Hosting Controller 6.1
Hosting Controller is a complete hosting automation tool for Windows NT/2000/2003 servers. It is all you need to put your hosting business on auto pilot. Hosting Controller gets the list of users from the operating system. In addition to this HC does complete invoicing/billing for all its resellers and Hosting Administrators. With its support for seven Email servers, four DNS servers, two FTP servers, Four Statistics servers, two db servers.
See also: remote access, windows automation, automate hosting, windows hosting, windows hosting control panel, windows control panel, automation, hosting automation, hosting control panel, control panel, remote hosting, hosting solution, host panel, windows panel
AtomicLog makes it easy to monitor and control your Internet activity. The program's easy-to-use graphical interface lets you merge historical and real-time usage to easily view how your computer is being used online. Monitors all of your web site visits, e-mail sent and received, file transfers, chatroom sessions, videoconferencing, and all web activity. And it stops spyware, filters out unacceptable web sites, and blocks annoying ads.
See also: Internet, monitor, filter, adwasher, block, DNS, http, real-time, web, page, site, traffic, analyzer, access, log, hosting, free, software, domain, ftp, bandwidth, referrer, firewall, whois, dns, address, winsock, advertising, referrer, visitor, kbytes, frames, explorer, host
Check If URLs Exist (Is Valid) Software 7.0
Verify links (URLs) to see if web sites are still active. This program can extract the links inside a web page and check if those links exist as well. You have the option to save the valid or invalid links to file.
See also: links, how to, checking, script, working, host, reachable, exist, accessed, access, web, page, detecting, detect, server, online, website, determine, string, monitor, validate, if it's, still, or not, on the, verify, verifying, existance, existence, links, site, website, syntax, php, perl, java, sitemap, extract, sublinks, loaded, load, open, refresh, address, addresses, read, readline, line, referring, cannot, can not, input
USB Port Blocker 126.96.36.199
Network USB Data leakage Protection tool is a comprehensive USB blocker that easily prevent unauthorized possibility for accessing sensitive data from or to computer system using USB port. Software capture all detail in text format for future surveillance purpose and inform to server by beep sound. Windows network anti data-theft program easily captures plug in plug out of device even your home or office network is broken or disconnected.
See also: computer, media, flash, host, IP address, server, permission, control, administrative, network, LAN, activity, plug out, plug in, surveillance, offline, real time, drive, PC, client, access, unauthorized, prevent, blocker, port, USB
Network USB Port Disabler Tool 188.8.131.52
USB drive access monitoring software continuously tracks every USB activity and immediately inform to administrator (server) by beep a sound when any USB device is plug in plug out on LAN. Program provides option to restrict any USB port accessing device at any moment by blocking access permission of Read, Write or both on using Client PC USB port. USB port blocker shows Client PC IP address, manufacturer or storage capacity of used USB device.
See also: Network, USB, port, disabler, tool, prevent, unauthorized, access, plug in, plug out, client, PC, computer, drive, real time, offline, surveillance, activity, LAN, network, administrative, control, permission, server, IP address, host, flash, media
WebAdmin allows administrators to securely manage MDaemon 8.0 and higher, RelayFax, and WorldClient from anywhere in the world. This convenient remote administration tool is FREE of charge and is a separate download from MDaemon. WebAdmin interface is compatible with Microsoft IE 5.5 and newer, Netscape 7.1 and newer, Mozilla 1.4 and newer, Mozilla Firefox 0.9 and newer, and Safari browsers; includes SSL and IIS support.
See also: RelayFax, MDaemon, web based administration, web admin, web administration, email administration, web-based access, remote administration, web-based administration, web access, web base access, web based access, web base administration, WorldClient
Create,edit,extract,convert,compress,encrypt,mount CD/DVD image file.PowerISO is a powerful CD/DVD image file processing and file compression tool, which allows you to create, extract, compress, edit and convert ISO/BIN image files, and mount these files with internal virtual drive. And most of all, the compressed files can be used directly without decompressing. PowerISO supports almost all image file formats.
See also: edit ISO, extract ISO, convert BIN to ISO, BIN ISO converter, split ISO, mount ISO, encrypt ISO, CD ISO compress, compress ISO, create ISO, compression, BIN ISO converter extractor editor, bootable CD, convert, ISO, BIN, Compress, Direct Access Archive, Virtual Drive, DAA, CD image file, rip to iso, iso extract, iso unpacker, ISO compress, bin Extractor, split iso file, Mount ISO win32, compress DVD ISO, Extract iso file, unpack iso files, iso recover data, iso file compress, compress iso file, compress iso files, decompress iso files, dvd compress, encrypt iso image
Kernel Access - Repair Corrupt Access Databases 4.02
Kernel Access is a Microsoft Access database repair software designed to recover corrupted Microsoft Asccess files. Kernel access extracts text even from heavily damaged *.MDB files and never deletes from disk, writes to, or modifies the original document files when performs any operation including Microsoft access database recovery.
See also: fix access file, microsoft access, access file undelete, MDB recovery, MDB undelete, repair access database, corrupt access file repair, ms access recovery, repair damaged access database software
ABC Security Protector 5.21
This nice free security utility enables you to protect your PC by disabling some features like: use of the MS-DOS command prompt in Windows and real mode DOS applications from within the Windows shell, and disable function keys on boot up like the F5, F6 and F8 keys. The program is very useful if you want to disable the lowlevel access to your system. It's easy to use, excellent online help is also available. Try our password and security tools,
See also: free, screen, lock, restrict, privacy, files, protect, control, dos, access, administrator, security, password, download
Outlook Remote Accesss 1.50
Remote PC access is a topical problem nowadays. The sophisticated software like GoToMyPC or PC Anywhere assumes that the client and server tools are being used on both computers. Surely, it is impossible to install a client's part from some places like Internet Cafe. Is there any way out?
eTopping Remote Access plug-in for Outlook makes your Outlook a remote host and provides a secure access to it from any place without any special software.
See also: outlook access, remote control, remote admin, remote access, outlook
dbQwikReport OnTime Designer Pack 1.0
With dbQwikReport OnTime Designer Pack you can easily design secured reports that run on your web site, in your office or on your PC. View the reports in any standard web browser. Create both internative and batch reports. It generates all script code for you in ASP or PHP for both windows and Unix/Linux. Works with all databases including: MS Access, mySQL, MS SQL server, Oracle. Exports reports to PC: MS Word and Excel.
See also: mySQL, MS Access, code generator, Database, SQL, PHP, ASP, web report, reporting, report, reporting
Access Frontend Loader 1.1.3
Deploy new releases of your Microsoft Access applications to workstations automatically. Take control of version management via a server based console. Update workstations with one click saving time and ensuring trouble free administration. Features include automatic desktop/start menu shortcut creation on workstations, advanced group based permissions, version history log, easy rollback to previous versions, force disconnect or lockout users.
See also: adp, mdb, end, front, user, multi, 2003, 2002, 2000, 97, control, version, once, click, deploy, database, access, microsoft
Windentify Beta Lite is a freeware voice biometric package. Includes fully working voice verified windows logon. Now start your machine with only your voice print. ONLY YOU ...... can start your computer. ONLY YOU CAN START: DELETE: HIDE: DENY-ACCESS TO YOUR FILES/ PROGRAMS. YOU CAN PREVENT TAMPERING OF LOG REPORTS. YOU CAN CHECK AUTHENTICITY OF YOUR ONLINE MEMBERS
See also: Iris Scanning, Voice Verification, Finger Print, Windows Security, Biometrics, Access Control, Authenticate, Passwords and PINS, BioAPI, Speech Verification, Remote User, Facial Recognition
dbQwikReport Pro 1.1
Simple web reports, simply. With dbQwikReport you can easily design reports that run on your web site. The easy to use wizard will have you making reports in seconds complete with grouping and totals. It generates all your code for you in ASP or PHP for both windows and Unix/Linux. Works with all databases including: MS Access, mySQL, MS SQL server, Oracle. Exports reports to PC: MS Word and Excel. You can secure your reports.
See also: MS Access, code generator, Database, SQL, PHP, ASP, web report, reporting, report, mySQL
Add Images to Access Easily and Efficiently with DBPix: the Access Image Control. Avoid ALL the Access Imaging Gotchas! * Fast easy development * No OLE bloat * Responsive forms and fast record scrolling * Optimize storage, performance and display quality * Rotate portrait images without quality loss * View EXIF camera info * TWAIN scanner and camera control * Intuitive user-interface * Drag and drop * Try DBPix Now!
See also: dbpix, image, control, database, access, jpeg, EXIF, image control, form, report, data, scan, twain, ole, activex, thumbnail, upload, picture, component, jpg, content, bitmap, document, photo, graphic, msaccess, ms access, photograph, camera, scanner, OLE Object, table
VISOCO dbExpress driver for Sybase ASE (Win32 version) 2.2
VISOCO dbExpress driver for Sybase ASE provides direct access to Sybase ASE and allows
you to avoid Borland Database Engine (BDE), ODBC, ADO. Key features: High-performance;
Native access; Easy installation and distribution; Minimized driver size and use of
system resources; Cross-platform support; Free support for registered users; "Per
developer" license without royalty fee.
See also: database-independent, cross-platform, News, Delphi, sybase ase, Sybase, SQLMetadata, Database, datasets, unidirectional, Borland, driver for Sybase, dbExpress, software, visoko, VISOCO, data-access layer, Adaptive Server Enterprise, ASE
PC Activity Monitor Net (PC Acme Net) 6.4.1
PC Activity Monitor (PC Acme) is an ultimate invisible and undetectable easy-to-use monitoring and surveillance tool for both networked and personal PCs. It is professional software that captures all users activity on the PC. It is a powerful management tool for users and companies, which want to increase their productivity and profitability. This is the most remarkable security product for a computer you have seen.
See also: trojan, keylogger, key loger, spy, espionage, detective, surveillance, investigation, parental control, access control, intelligence, monitoring, security, hack, hacking, cheating spouse, internet
Genius Connect - Tasks 184.108.40.206
GeniusConnect turns Outlook into a more powerful information management tool through database connectivity!
-Improved efficiency while working in Outlook through immediate access to current database information.
-Easy access to contact, calendar and customer information, stored in your database.
-Create Tasks in Outlook based on events in your database.
-connectivity to any standard SQL Database.
See also: outlook, synchronize, contact, mail, calendar, task, note, journal, database, ODBC, crm, backup, oracle, mysql, access, sql server, sybase, watcom, MSDE, ADABAS, IBM DB2, INFORMIX, InterBase, PostgreSQL, SQLBase, dBase, FoxPro, Paradox
A parental control software program, gives you complete control over your child's use of the computer: when he or she can use it for entertainment, and when for doing homework. It enables you to restrict the times when the computer can be used, and to set the times that your child may surf the Internet, play games, use particular programs, and watch movies.
See also: game control, internet schedule, pc control, computer use, computer access, schedule computer time, time control, control computer time, parental control
MS Access Join Two Tables Software 7.0
Horizontally merge (combine, match, union) two Access tables into one by a common column (field) of data. The two tables can be located in the same Access file or two different Access files. No complicated options or SQL knowledge required. For Access experts, this is similar to an OUTER JOIN where a new table is created with the results.
See also: tie, tack, stick, splice, slap, put, merging, joining, combining, merge, union, match, combine, lock, knit, fuse, hitch, fasten, connect, conjoin, compound, relational, matched, unmatched, both, all records, columns, ms-access, rows, database, pair, mix, melt, together, db, querying, lump, innerjoin, outerjoin, inner join, outer join, cement, coalesce, clamp, blend, attach, assemble, append, affix, adhere, add, combinding, updateable, unioning, two-way, group, splitting, split, help, sql, natural, long, binary, memo, text, characters, decimal, char, guid, byte, date, currency, double, single, long, integer, summing, crosstab, updating, third, updating, unioning, microsoft, ms access, mdb, files, many, 1, one, sql, data, sql statement, first, 2nd, 1st, 3rd, normal form, normalize, into, create, generate, criteria, complicated, combination, datatype, cross, 10, 9, 8, 7, 6, 5, 4, 3, ten, nine, eight, seven, six, five, four, three, where, null, dupe, duplicate, remove, syntax, id, pid, zero, count, special, comparing, nested, both, from, select, tsql, mismatch, size, type, index, append, records, recordset, linking, link, odbc, secondary, primary key, small, large, once, twice, design, compare, xp, diff, identical, flat, upsizing, upsize, aggregate, together, internal, external, stored, relationship, sides, more than, right, left, mdb, similar, different, accessing, distinct, seperate, separate, by, linking, matching, queries, boolean, bit, second, update, fields, 2, contains, condition, all, by, scan, names, grid, same, getting, get, query, full, cartesian, returned, return, value, common, relation, single, 2003, 2007, 2000, multiple, another, new, existing