network Icon Library is a collection of network-related windows icons. The collection is distributed as BMP, PNG, GIF, ICO files. Each icon has 16x16, 24x24, 32x32, 48x48 and 256x256 pixel versions, as well as variants with and without shadows.

Want to know if your employees abuse email? Mail Access Monitor is a simple tool that analyses mail server logs and shows how much traffic is being used by e-mail, who sends and receives most messages, where the messages are being send to and if e-mail abuse takes place in your office.