This application enables you to see the standard RMON statistics for your whole network segment.
This application enables you to create reports for any of the entries and statistic in the probe, including the most active applications, hosts, and conversation for a given period of time.
See also: most used protocol, which devices generate most trafic (conversetaion monitor), which application generate most trafic, which device generate most trafic, Network Traffic Anayzer, which device lock network, which device generate erronious trafic
EULA Magic 2004
EULA Magic is the ultimate visual basic distributed application license form builder incorporating both one off retail version licenses, or trial version licenses that include your promotional material with a purchase button to optimise sales. EULA Magic uses FieldCraft's revolutionary GreenLock technology to both enforce trial periods and ensure that your company's trial locking entries do not build up to levels that could damage Windows.
See also: project licensing, program licensing, trial enforcement, trial locking, trial lock, visual basic, application licensing, environmentally friendly shareware, promotional licensing, purchase button
Hide Window Hotkey 2.1
Hide Window Hotkey is a utility which allows you to hide the windows,and programs which are running on your screen.It will instantly hide or close all (or some) programs through Mouse Hotkey or Keyboard Hotkey.
Resize your programs automatically every time they start,such as maximize,minimize,normal,minimize to tray.Set application windows transparency.Reorder the windows on taskbar based on your choice.Show window property of application.
See also: Password Lock, bosskey, password protect, active window, current window, hide windows tool, hide task, game hide, hide applications, hide program, hide application, boss key, hide windows, custom window, window customize, manage window, max window, transparent window
Folder Vaccine Home Edition 3.1
Folder Vaccine Home Edition is a powerful desktop utility that keeps files and folders secure and safe by hiding and locking them, or by making them read-only with a password. With Its' simple to use drag-and-drop interface; Folder Vaccine Home Edition is the easiest way to protect your important files and folders. Its robust locking capabilities can also lock floppies, CD-ROMs, removable disks, and local hard drives.
See also: executable file, application lock, block control panel, hide files, lock-down, lockdown, file lock, desktop security, folder, folder, lock file, guard
Monitor your system and stop unwanted software. Watchman is now the tool of choice for protecting your system in a reliable way. With a simple interface, Watchman delivers file protection, application usage logging, and access control management. Simple and productive: Stops unwanted applications, Protects system settings, Protects documents from tampering, Monitors application usage, Sends security alerts by e-mail, and much more.
See also: stop software, desktop monitor, desktop security, software monitor, application monitor, file lock, document protection, protect files
Computer Security 1.5
Security should be a very important and concerning issue in you every day activity. No matter you are part of a company or a home user, it is very important to protect your files. Computer Security does that for you encrypting sensitive data, hiding it in innocent carriers, allowing safe transfer through encrypted self-extract package, deleting files beyond recovery and locking application from your children or " welcomed quests".
See also: lock application, secure delete, hide files, data security, security software, computer security, security, self extract package
Hide files and folders, encrypt them and protect. Masker hides files and folders in inconspicuous places, such as picture, video, sound files or program files . The strong encryption and password protection makes the hidden data inaccessible for unauthorized users! Only you using your password are able to open and extract your hidden files. Use Masker to keep you sensitive, secret files secure hidden and super-protected!
See also: dateien, datei, application, unlock, lock, protect, secure, algorithm, free, download, security, data, disguise, conceal, verschlüsseln, verstecken, comauflage, encrypt, folder, file, folders, files, hide, steganography, masker, verzeichnis, verzeichnisse
MySQL Backup & Restore Databases Software 7.0
Backup and recover your MySQL databases. Backups can be set up to occur automatically every 5 minutes, 30 minutes, 1 hour, etc. This application is standalone and data can be backed up without mysqldump, myphpadmin or any other tool. This application can also be used to transfer one MySQL database to another.
See also: zipped, save as, application, entire, mysql-dump, data base, mysqls, storage, binary logs, innodb, mysqlhotcopy, lock, drop, tables, move, copy, copies, files, raw, site, converting, convert, web-based, management system, manual, mysql.com, administration, gzip, compress, options, .sql, admin, Igor Romanenko, commands, statements, transferring, regular, apache, export, exporting, importing, import, backed, backing up, sql, server, automatically, auto, recover, transfering, transfer to another, data, script, php, myphpadmin, restoring, mysqldump, recovering, dump, recovery, line, users, advanced, add, where
Join (Merge, Combine) Multiple (or Two) HTML Files Into One Software 7.0
Combine multiple htm / html files together into one file. Load a group of files into the list and click 'Join'. You decide what the name of the result file will be. The joining process takes only a few seconds.
See also: joining, merging, combining, htm, first, second, third, three, convert, converting, open, them, together, single, just, group, splitting, split, application, hyper text, markup, language, batch, multiple, many, various, assorted, collective, conglomerate, different, diverse, diversiform, heterogeneous, indiscriminate, legion, manifold, many, miscellaneous, mixed, motley, multifarious, multiform, multiplex, multitudinal, multitudinous, numerous, populous, several, sundry, varied, variegated, various, voluminous, accompany, add, adhere, affix, agglutinate, annex, append, assemble, associate, attach, blend, bracket, cement, clamp, clasp, clip, coadunate, coalesce, combine, compound, concrete, conjoin, conjugate, connect, copulate, couple, entwine, fasten, fuse, grapple, hitch on, incorporate, interlace, intermix, juxtapose, knit, leash, link, lock, lump together, marry, mate, melt, mix, pair, put together, slap on, span, splice, stick together, tack on, tag on, tie, tie up, touch, weave, wed, weld, yoke, align, associate with, come aboard, consort, cooperate, enlist, enroll, enter, follow, fraternize, mingle with, pair with, plug into, side with, sign on, sign up, abut, adjoin, border, border on, bound, butt, communicate, conjoin, extend, fringe, hem, lie beside, lie near, line, march, meet, neighbor, open into, ouch, parallel, reach, rim, skirt, trench on, verge on
Desktop Security Rx 4.0
Desktop Security Rx's advanced technology prevents users from deleting critical files and applications, making unauthorized changes to the desktop, saving unwanted programs, running disallowed programs, and downloading from Internet Explorer. With Desktop Security Rx, you can feel confident that unauthorized changes, won?t result in a loss of productivity or PC availability. The protection of Desktop Security Rx functions at the OS kernel level.
See also: Desktop Security, lock down, folder protection, desktop security, file lock, lockdown, lock-down, hide files, block control panel, application lock, executable file, folder, lock file, guard
Desktop Security Rx Software 4.0
Desktop Security Rx Software is a powerful desktop security solution for personal or publicly accessible computers running the Windows 2000/XP or Server 2003 Operating Systems.
Desktop Security Rx's advanced technology prevents users from deleting critical files and applications, making unauthorized changes to the desktop, saving unwanted programs, running disallowed programs, and downloading from Internet Explorer.
See also: folder protection, desktop security, file lock, lockdown, lock-down, hide files, block control panel, application lock, executable file, folder, lock file, guard
Launch Pivot 1.6
Launch Pivot is a smart, configurable and powerful tool for exploring and launching programs on your computer. The tool can be used as a Media Player or an Image Viewer by placing the mouse cursor over a multimedia or an image file icon on the main screen. With integrated scheduler various tasks can be executed at specified times. Internet searches can be also performed from any application by marking text and pressing a hotkey.
See also: launcher, launch, desktop, start, application, run, quick launch, program launcher, startup, application launcher, search, find, keyword, scheduler, media player, image viewer, stand by, hibernate, lock, web
Safetica BUSINESS 3.1.5
Your staff can threaten security of sensitive corporate data. Firewalls and antivirus software do not protect you from internal threats. Protect yourselves from data leakage from corporate computers and disks. Gain control over the staff?s access to sensitive data and increase their working attitude by monitoring their activity. Save access data safely and do not allow spyware to log your passwords. Administer your company?s security centrally.
See also: security, encryption, shredder, disk encryption, activity monitoring, parental lock, access block, usb lock, pc lock, application lock, usb token, password manager, key manager, privacy, private key, secret, secret key, protection, public key, DLP
Desktility has the ability to *lock* icon positions and automatically put them back where they were, instantly using a hotkey, the main interface or the system tray.
Switch to the screensnap tab within the program and a new wealth of possibilities are opened to you. Desktility can take three types of screenshots: the entire screen, regional screenshots, and screenshots of individual windows.
See also: desktop resetter, screen capture, screensnap, screenshot, restore desktop, remember icon positions, application switcher, window, reset icons, utilities, shortcut, monitor, resolution, icon, desktop, printscreen, print screen, clipboard
2X ApplicationServer 3.0
Application remoting: Tunnel any Windows application onto remote desktops and save on administration & support. Install the application once on the server and eliminate the administration hassle of deploying the applications on all workstations. Allow users outside the firewall secure access to corporate applications by tunneling the applications onto their remote desktop/notebook via SSL!
See also: application remoting, tunneling, terminal server, Windows Terminal Services, Microsoft Terminal services, RDP, Citrix, ICA
EzVoice is an answering machine program. It captures caller id, and allows you to pre-screen or block unwanted calls. Its built-in address book let you customize greetings for all your callers. It will notify you of new calls through email. If you own a business, you can set up to 10 voice mailboxes. Additionally, you can attach text notes to your voice messages and quickly find them by using built-in search tool. Try it now to find out more.
See also: phone telephone caller id program application, voice mail, pc computer answering machine software
Payments - system of exchange of ED between exchequer and Managers of the not tax incomes also provides:
Import both conversion of the payables and summary registry of federal exchequer from files of the exchange format (*.arj) in the database (Access' 97, SQL-Server'2000);
Export of the payables and summary registry of exchequer on a filter "OKATO" in the exchange format (*.arj);
Creation, import and export of ED on clarification of payments
See also: manager of the not tax incomes, developer, application, shareware, Payments, import of files of exchequer
ComTL Integration Component 2.06
ComTL is an ActiveX component designed to make system integration in minutes. The component allows you to transfer data directly from the source application to the target application without the need to send it to the server or save it in the shared database. This eliminates the financial expenses and developer efforts associated with manual data entry, traffic consumption and network crashes which occur due to traffic overload.
See also: application communication, integration, share data, application integration
BrightSword Designer 2.0
"BrightSword? Designer", the Ultra-Advanced Rapid Application Development-RAD Tool designed to develop Database-Driven web applications without manual coding in record time.
BrightSword? Designer change the way in which distributed applications are built by automating the repetitive, error-prone and tedious tasks associated with developing web applications, and replacing hand-written code with consistently reliable scalable code.
See also: ASP.NET, .Net tool, RAD tool, rapid application development tool, code generation tool, BrightSword designer, VB.NET, JSP, PHP, web application development
Sophisticated Barcodes maker software provides affordable procedure to create bulk numbers of business stickers used in healthcare, postal services, shipping and retails sectors. Website www.businessbarcodes.org offers professional barcode label maker software that is used to make product stickers in 2D and linear fonts.
See also: sectors, retails, shipping, healthcare, services, postal, coupons, rolls, tags, labels, stickers, colorful, bulk, inventory, product, font, linear, industrial, printable, designs, creates, application, generator, coupons, Business