This application enables you to see the standard RMON statistics for your whole network segment.
This application enables you to create reports for any of the entries and statistic in the probe, including the most active applications, hosts, and conversation for a given period of time.
See also: most used protocol, which devices generate most trafic (conversetaion monitor), which application generate most trafic, which device generate most trafic, Network Traffic Anayzer, which device lock network, which device generate erronious trafic
EULA Magic 2004
EULA Magic is the ultimate visual basic distributed application license form builder incorporating both one off retail version licenses, or trial version licenses that include your promotional material with a purchase button to optimise sales. EULA Magic uses FieldCraft's revolutionary GreenLock technology to both enforce trial periods and ensure that your company's trial locking entries do not build up to levels that could damage Windows.
See also: project licensing, program licensing, trial enforcement, trial locking, trial lock, visual basic, application licensing, environmentally friendly shareware, promotional licensing, purchase button
Hide Window Hotkey 2.1
Hide Window Hotkey is a utility which allows you to hide the windows,and programs which are running on your screen.It will instantly hide or close all (or some) programs through Mouse Hotkey or Keyboard Hotkey.
Resize your programs automatically every time they start,such as maximize,minimize,normal,minimize to tray.Set application windows transparency.Reorder the windows on taskbar based on your choice.Show window property of application.
See also: Password Lock, bosskey, password protect, active window, current window, hide windows tool, hide task, game hide, hide applications, hide program, hide application, boss key, hide windows, custom window, window customize, manage window, max window, transparent window
Folder Vaccine Home Edition 3.1
Folder Vaccine Home Edition is a powerful desktop utility that keeps files and folders secure and safe by hiding and locking them, or by making them read-only with a password. With Its' simple to use drag-and-drop interface; Folder Vaccine Home Edition is the easiest way to protect your important files and folders. Its robust locking capabilities can also lock floppies, CD-ROMs, removable disks, and local hard drives.
See also: executable file, application lock, block control panel, hide files, lock-down, lockdown, file lock, desktop security, folder, folder, lock file, guard
Monitor your system and stop unwanted software. Watchman is now the tool of choice for protecting your system in a reliable way. With a simple interface, Watchman delivers file protection, application usage logging, and access control management. Simple and productive: Stops unwanted applications, Protects system settings, Protects documents from tampering, Monitors application usage, Sends security alerts by e-mail, and much more.
See also: stop software, desktop monitor, desktop security, software monitor, application monitor, file lock, document protection, protect files
Computer Security 1.5
Security should be a very important and concerning issue in you every day activity. No matter you are part of a company or a home user, it is very important to protect your files. Computer Security does that for you encrypting sensitive data, hiding it in innocent carriers, allowing safe transfer through encrypted self-extract package, deleting files beyond recovery and locking application from your children or " welcomed quests".
See also: lock application, secure delete, hide files, data security, security software, computer security, security, self extract package
Hide files and folders, encrypt them and protect. Masker hides files and folders in inconspicuous places, such as picture, video, sound files or program files . The strong encryption and password protection makes the hidden data inaccessible for unauthorized users! Only you using your password are able to open and extract your hidden files. Use Masker to keep you sensitive, secret files secure hidden and super-protected!
See also: dateien, datei, application, unlock, lock, protect, secure, algorithm, free, download, security, data, disguise, conceal, verschlüsseln, verstecken, comauflage, encrypt, folder, file, folders, files, hide, steganography, masker, verzeichnis, verzeichnisse
MySQL Backup & Restore Databases Software 7.0
Backup and recover your MySQL databases. Backups can be set up to occur automatically every 5 minutes, 30 minutes, 1 hour, etc. This application is standalone and data can be backed up without mysqldump, myphpadmin or any other tool. This application can also be used to transfer one MySQL database to another.
See also: zipped, save as, application, entire, mysql-dump, data base, mysqls, storage, binary logs, innodb, mysqlhotcopy, lock, drop, tables, move, copy, copies, files, raw, site, converting, convert, web-based, management system, manual, mysql.com, administration, gzip, compress, options, .sql, admin, Igor Romanenko, commands, statements, transferring, regular, apache, export, exporting, importing, import, backed, backing up, sql, server, automatically, auto, recover, transfering, transfer to another, data, script, php, myphpadmin, restoring, mysqldump, recovering, dump, recovery, line, users, advanced, add, where
Join (Merge, Combine) Multiple (or Two) HTML Files Into One Software 7.0
Combine multiple htm / html files together into one file. Load a group of files into the list and click 'Join'. You decide what the name of the result file will be. The joining process takes only a few seconds.
See also: joining, merging, combining, htm, first, second, third, three, convert, converting, open, them, together, single, just, group, splitting, split, application, hyper text, markup, language, batch, multiple, many, various, assorted, collective, conglomerate, different, diverse, diversiform, heterogeneous, indiscriminate, legion, manifold, many, miscellaneous, mixed, motley, multifarious, multiform, multiplex, multitudinal, multitudinous, numerous, populous, several, sundry, varied, variegated, various, voluminous, accompany, add, adhere, affix, agglutinate, annex, append, assemble, associate, attach, blend, bracket, cement, clamp, clasp, clip, coadunate, coalesce, combine, compound, concrete, conjoin, conjugate, connect, copulate, couple, entwine, fasten, fuse, grapple, hitch on, incorporate, interlace, intermix, juxtapose, knit, leash, link, lock, lump together, marry, mate, melt, mix, pair, put together, slap on, span, splice, stick together, tack on, tag on, tie, tie up, touch, weave, wed, weld, yoke, align, associate with, come aboard, consort, cooperate, enlist, enroll, enter, follow, fraternize, mingle with, pair with, plug into, side with, sign on, sign up, abut, adjoin, border, border on, bound, butt, communicate, conjoin, extend, fringe, hem, lie beside, lie near, line, march, meet, neighbor, open into, ouch, parallel, reach, rim, skirt, trench on, verge on
Desktop Security Rx 4.0
Desktop Security Rx's advanced technology prevents users from deleting critical files and applications, making unauthorized changes to the desktop, saving unwanted programs, running disallowed programs, and downloading from Internet Explorer. With Desktop Security Rx, you can feel confident that unauthorized changes, won?t result in a loss of productivity or PC availability. The protection of Desktop Security Rx functions at the OS kernel level.
See also: Desktop Security, lock down, folder protection, desktop security, file lock, lockdown, lock-down, hide files, block control panel, application lock, executable file, folder, lock file, guard
Desktop Security Rx Software 4.0
Desktop Security Rx Software is a powerful desktop security solution for personal or publicly accessible computers running the Windows 2000/XP or Server 2003 Operating Systems.
Desktop Security Rx's advanced technology prevents users from deleting critical files and applications, making unauthorized changes to the desktop, saving unwanted programs, running disallowed programs, and downloading from Internet Explorer.
See also: folder protection, desktop security, file lock, lockdown, lock-down, hide files, block control panel, application lock, executable file, folder, lock file, guard
Launch Pivot 1.6
Launch Pivot is a smart, configurable and powerful tool for exploring and launching programs on your computer. The tool can be used as a Media Player or an Image Viewer by placing the mouse cursor over a multimedia or an image file icon on the main screen. With integrated scheduler various tasks can be executed at specified times. Internet searches can be also performed from any application by marking text and pressing a hotkey.
See also: launcher, launch, desktop, start, application, run, quick launch, program launcher, startup, application launcher, search, find, keyword, scheduler, media player, image viewer, stand by, hibernate, lock, web
Safetica BUSINESS 3.1.5
Your staff can threaten security of sensitive corporate data. Firewalls and antivirus software do not protect you from internal threats. Protect yourselves from data leakage from corporate computers and disks. Gain control over the staff?s access to sensitive data and increase their working attitude by monitoring their activity. Save access data safely and do not allow spyware to log your passwords. Administer your company?s security centrally.
See also: security, encryption, shredder, disk encryption, activity monitoring, parental lock, access block, usb lock, pc lock, application lock, usb token, password manager, key manager, privacy, private key, secret, secret key, protection, public key, DLP
Chroniker for Availability Monitoring 4.0.2
NodeWatch is for monitoring availability and response time of your nodes, ports, servers, applications, and vital network components.
TaskWatch for testing important user tasks so you know the response time of databasequeries, email, FTP, web page forms and content matching, LDAP queries, DNS, even custom tasks
See also: server monitoring, webserver monitoring, server uptime, network monitoring, database monitoring, system monitoring, file monitoring, Citrix monitoring software, Application response time monitoring, availability monitoring, availibility monitoring
Simple Mortgage Calculator 1.01
Simple Mortgage Calculator instantly determines your monthly mortgage loan payments, total payment amount, total interest and prepayment savings given a fixed interest rate schedule. Monthly prepayment calculation or one time prepayment (down payment) options are also available.
See also: financing, equity, home, florida, financing, finance, fha, equity, debt, consolidation, commercial, calculator, broker, credit, interest, mortgage, application, loans
Iconshock Impressions - Professional icons for your software and web 1.0
Impressions contains more than 1000 icons attractively designed to recreate the common appearance of every day and styled with the look of the new Windows Vista. These fine art figures will make your applications have a true professional appearance. Impressions provides you with standard icons for use in any kind of multimedia application, accounting, security communications and much more, in a very impressive and unique corporative style
See also: stock icons, xp icons, website icons, web icons, vector icons, application icons, Professional icons, windows icons, mac icons
for municipalities and geodetic corporations with the purposes of support of the directory of basic geodetic points placed during operations on geodetic shooting and carry to a nature of the civil-engineering designs on territory of municipality and provides:
Support of databases of geodetic points, including the thumbnails of their allocation on district and figures of brands of items;
?reation and printing of cards of items.
See also: directory of basic geodetic points, developer, application, shareware, Geoitem
PageFocus Pro 6.14
A versatile application for creating drawing, form, document, hypertext, and form-based database applications. It provides a set of runtime commands for developing form database applications. The system includes multi-language spell check, image and PDF import/export, and scanner support. The runtime program includes a build-in database engine for database management. The package supports double-byte languages, including vertical text entry.
See also: multi-language, Application Development, Desktop Publishing, Database, Form, PDF
Word Viewer ActiveX Control 2.6
Word Viewer ActiveX acts as an ActiveX document container for hosting Word document in a custom form or Web page. Support Word automation client and offer abundant sample codes. It can be easily integrated into applications written in languages that support ActiveX control such as Visual C++, Visual Basic, Delphi, C++ Builder and .Net languages.
See also: Word ocx, Word Viewer, Word activex, Word application, Word integrate, Word program, Word programme, Word automating, Word automate, Word sample, Word vba, Word online, Word component
JEasy is an application designer for JAVA using SWING components.
The main concepts are to store all GUI components in an XML file,
to use Layout Managers for presentation at runtime
and to use XML-messages to transfer informations
between user and data storage.
All GUI components and messages with their properties are defined
inside the JEasy repository.
See also: repository, Java repository, Java sourcecode, Swing application, applets, application, examples, J2EE, GUI, J2SE, servlet, XML, Swing, Java, JEasy, Swing Components, Gui-Builder, Learning Java