Hosting Controller 6.1
Hosting Controller is a complete hosting automation tool for Windows NT/2000/2003 servers. It is all you need to put your hosting business on auto pilot. Hosting Controller gets the list of users from the operating system. In addition to this HC does complete invoicing/billing for all its resellers and Hosting Administrators. With its support for seven Email servers, four DNS servers, two FTP servers, Four Statistics servers, two db servers.
See also: remote access, windows automation, automate hosting, windows hosting, windows hosting control panel, windows control panel, automation, hosting automation, hosting control panel, control panel, remote hosting, hosting solution, host panel, windows panel
AtomicLog makes it easy to monitor and control your Internet activity. The program's easy-to-use graphical interface lets you merge historical and real-time usage to easily view how your computer is being used online. Monitors all of your web site visits, e-mail sent and received, file transfers, chatroom sessions, videoconferencing, and all web activity. And it stops spyware, filters out unacceptable web sites, and blocks annoying ads.
See also: Internet, monitor, filter, adwasher, block, DNS, http, real-time, web, page, site, traffic, analyzer, access, log, hosting, free, domain, ftp, bandwidth, referrer, firewall, whois, dns, address, winsock, advertising, referrer, visitor, kbytes, frames, explorer, host
Check If URLs Exist (Is Valid) Software 7.0
Verify links (URLs) to see if web sites are still active. This program can extract the links inside a web page and check if those links exist as well. You have the option to save the valid or invalid links to file.
See also: links, checking, script, working, host, reachable, exist, accessed, access, web, page, detecting, detect, server, online, website, determine, string, monitor, validate, still, or not, verify, verifying, existance, existence, links, site, website, syntax, php, perl, java, sitemap, extract, sublinks, loaded, load, open, refresh, address, addresses, read, readline, line, referring, cannot, can not, input
Network USB Port Disabler Tool 184.108.40.206
USB drive access monitoring software continuously tracks every USB activity and immediately inform to administrator (server) by beep a sound when any USB device is plug in plug out on LAN. Program provides option to restrict any USB port accessing device at any moment by blocking access permission of Read, Write or both on using Client PC USB port. USB port blocker shows Client PC IP address, manufacturer or storage capacity of used USB device.
See also: Network, USB, port, disabler, prevent, unauthorized, access, plug in, plug out, client, computer, drive, real time, offline, surveillance, activity, LAN, network, administrative, control, permission, server, IP address, host, flash, media
Office DocumentsRescue Professional 4.3
DocumentsRescue Pro is an effective document recovery tool for Microsoft Word, Excel, PowerPoint, Project, Publisher, Visio and many other popular document formats. DocumentsRescue Pro can recover documents lost due to computer crashes, accidental deletion (even if the Recycle Bin has been emptied), formatting of a disk drive, and even when a document has never been saved!
See also: handheld PC, memory, MMC, USB drive, floppy, hard drive, HDD, DVD, Memory Stick, LinearFlash, SD Cards, Secure Digital, Multimedia, MicroDrive, IBM, CompactFlash, SmartMedia, password, data, flash card, undelete, recovery, rescue, access, excel, word, document, office, Palm, phone
Program Lock Pro 2.09
Lock and unlock any program on your pc, including IE, Outlook, AOL, AIM, and more. You can even lock your control panel with one button click. Other features include the ability to choose your own message to display if anyone attempts to run one of your locked programs, and also includes password protection so only you can unlock the program when you are ready to use it. Allows the entire PC to remain active and running.
See also: access, locking, protection, password, prevent, prevent access, secure, program lock, pc lock, program protect, lockup, lock, security
Access Administrator 4.21
Protect your files and restrict other users from being able to start, see, change or delete them. File protection activates automatically according to the current user's idenity and the timetable that is defined for it. You can disable Internet access, games and the other entertainment during the working time. For example, from 9:00 AM till 17:00 PM the user "User" can use Microsoft Office only, but after 17:00 PM he can also play his games and..
See also: free, screen, lock, restrict, privacy, files, protect, control, access, administrator, security, password, download
1st Desktop Guard 1.81
Tired to lose your desktop icons and get them rearranged? Tired to roll back your desktop wallpaper and screen saver after other users you share your PC with? Want to secure your public access computers? 1st Desktop Guard lets you save, restore, manage and lock desktop layouts including placement of desktop icons, wallpaper and screen saver.
See also: users, stop, access, public, prevent, download, desktop, screen, wallpaper
ShareAlarmPro is a network tool that allows network administrators and users easily perform a shared folders and resources monitoring. Using ShareAlarmPro you can monitor users attempting to access secured shares and confidential files, detect and log network access to shared folders, monitor security events, monitor accessed files, disconnect users from open files or deny network users access, monitor sharing permission changes.
See also: security events, security software, computer security, event log, intrusion detection, network security, free network monitor, free monitor, network monitor, monitor, monitoring, system monitor, network monitoring, network protection, network access, alert, alerting
MARS 2.7 b200600829
This powerful, intuitive and easy to use report scheduler will save you from the mundane job of manually running Access Reports and Queries and Macros daily, weekly, monthly etc and then exporting them to e-mails to be sent to your client, boss etc. Simply schedule to an email, printer, fax, ftp or folder, choose the output format (word, tif, pdf etc). No coding required.
See also: add report, send report, ftp report, batch report, print report, export report, fax report, email report, schedule report, automate report, report scheduler, christiansteven, access reports, subreport, crd, mars
DB Integration 1.0
This software is the first version of the software products intended for database handling. This software makes it possible to integrate (or combine) two databases of *.mdb (MS Access) format. An integration, in this case, is combining the objects of two databases (tables, forms,modules, macros,reports,data access pages).
If you buy this programm, You may suggest which exclusive features you do want the your version of this software to have.
See also: *.mdb format, MS Access, combine, integrate, database
ABC Amber Access Converter 2.02
An advanced utility which helps you convert your MDB (MS Access) files to any format you wish (XLS, DBF, CSV, XML, PDF, HTML, CHM, RTF, HLP, DOC, and many more) easily and quickly.
The software supports a batch conversion, a run from command line, more than 50 languages. Batch conversion ability allows you to convert a unlimited number of MDB files at a time.
See also: convert access mdb xls csv dbf xml pdf rtf chm hlp html doc
Full Convert SQL Server Edition 2.3
Full Convert provides powerful and comfortable way to convert data of many databases. Databases supported: Microsoft Access, dBase, FoxPro, Microsoft Excel, Interbase/Firebird, Lotus 1-2-3, MySQL, Oracle, Paradox, SQL Server, Text files, ODBC, XML. All editions feature target database tree-like browser with multiselect which greatly simplifies certain actions, as well as powerful actions recording/replay and parameters handling.
See also: database, conversion, convert, migration, migrate, data, databases, Access, dBase, FoxPro, Excel
4TOPS Access to Excel Mail Merge XP/03 5.0
Add-in for exporting data from Access in Excel. Mapping is done using fields, which are added automatically to the template and can be moved to the exact position you require. Merges data from main and subform(s). Used where you want to use Excel Mail merge. Also: Automatic document processing: print/fax/e-mail, Creation of multiple documents in one go, supports pictures, charts and checkboxes etc.
See also: mail merge, export, excel to word, excel mail merge, mail merge, ms access excel, access to excel
Quality Time solves all of those arguments about computer usage in the home. Now you can limit usage to particular times of the day, and limit individuals to an amount of time within those periods, without having to have an argument.
Quality Time also generates a simple report of computer usage for each user for the past week. Just login as the administrator, click the report button, and paste it into your word processor or spreadsheet.
See also: Computer Addiction, Scheduling, Parental Control, Argument, Computer, Share, Children, Time, Limit, Access Control
GateWall proxy server is an Internet-management tool designed to connect local network users to the Internet. The application provides a centralized control over Internet connections, bandwidth, time online; automates daily routines such as calculation of consumed traffic, client reporting and billing. Filtering of Internet content allows blocking access to specific websites and controlling employee-surfing habits. FREE 30-Day trial is available.
See also: network gateway, connection sharing, gatewall, modem sharer, modem sharing, internet access sharing, proxy server, internet sharing, internet connection sharing, web proxy, internet billing, nat, ics, port mapping, traffic calculation.
Web Surfer Watcher 1.0.0
Records what Web sites have been viewed on your computer. Web Surfer Watcher operates hidden in the background, recording Web site titles and URLs (addresses) of Web sites viewed using Internet Explorer or America Online. It can only record the titles of Web sites viewed with other Web browsers, such as Netscape. You can configure Web Surfer Watcher to either record this limited information form these browsers, or block these browsers.
See also: monitor internet use, monitor Web use, monitor Web usage, monitor Web access, monitor Internet, Web security, Internet security
Proactive System Password Recovery 4.1
A program to recover all types of Windows passwords: logon password (when user is logged on and has Admin privileges), NET Passport password, RAS and dial-up passwords, passwords to shared resources etc. The program also shows all users and groups (with their properties), allows to run any programs in other user's context, reveal passwords hidden under the asterisks, run brute-force and dictionary attacks on Windows 9x PWL files and much more.
See also: screensaver, secrets, shared resources, VPN, dial-up, dialup, user, logon, login, network, security, audit, 2003, 2000, lost, Passport, administrator, password, recover, access rights, credentials
Remote Control PRO 2.7
Allows the Network Administrator to view and control remote network computers without having to leave their own workplace. The Administrator connects to the remote computer over the network and, having the remote computer's desktop on the screen of their own PC, launches programs, changes computer settings, etc. by using their own keyboard and mouse.
See also: Remote PC, remote control, remote access, remote control software, remote administrator, remote desktop, remote shutdown, remote admin, terminal server
File and Folder Privacy 2.5
Password-protect and hide your files and folders with a click of mouse. The program will always prompt to enter your access password when protection is enabled and a user is trying to access a protected file or folder. The protected file or folder will become accessible only is a valid password is entered. Windows Explorer integration is supported and upon installation the program creates convenient items in the context menu of Windows Explorer.
See also: access, accessible, explorer, menu, protected, user, file, folder, password