|Audio & Multimedia|
|Games & Entertainment|
|Home & Hobby|
|Network & Internet|
|Security & Privacy|
This Access-like .NET Winforms data navigation control works with datasets, views, collections and objects that implement IList. Navigate by clicking on buttons, using shortcut keys, entering navigation commands in the display box or by context menu. Additionally, developer-defined buttons can be activated. Two buttons are defined for incremental navigation, enabling users to jump a predefined number of data items.
See also: Windows Forms, RAD, component, IList navigation, collection navigation, record navigation, dataset navigation, data navigation, record navigation, MS Access-like, VS.NET control, data navigation bar, VB.NET, CSharp, .NET, .NET Framework, NavBar
PakMed PakPsych 72 1.0.0
PakMed Psych 72 is a psychological/psychiatric software developed in/for Microsoft Office Access and is based on the DASS that is a set of three self-report scales designed to measure the negative emotional states of depression, anxiety and stress. Write Dr Murad Khan at email@example.com for details. The DASS may be administered either in groups or individually for research purposes.
See also: australia, lovibond, streee, anxiety, depression, dass, scale, health, mental, medical, neurology, pakmed, murad, access, microsoft, neuroscience, psychology, psychiatry
Kernel Access - Repair Corrupt Access Databases 4.02
Kernel Access is a Microsoft Access database repair software designed to recover corrupted Microsoft Asccess files. Kernel access extracts text even from heavily damaged *.MDB files and never deletes from disk, writes to, or modifies the original document files when performs any operation including Microsoft access database recovery.
See also: fix access file, microsoft access, access file undelete, MDB recovery, MDB undelete, repair access database, corrupt access file repair, ms access recovery, repair damaged access database software
DeviceLock gives network administrators control over which users can access what devices (floppies, serial and parallel ports, Magneto-Optical disks, CD-ROMs, USB and FireWire drives, Bluetooth, ZIPs, etc.) on a local computer. Once DeviceLock is installed, administrators can control access to floppies, CD-ROMs, USB or any other device, depending on the time of day and day of the week.
See also: access control, secure nt, port lock, smart security, cd lock, floppy lock, floplock, flock, protection, securent
Internet Access Manager 1.22
Internet Access Manager is a nifty utility you can use to schedule and simplify your access to the Internet or to another computer. It is designed to help you make and maintain Internet connection with as little fuss as possible. It has flexible time scheduler to establish an active connection at the designated time. Online statistic monitor helps you to keep track of how much time you are spending. Holder of passive connection is available.
See also: ftp server, schedule, internet access, dialup networking connection, Internet Access Manager
Fleet Manager 4.0.4
Fleet Manager is designed for organizations managing a vehicle fleet. It automates the day-to-day duties required to operate and maintain a significant number of vehicles. Some of its main functions include: managing vehicle data, assigning vehicles to employees and/or sections, tracking vehicle mileage, managing installed equipment, tracking accidents and incidents, and managing vehicle maintenance; automatically scheduling inspections.
See also: vehicles, employees, Access, database, management, fleet, vehicle
Access-MySql converter 2.5
Access-MySQL is an effective tool for data conversion from MS Access databases to MySQL server and vice versa , supporting many advanced features like , the ability to select certain number of tables from the source database and moreover there is an ability to select certain number of fields from each table, converting relationships between tables, scheduling of the conversion tasks to be performed automatically
See also: convert mysql to access, convert access to mysql, mysql access converter, access mysql converter, mysql access, access mysql, access and mysql
The Query Tool 2005 6.0.1
The Query Tool is a powerful data mining application. It allows you to perform data analysis on any SQL database Developed predominately for the non technical user. No knowledge of SQL is required. NEW features: Query Builder, quickly and simply build powerful queries; Summary; summarise any two columns against an aggregate function (MIN, AVG etc.) of any numerical column. Query Editor; now you can create your own scripts.
See also: mysql, oracle, sysbase, Access, tyson, database, mining, analysis, report, data, export, summary, .NET, ODBC, SQL, OLEDB, Query
PowerBuilder library (component) for export to Excel format any data with cell's formatting (color, font, data types, etc.). You can add multiple worksheets into a workbook. Component's source code can be easily integrated into your PB application. Improve your PowerBuilder programs via good integration with the most popular spreadsheet applications, including MS Excel 5, 95, 97, 2000, 2002, XP and Linux/UNIX Gnumeric and OpenOffice.
See also: powerbuilder component, powerbuilder, save to excel, write to cell, write to excel, pb2xls, excel, export to excel, powerbuilder excel, powerbuilder access excel
VISOCO dbExpress driver for Sybase ASE (Linux version) 2.2
VISOCO dbExpress driver for Sybase ASE provides direct access to Sybase ASE and allows
you to avoid Borland Database Engine (BDE), ODBC, ADO. Key features: High-performance;
Native access; Easy installation and distribution; Minimized driver size and use of
system resources; Cross-platform support; Free support for registered users; "Per
developer" license without royalty fee.
See also: database-independent, cross-platform, News, Delphi, sybase ase, Sybase, SQLMetadata, Database, datasets, unidirectional, Borland, driver for Sybase, dbExpress, visoko, VISOCO, data-access layer, Adaptive Server Enterprise, ASE
Internet Password Lock 2.0.0
Password protect all access to the Internet (Web surfing, Instant Messaging, email, etc.). Protect children by making sure they do not use the Internet without a parent present or lock out unauthorized Internet use on business computers. Once Internet Password Lock is installed, all Internet access is blocked when Windows starts. Input a password to access the Internet. You can then access the Internet freely until you lock the Internet again.
See also: password protect, block Internet, access, Web, Internet, password, lock Internet
RecentX gives you instant access to Recent Documents, Folders, Programs and Websites. The best part is that it automatically tracks the items you access. You do not have to spend time adding your favorite files, etc. It offers a neat way to use these items with least effort. Also common file operations (copy, paste, etc) can be quickly performed without using a file manager. Download free trial to experience its benefits right away.
See also: Internet Explorer, Internet History, Recent Websites, Recent Programs, Recent Folders, Recent Documents, Recently Used Files, Recent Files, Instant Access, Automatically Track Files, RecentX, Mozilla Firefox, Launcher, TaskTracker, ActualDoc
Drive Vaccine HNM 2.0
The Drive Vaccine HNM is a software console that allows an administrator access to all installations of Drive Vaccine (PC and Mac) from a central location. With Network Control Manager, Technicians are allowed to enable/disable the protection and broadcast updates, applications or new images. The Network Control Manager also keeps track of how many licenses are purchased, used, and available for use with Drive Vaccine.
See also: hdd sheriff, lock down, lockdown, registry mechanic, evidence eliminator, internet eraser, internet erase, workstation protection, classroom computer, desktop security, reboot, restore, hard drive, recovery genius, public access, computer maintenance
AdRem sfConsole 5.0
Encrypted, directory- and Web-enabled remote and local access to the NetWare console; role-based access rights management; emergency connection and file transfer; user activity auditing; ability to open multiple server and program screens at a time; low footprint; single sign-on. Supports all NetWare versions.
See also: network management, server management, diagnostics, netware, novell, network, management, server, netware management, remote access
Advanced Security Administrator 10.41
Protect your computer and restrict access to Internet with Security Administrator. This nice password-protected security utility enables you to impose a variety of access restrictions to protect your privacy and stop others from tampering with your PC. You can deny access to each individual component of several Control Panel applets, including Display, Network, Passwords, Printers, System and Internet Options. You can disable your boot keys, cont
See also: password, security, administrator, access, control, protect, privacy, restrict, lock, screen, free, download
Advanced Office Repair 1.0
Advanced Office Repair(AOFR) is a Microsoft Office data recovery suite. It includes recovery tools for corrupt or damaged MS Access databases (MS Access 95, 97, 2000, XP and 2003), MS Excel worksheets (MS Excel 3, 4, 5, 95, 97, 2000, XP and 2003), MS Word documents (MS Word 6.0, 95, 97, 2000, XP and 2003), MS Outlook data files (MS Outlook 97, 98, 2000, 2002 and 2003), and MS Outlook Express dbx and mbx files (MS Outlook Express 4, 5 and 6).
See also: office, recovery, repair, fix, recover, microsoft, 2000, 2003, repair office, office recovery, corrupt, damaged, corruption, restore, retrieve, rescue, data, access, excel, word, outlook, outlook express, database, worksheet, document, pst, dbx, mdb, deleted, undelete, unerase
Outlook Express Privacy 1.7
Control access to Outlook Express and its email message database. When you enable protection, the program disables access to the message database and address book files. When you open Outlook Express or Windows Address Book, a password is asked for authentication. Outlook Express and Windows Address Book will become accessible only if a correct password is entered. This software can be used to prevent your email data from being stolen or damaged
See also: access, database, email, message, password, address, book, express, outlook
Adondo Personal Audio Link 1.0
PAL enables you to call your PC from any phone to hear the information you need. PAL can:
*Read and reply to email
*Provide instant traffic reports for your local roads
*Voice-dial Outlook contacts
*Recite information from documents and spreadsheets
*Get stock quotes and weather reports
*Read web pages and blogs
*Get appointments and contact info
PAL requires no expensive handheld device. It?s fast, easy, and hands-fre
See also: remote access, voice_over_IP, VoIP, text to speech, call your pc, personal audio link, office, outlook, informaton, access, remote, audio, pal, voice recognition, speech recognition, adondo
MS Word Remove (Delete) Duplicates In Documents Software 7.0
Search and delete duplicate lines, entries, values, records, rows and numbers in any list in multiple Word files. Simply add Word files into this application and click 'Remove Duplicates Except First'. Use this product to compare and eliminate all matching, redundant data.
See also: search, lines, entries, rows, comparison, list, match data, entry, compare, entries, records, rows, search, cells, names, unique list, unique number, unique value, unique record, unique values, matching data, finder, rows, entries, records, identify data in spreadsheet, Can locate data entered, How do I prevent data in, how can i locate data in an data table, Finding and sorting data in, Finding data, Filter data in a column, finding Data in columns, Locating Data In a Spreadsheet, Find Data in Two Lists, Formula to filter out text data in a column, Deleting Data, Find data within a column, question on removing data, Sorting Data, Excel: How to delete Row data, How do I delete entries in, data, if command in VBA, Highlight data, comparing lists of data to remove data, how to check if columns contain data, Delete rows from a list in, get rid of data, Macro to delete data in row, Excluding Data, How can I sort text data in, Cells, prevent in Data Validation, Eliminate data, Reject data entries, How to Hide Data in a column, How do I delete both sets of data, using a macro to delete data (cells), Scanning for Data in a Column, tool which finds date in 2003, Values, names in, find data and copy to a third worksheet, How do I locate records in, Comparing column data, prevent data from being entered, Data within Worksheet, Duplicates in mail merge, finding and deleting data in two spreadsheets, Duplicates in Column 2000, how to deal with data rows, Can MS remove duplicates, Manipulate Data, No data in a column, values, data entry, stop data, Comparing two columns of data and flag any duplicates, Deduping entries, Extracting data, What formula should I use to compare data, Highlighting data entry, numbers in list (2000), Check rows for references, How to delete rows in 2000, display of data in columns, How do I delete rows in an spreadsheet, Removing Data, data in a cell, deleting rows with data in specified column, Removing Data, Formula to data to second sheet, How do you Stop Entering Data in a Column, Entries Isolation, comparing and deleting rows, dedata in, Checking for data, How to eliminate entries, Finding Data set in Worksheets, records in, Macro to delete data, Delete Data in a Sheet Automatically, Eliminating rows of data efficiently, Finding duplicates in a data set, How to suppress duplicates in a sheet, How to not query data, Checking for Data in Worksheets, No entries in a column using, Duplication elimination, Sorting of data in 2003, Delete data, filtering data from 2 different reports, Cell reference of data, macro to delete lines, Prevent in Data Validation, finding records, Removing rows, Chip Pearson, Deleting rows, Searching for Duplicates across columns, Column duplicates, Delete Records, Avoiding entries, Filter Data Advanced, Comparing 2 Columns for data, Comparing 2 rows for data, Records in, data in Array, matching and eliminating data, How do you eliminate cells in, remove values in an column, Filter names in an database, Duplicating Excel's Autofilter functionality, Identify and Highlight items, Search data for entries, Counting Data in a Column, Function for finding rows, Data comparison, Sort duplicates, Only Keep Non-duplicates in an spreadsheet, extracting data, Removing rows of data, Avoiding duplicates when importing from spreadsheets, Finding Duplicates - Matching Data & Copying Records, Way to delete cell contents in columns, Have rows of data, Remove names from column, Macro for Checking Spread Sheet for Entries, Extracting data from two lists, Identify & Count the number of Entries, values in, Unique data in column or row in, filter unique values, Unique and data between 2 worksheets, find rows for unique data in 1 column and different data, filter unique data using functions, Get Data - Unique Records only, - Unique Identifiers, make column data unique, List of unique data, Unique records in, Unique Data Filter Help, formatting database output to by deleting duplicates, unique data in a table, unique values, How do I count or display unique data in a column, Merging two tables based on a unique data field, how to make number unique in column, Data Sort Unique Records, Extracting unique data from a list, delete data record from sheet result, Restricting cell data to unique entries, Unique column value in, Update Data from, Combine and eliminate duplicates, Finding unique cell value after using AUTOFILTER, Unique data in column, display unique data only, cpearson, Unique Entries In a List, Unique values in a data set, Filtering Unique Records, delete entries in, Data Validation dependant and unique, Extracting unique data from a range, function unique list of entries, Counting 2 Separate Columns With Unique Data, display only unique data from a list of cells, set up a column in with unique entries, - identify and count the number of unique entries, count unique text in a column, Unique data validation, Unique numbers in a range, Finding unique items in data field, pivot tables, function that determines the number of unique records, number of unique values, validation for unique entry, Returning a Unique Result Set from a List, unique problems, Unique cells in a column, avoid record when import data from to Access, Identifying Unique Values, Restricting column in linked to require unique entries, Sorting of data in 2003, non unique data, eliminating repeated data, formula for counting number of unique cells based on, Counting number of unique ID in range excluding duplicates, Count unique values Pivot Table, Unique column value while entering data, Suppressing duplicates, How do I prevent data in, Count instances of unique item in range, How do I locate records in, comparing two list worksheet, Counting Unique Instances, Prevent in Data Validation, Extract Unique Values, How can I sort text data in, Unique Values, Repeat data, Import Unique Web Data, alter data before import, Count unique values and create list based on these values, Extracting unique numbers from a list, sort unique numbers, Unique Records, Data Filter limit, dedata in, Deleting Unique Rows from an Spreadsheet, Filtering for unique records, data sorting problem, Do Records Match, spreadsheet, table, hide
Internet Lock 5.0
Internet Lock is an access control and password protection software for your Internet programs, it can deny or password protect any program and connection from accessing the Internet. Internet Lock works with the "Rules" mode: you can add one or more rules to control programs and internet connections. A rule normally has such format: [Allow/Deny/Password Protect] [Program] on [Port].
See also: password protect, password protection, internet lock, internet access, internet access control, deny, allow, secure, security, access control, intranet, denied