Hosting Controller 6.1
Hosting Controller is a complete hosting automation tool for Windows NT/2000/2003 servers. It is all you need to put your hosting business on auto pilot. Hosting Controller gets the list of users from the operating system. In addition to this HC does complete invoicing/billing for all its resellers and Hosting Administrators. With its support for seven Email servers, four DNS servers, two FTP servers, Four Statistics servers, two db servers.
See also: remote access, windows automation, automate hosting, windows hosting, windows hosting control panel, windows control panel, automation, hosting automation, hosting control panel, control panel, remote hosting, hosting solution, host panel, windows panel
AtomicLog makes it easy to monitor and control your Internet activity. The program's easy-to-use graphical interface lets you merge historical and real-time usage to easily view how your computer is being used online. Monitors all of your web site visits, e-mail sent and received, file transfers, chatroom sessions, videoconferencing, and all web activity. And it stops spyware, filters out unacceptable web sites, and blocks annoying ads.
See also: Internet, monitor, filter, adwasher, block, DNS, http, real-time, web, page, site, traffic, analyzer, access, log, hosting, free, domain, ftp, bandwidth, referrer, firewall, whois, dns, address, winsock, advertising, referrer, visitor, kbytes, frames, explorer, host
Check If URLs Exist (Is Valid) Software 7.0
Verify links (URLs) to see if web sites are still active. This program can extract the links inside a web page and check if those links exist as well. You have the option to save the valid or invalid links to file.
See also: links, checking, script, working, host, reachable, exist, accessed, access, web, page, detecting, detect, server, online, website, determine, string, monitor, validate, still, or not, verify, verifying, existance, existence, links, site, website, syntax, php, perl, java, sitemap, extract, sublinks, loaded, load, open, refresh, address, addresses, read, readline, line, referring, cannot, can not, input
Network USB Port Disabler Tool 18.104.22.168
USB drive access monitoring software continuously tracks every USB activity and immediately inform to administrator (server) by beep a sound when any USB device is plug in plug out on LAN. Program provides option to restrict any USB port accessing device at any moment by blocking access permission of Read, Write or both on using Client PC USB port. USB port blocker shows Client PC IP address, manufacturer or storage capacity of used USB device.
See also: Network, USB, port, disabler, prevent, unauthorized, access, plug in, plug out, client, computer, drive, real time, offline, surveillance, activity, LAN, network, administrative, control, permission, server, IP address, host, flash, media
PakMed PakNutri 12 1.0.0
PakMed PakNutri 12 is a compact searchable nutritional database application from PakMed developed in/for Microsoft Office Access 2000 or later version. It caters information on nutritional composition of 6839 food items included in USDA National Nutrient Database for Standard Reference, (SR17) covering 44 food components or nutrients.
See also: food, composition, usda, database, microsoft, office, access, pakmed, dietetics, health, education, murad, medical, biology, government, application, biostatistics, nutrition
VeriFinger Linux SDK 4.2
VeriFinger Linux SDK is intended for most biometric system developers. This SDK contains interfaces for some of the major fingerprint scanners, which allow the developer to obtain data from the scanners without any additional software. Supports BiometriKa FX 2000 scanner, AuthenTec AES4000 EntrePad and AF-S2 FingerLoc sensors.
See also: pattern recognition, access control, recognition, authentication, SDK, ridge, crime, scan, security, biometric, verification, matching, identification, recognition, fingerprint, criminalistics
Security Administrator 10.51
Stop others from tampering with your PC. Deny access to Control Panel applets, disable boot keys, context menus, DOS windows, Registry editing, network access, hide desktop icons, local, network and USB drives, Start menu items, taskbar. Apply password protection to Windows, restrict users to running specific applications only, control Internet usage, view statistics of working of your kids or employees.
See also: free, screen, lock, restrict, privacy, protect, control, access, administrator, security, password, download
Advanced Security Level 6.1
Secure your PC and restrict access to it with Advanced Security Level. It gives you an excellent administrative support to control the users access rights for your computer by setting up the desired access control level for each user. You can restrict access to Control Panel applets and to running specific applications; hide desktop icons, local and network drives; disable Start Menu items, DOS, boot keys, Registry editing, taskbar and much more.
See also: computer security, secure Internet, access control, password protection, privacy, restrict access, downloads, advanced security level
Serial E-Mails with support of MS Access database and txt template files
- addresses are stored in a true database, no limits for a number of addresses;
- letter templates in a simple text files;
- address record: EMail, Prefix, Name, Template, 5 free Memo-fields for you needs;
- possibility to change a letter-template for every address;
- one-touch-sending mails to all selected addresses with an appropriate template for every address;
See also: serial letter, E-Mail, email, access, database, template
Full Convert Enterprise 2.10
Full Convert provides powerful and comfortable way to convert data of many databases. Databases supported: Microsoft Access, dBase, FoxPro, Microsoft Excel, Interbase/Firebird, Lotus 1-2-3, MySQL, Oracle, Paradox, SQL Server, Text files, ODBC, XML. All editions feature target database tree-like browser with multiselect which greatly simplifies certain actions, as well as powerful actions recording/replay and parameters handling.
See also: database, conversion, convert, migration, migrate, data, databases, Access, dBase, FoxPro, Excel
Access2PostgreSQL PRO 1.1
Access2PostgreSQL Pro is an effective converter between MS Access (mdb) and PostgreSQL. Features: Unicode Support, Primary keys and Indexes conversion, Interactive (GUI) mode / command line mode, Built-in scheduler, Renaming of tables, fields, indexes before conversion. There is an ability to save data to PHP script or to a dump file that allows you to get over the restrictions on access to PostgreSQL database if any.
See also: data conversion, data convertibility, programmers, database, command line mode, Access to PostgreSQL, Conversion, Access2 PostgreSQL PRO, database converter, PostgreSQL 2Access, PostgreSQL to Access, database, PostgreSQL, convert, MS Access, Converter, data converter, data alteration, data restructuring, application software, PHP script, Text file, dump file, dump
Statlook enables IT managers to track almost all users' activities, including: logging, work time and break duration, detailed statistics of application usage and visited web site history. Statlook is a comprehensive system for IT asset management, covering all major IT resources, such as: user activity, license compliance, software/hardware inventory. Thanks to Statlook it is possible to get a full access to users' hard disks and view the screen
See also: visited web site history, application software usage, break duration, user activity tracking work time, software hardware inventory, license compliance, user activity, asset management, user hard disks computer access control, screen capture grabbing
dbQwikReport Pro 1.1
Simple web reports, simply. With dbQwikReport you can easily design reports that run on your web site. The easy to use wizard will have you making reports in seconds complete with grouping and totals. It generates all your code for you in ASP or PHP for both windows and Unix/Linux. Works with all databases including: MS Access, mySQL, MS SQL server, Oracle. Exports reports to PC: MS Word and Excel. You can secure your reports.
See also: MS Access, code generator, Database, SQL, PHP, ASP, web report, reporting, report, mySQL
Add Images to Access Easily and Efficiently with DBPix: the Access Image Control. Avoid ALL the Access Imaging Gotchas! * Fast easy development * No OLE bloat * Responsive forms and fast record scrolling * Optimize storage, performance and display quality * Rotate portrait images without quality loss * View EXIF camera info * TWAIN scanner and camera control * Intuitive user-interface * Drag and drop * Try DBPix Now!
See also: dbpix, image, control, database, access, jpeg, EXIF, image control, form, report, data, scan, twain, ole, activex, thumbnail, upload, picture, component, jpg, content, bitmap, document, photo, graphic, msaccess, ms access, photograph, camera, scanner, OLE Object, table
VISOCO dbExpress driver for Sybase ASE (Win32 version) 2.2
VISOCO dbExpress driver for Sybase ASE provides direct access to Sybase ASE and allows
you to avoid Borland Database Engine (BDE), ODBC, ADO. Key features: High-performance;
Native access; Easy installation and distribution; Minimized driver size and use of
system resources; Cross-platform support; Free support for registered users; "Per
developer" license without royalty fee.
See also: database-independent, cross-platform, News, Delphi, sybase ase, Sybase, SQLMetadata, Database, datasets, unidirectional, Borland, driver for Sybase, dbExpress, visoko, VISOCO, data-access layer, Adaptive Server Enterprise, ASE
Image Server SDK 4.1.8
Image Server SDK allows to customize and use in your Web-based server applications the functionality of our product Web Image Guru.
You can easily process images directly within your ASP, ColdFusion or other server applications.
Image Server SDK new features are: * New more powerful JPEG compression engine. * Significantly enhanced color reduction algorithms. * Lossy GIF color reduction. * Wireless bitmaps (WBMP) supported.
See also: WBMP, PNG, GIF, JPEG, MS Access, JScript, VBScript, Delphi, VisualBasic, Development, Server, ColdFusion, ASP, COM, ActiveX, SDK, Processing, Optimization, Image, TIFF
VShell Server for Windows 2.3.6
VShell Secure Shell server is a secure alternative to Telnet and FTP on Windows and UNIX platforms. Provide the strong encryption, robust authentication, and data integrity of SSH2 throughout your organization. Precision control over privileges, the ability to fine-tune your Secure Shell environment, and a wide selection of strong authentication methods give you a flexible solution that grows with your evolving security policies.
See also: port forward, tunnel, file transfer, remote access, UNIX, Windows 2000, server, security, Secure Shell, ssh2, ACL, users, groups
SupportWindow Console 1.0
SupportWindow Console accepts incoming connections from SupportWindow Hosts and SupportWindow Services to allow complete remote desktop control,file sharing and Chat. Optional registration of Presentation Mode allows console operator to do desktop presentation which multiple connected Support Hosts may view. Perfect for explaining software functions to remote users. The Support Host is free.
See also: remote access, help desk, support, desktop, remote, remote desktop, remote support, chat
MultiNetwork Manager Std 8
Connect anywhere fixed or wireless, quickly and securely, using powerful multi-profiling UI and wizards.
The need to connect your computer to different networks is growing as we enjoy the new possibilities of mobile working. Wireless networking is changing the way we work and live our lives. We expect to be able to connect and work from wherever we are. The benefits are obvious, but the technical complexity for the user is increasing.
See also: configuration, connect, multinetwork, access, Wlan, laptop, TCp/IP, emobility, switching, domain, connectivity, netswitcher, network, client
PC Control 1.3.0
PC Control allows the system administrator to establish access controls for each username. For each day of the week, the administrator sets access times, as well as the total length of time available for use.
The program is based upon a "set and forget" philosophy. Setting controls requires [1 min per user. Once set, the administrator can forget. The program requires no ongoing actions to operate. There are no daily authorizations, tokens.
See also: Parental Control, Access Control