Hosting Controller 6.1
Hosting Controller is a complete hosting automation tool for Windows NT/2000/2003 servers. It is all you need to put your hosting business on auto pilot. Hosting Controller gets the list of users from the operating system. In addition to this HC does complete invoicing/billing for all its resellers and Hosting Administrators. With its support for seven Email servers, four DNS servers, two FTP servers, Four Statistics servers, two db servers.
See also: remote access, windows automation, automate hosting, windows hosting, windows hosting control panel, windows control panel, automation, hosting automation, hosting control panel, control panel, remote hosting, hosting solution, host panel, windows panel
AtomicLog makes it easy to monitor and control your Internet activity. The program's easy-to-use graphical interface lets you merge historical and real-time usage to easily view how your computer is being used online. Monitors all of your web site visits, e-mail sent and received, file transfers, chatroom sessions, videoconferencing, and all web activity. And it stops spyware, filters out unacceptable web sites, and blocks annoying ads.
See also: Internet, monitor, filter, adwasher, block, DNS, http, real-time, web, page, site, traffic, analyzer, access, log, hosting, free, domain, ftp, bandwidth, referrer, firewall, whois, dns, address, winsock, advertising, referrer, visitor, kbytes, frames, explorer, host
Check If URLs Exist (Is Valid) Software 7.0
Verify links (URLs) to see if web sites are still active. This program can extract the links inside a web page and check if those links exist as well. You have the option to save the valid or invalid links to file.
See also: links, checking, script, working, host, reachable, exist, accessed, access, web, page, detecting, detect, server, online, website, determine, string, monitor, validate, still, or not, verify, verifying, existance, existence, links, site, website, syntax, php, perl, java, sitemap, extract, sublinks, loaded, load, open, refresh, address, addresses, read, readline, line, referring, cannot, can not, input
Network USB Port Disabler Tool 18.104.22.168
USB drive access monitoring software continuously tracks every USB activity and immediately inform to administrator (server) by beep a sound when any USB device is plug in plug out on LAN. Program provides option to restrict any USB port accessing device at any moment by blocking access permission of Read, Write or both on using Client PC USB port. USB port blocker shows Client PC IP address, manufacturer or storage capacity of used USB device.
See also: Network, USB, port, disabler, prevent, unauthorized, access, plug in, plug out, client, computer, drive, real time, offline, surveillance, activity, LAN, network, administrative, control, permission, server, IP address, host, flash, media
1 Click & Lock 2.9
1Click & Lock up is a system tray security utility you can use to secure your desktop when you step away from your PC. It's secure and very easy-to-use. Just define a password, and select Lock to hide and deny access to your desktop to anyone without the proper password. You can set the program to launch automatically with Windows, lock your desktop from the system tray, log access attempts, and apply a custom background image. When enabled, Secu
See also: lock, screen, free, download, computer, restricting, restrictions, restrict, privacy, protect, control, access, security, password
Do you need to move data from one database to another?
Do you want to validate and clean key information?
Do you want to export data to send to customers?
Are you fed up with re-keying data?
DataSlave is a powerful tool for moving data. DataSlave supports many common data formats and will quickly and simply move, validate and clean your valuable data. More than 100 ready to use functions.
See also: SQL Server, data, MySQL, Data map, Regular expressions, XML, Access, De-limited file, CSV, list, De-duplicate, Validate, SQL, Export, Import, Database, OLE DB, ODBC
4TOPS Access to Word Mail Merge XP/03 5.0
Add-in for exporting data from Access in Word. Mapping is done using fields, which are added automatically to the template and can be moved to the exact position you require. Merges data from main and subform(s). Used where you want to use Word Mail merge. Also: Automatic document processing: print/fax/e-mail, Creation of multiple documents in one go, supports pictures, charts and checkboxes etc.
See also: ms access word, mail merge, export, access to word, word mail merge, mail merge, access to word
Proximity Functions for MS Access 1.1
"Proximity Functions" is a set of MS Access modules, forms and controls that you can use to easily add professional functionality to your MS Access application without programming. By simply importing a few modules, then copying and pasting one control next to a text control on your form you can add Windows-standard file open/save dialogs, folder browse dialogs, color selection dialogs, a fantastic calendar date picker dialog, and more.
See also: dates, modules, controls, developer, free, ms access, microsoft access, add-ins
Full Convert MySQL Edition 2.3
Full Convert provides powerful and comfortable way to convert data of many databases. Databases supported: Microsoft Access, dBase, FoxPro, Microsoft Excel, Interbase/Firebird, Lotus 1-2-3, MySQL, Oracle, Paradox, SQL Server, Text files, ODBC, XML. All editions feature target database tree-like browser with multiselect which greatly simplifies certain actions, as well as powerful actions recording/replay and parameters handling.
See also: Excel, FoxPro, dBase, Access, databases, data, migrate, migration, convert, conversion, database
DMControls.CharMap .NET control 1.0
CharMap is an effective .NET control that allows you to view and copy all characters of any fonts installed in the system. Windows, DOS and Unicode character sets are supported. There is an opportunity to work with selected characters not only through the clipboard but directly receive them into the string buffer when handling the symbol selection event. All these features make the control one of the best solutions for software developers.
See also: input symbols, mouse select characters, character application, preview symbol, True Type fonts, Unicode fonts, clipboard, copy, fonts, font symbol, badge, symbol, token, mark, sign, letter, insert character, .NET platform, .NET, .Net control, development, developer tool, Character Map, CharacterMap, CharMap, special characters, Character Map utility, paste, access to all the characters, letters
Gate-and-Way Mail 2.2
An internal mail server to store all your company's messages.
Powerful and integrated with shared folders and personal folders for internal use only. Authomatic download of mail from the Internet.
Other Gate-and-Way's modules: Backup, Fax, Internet, Voice, RAS. All them integrated and centrally managed.
See also: Navigator, Netscape, Fetchmail, Pine, Mutt, Express, Outlook, Linux, ethernet, network, area, local, LAN, lan, remote, RAS, Remote Access, Backup, Voice, Internet, Fax, Mail, Server, Client, Unified Messaging System, Messenger, router, firewall
Forgotten Password? Lost Password? Ex-employee left without disclosing passwords? There`s lots of legitimate reasons why you may need to use AxessPW. AxessPW Instantly receovers passwords from MS Access Databases Access97,2000, XP databases.
See also: ms access database password recovery, access, database, recover, password, forgotten password, lost password
Deskman Personal Edition 5.51
Deskman allows you to protect desktops easily. Restrict access to system settings and keep your desktop tightly secured from a simple interface. Home users need a simple way of protecting their computers on coffee breaks, or restraining access to their desktop on shared computer environments. Securing your Desktop has never been so easy. Free for personal use.
See also: system protection, security manager, desktop manager, user control, security software, access control, desktop restrictions, desktop security, easy security, access point
Folder Guard Professional 7.5
Folder Guard Professional for Windows XP/2000/Me/98 - Powerful security and access control utility that lets you hide or password-protect files and folders, restrict access to Control Panel, and more. Makes folders invisible to any application, including Explorer, Office, command prompt. Highly customizable and user friendly. For personal systems or corporate networks. Evaluation version is fully functional. http://www.winability.com/
See also: access control, password protection, computer security, restrict access, hide folder
Useful Visual Basic 6.0 development tools to build fast and robust VB6 code. It includes intuitively understandable modules that help in programming such as powerful project explorer, snippets that is a library of useful codes, a number of builders: procedures, classes, properties, structures, collections, enum and error handlers. Settings form is also included into the program to easily adjust necessary parameters.
See also: vba, vb6, programming vb, source code, development tools, vba builders, ms excel, programming tools, visual basic, visual basic for application, Microsoft access, smartvba, smartvb
dbQwikEdit PRO 3.0
Easy to use advanced visual SQL tool. Lets you open any database, edit data, design tables, create queries, import and export data and generate complex SQL statements with ease. Suitable for both novice users and power users. Works with all data bases including: MySQL, Oracle, MS Access, MS SQL Server, MS SQL Express, Fox Pro, sybase, postgres, dbase, DB2 and any ADO or ODBC comlpliant database. Working with databases has never been so easy.
See also: query, SQL, Query Builder, Access, mySQL, Oracle, database, SQL server, query tool, gui sql, sql tool, ems alternative, toad alternative
1st Network Admin 1.61
Comprehensive protection for Windows-based network workstations under a public environment. It lets you restrict access to every corner of PC workstation, apply executable patches remotely, and schedule reboots, shutdowns, and Windows Explorer restarts from a single administrator's computer connected to a TCP/IP-based network or Internet. In total, 1st Network Admin supports over 600 different security restrictions, options and tweaks.
See also: password, security, administrator, access, control, protect, privacy, restrict, lock, screen, free, download
PC Security Tweaker 6.5
PC Security tweaking software to tweak Windows-based computers. Tweak access to lots of Control Panel applet functions, enforce users to use separate system profile folders, disable selected Start Menu items, lock and protect disk drives in My Computer, disable the DOS and command prompt, interruption boot keys, real DOS mode, Registry editing, taskbar, task manager, and network access, hide desktop icons, and much more.
See also: control, desktop, disable, dos, folders, lets, menu, specific, start, system, tweaking, users, network, protect, security, tweak, access
Access2PostgreSQL PRO 1.5.1
Access2PostgreSQL Pro is a database converter between MS Access (mdb) and PostgreSQL. Features: Unicode Support, Primary keys and Indexes conversion, Interactive (GUI) mode / command line mode, scheduler, Renaming of tables, fields, indexes before conversion. There is an ability to save data to PHP script or to a dump file that allows you to get over the restrictions on access to PostgreSQL database if any.
See also: postgresql import access, access para postgresql, mdb to pgsql, mdb to postgresql, postgresql to ms access, convert access to postgresql, postgresql access, access to postgresql, pgsql to access
1-abc.net Password Organizer 6.00
These days, everyone has many different passwords, to login to a messenger or an e-mail account, security codes for online banking, PINs for his telephone and so on. 1-abc.net Password Organizer allows you to organize all your passwords and login data, you only have to remember your master password. Additionally, it offers many useful functions concerning secure password management, a random password generator, own encryption engine, txt export..
See also: manager, manager, organize, un-allowed, shield, encryption, encrypt, hide, hidden, secrecy, secret, messenger, eBay, credit card, PIN, login data telephone, login, privacy, personal, private, to secure, access data, Security, Passwords, password