Advanced Security for Outlook 1.3
Use Advanced Security for Outlook to learn what programs are trying to access Microsoft Outlook and permanently allow or deny access to the program the next time it requests access, the action you choose for this program will be automatically executed and Outlook Security will not annoy you with messages about trying to access e-mail addresses you have stored in Outlook. Works with Microsoft Outlook 2000, 2002/XP and 2003. Freeware.
See also: alert investigation, outlook object model security guard, program is trying to access, microsoft outlook, security alert, outlook security patch
Office DocumentsRescue Professional 4.3
DocumentsRescue Pro is an effective document recovery tool for Microsoft Word, Excel, PowerPoint, Project, Publisher, Visio and many other popular document formats. DocumentsRescue Pro can recover documents lost due to computer crashes, accidental deletion (even if the Recycle Bin has been emptied), formatting of a disk drive, and even when a document has never been saved!
See also: handheld PC, memory, MMC, USB drive, floppy, hard drive, HDD, DVD, Memory Stick, LinearFlash, SD Cards, Secure Digital, Multimedia, MicroDrive, IBM, CompactFlash, SmartMedia, password, data, flash card, undelete, recovery, rescue, access, excel, word, document, office, Palm, phone
FingerCell PC EDK for Linux 1.2
FingerCell 1.2 Embedded Development Kit for PC with Linux. This EDK is intended for developers, who are going to create an embedded biometric system with a server on PC with Linux. Includes 1 license for FingerCell shared library, interfaces for image input from either files or fingerprint sensors, sample application with source code and software documentation.
See also: access control, authentication, ridge, crime, scan, security, biometric, evaluation, demo, binary, linux, embedded, verification, matching, identification, recognition, fingerprint, pattern recognition, criminalistics
Program Lock Pro 2.09
Lock and unlock any program on your pc, including IE, Outlook, AOL, AIM, and more. You can even lock your control panel with one button click. Other features include the ability to choose your own message to display if anyone attempts to run one of your locked programs, and also includes password protection so only you can unlock the program when you are ready to use it. Allows the entire PC to remain active and running.
See also: access, locking, protection, password, prevent, prevent access, secure, program lock, pc lock, program protect, lockup, lock, security
Access Administrator 4.21
Protect your files and restrict other users from being able to start, see, change or delete them. File protection activates automatically according to the current user's idenity and the timetable that is defined for it. You can disable Internet access, games and the other entertainment during the working time. For example, from 9:00 AM till 17:00 PM the user "User" can use Microsoft Office only, but after 17:00 PM he can also play his games and..
See also: free, screen, lock, restrict, privacy, files, protect, control, access, administrator, security, password, download
1st Desktop Guard 1.81
Tired to lose your desktop icons and get them rearranged? Tired to roll back your desktop wallpaper and screen saver after other users you share your PC with? Want to secure your public access computers? 1st Desktop Guard lets you save, restore, manage and lock desktop layouts including placement of desktop icons, wallpaper and screen saver.
See also: users, stop, access, public, prevent, download, desktop, screen, wallpaper
ShareAlarmPro is a network tool that allows network administrators and users easily perform a shared folders and resources monitoring. Using ShareAlarmPro you can monitor users attempting to access secured shares and confidential files, detect and log network access to shared folders, monitor security events, monitor accessed files, disconnect users from open files or deny network users access, monitor sharing permission changes.
See also: security events, security software, computer security, event log, intrusion detection, network security, free network monitor, free monitor, network monitor, monitor, monitoring, system monitor, network monitoring, network protection, network access, alert, alerting
MARS 2.7 b200600829
This powerful, intuitive and easy to use report scheduler will save you from the mundane job of manually running Access Reports and Queries and Macros daily, weekly, monthly etc and then exporting them to e-mails to be sent to your client, boss etc. Simply schedule to an email, printer, fax, ftp or folder, choose the output format (word, tif, pdf etc). No coding required.
See also: add report, send report, ftp report, batch report, print report, export report, fax report, email report, schedule report, automate report, report scheduler, christiansteven, access reports, subreport, crd, mars
DB Integration 1.0
This software is the first version of the software products intended for database handling. This software makes it possible to integrate (or combine) two databases of *.mdb (MS Access) format. An integration, in this case, is combining the objects of two databases (tables, forms,modules, macros,reports,data access pages).
If you buy this programm, You may suggest which exclusive features you do want the your version of this software to have.
See also: *.mdb format, MS Access, combine, integrate, database
ABC Amber Access Converter 2.02
An advanced utility which helps you convert your MDB (MS Access) files to any format you wish (XLS, DBF, CSV, XML, PDF, HTML, CHM, RTF, HLP, DOC, and many more) easily and quickly.
The software supports a batch conversion, a run from command line, more than 50 languages. Batch conversion ability allows you to convert a unlimited number of MDB files at a time.
See also: convert access mdb xls csv dbf xml pdf rtf chm hlp html doc
Full Convert SQL Server Edition 2.3
Full Convert provides powerful and comfortable way to convert data of many databases. Databases supported: Microsoft Access, dBase, FoxPro, Microsoft Excel, Interbase/Firebird, Lotus 1-2-3, MySQL, Oracle, Paradox, SQL Server, Text files, ODBC, XML. All editions feature target database tree-like browser with multiselect which greatly simplifies certain actions, as well as powerful actions recording/replay and parameters handling.
See also: database, conversion, convert, migration, migrate, data, databases, Access, dBase, FoxPro, Excel
4TOPS Access to Excel Mail Merge XP/03 5.0
Add-in for exporting data from Access in Excel. Mapping is done using fields, which are added automatically to the template and can be moved to the exact position you require. Merges data from main and subform(s). Used where you want to use Excel Mail merge. Also: Automatic document processing: print/fax/e-mail, Creation of multiple documents in one go, supports pictures, charts and checkboxes etc.
See also: mail merge, export, excel to word, excel mail merge, mail merge, ms access excel, access to excel
Quality Time solves all of those arguments about computer usage in the home. Now you can limit usage to particular times of the day, and limit individuals to an amount of time within those periods, without having to have an argument.
Quality Time also generates a simple report of computer usage for each user for the past week. Just login as the administrator, click the report button, and paste it into your word processor or spreadsheet.
See also: Computer Addiction, Scheduling, Parental Control, Argument, Computer, Share, Children, Time, Limit, Access Control
GateWall proxy server is an Internet-management tool designed to connect local network users to the Internet. The application provides a centralized control over Internet connections, bandwidth, time online; automates daily routines such as calculation of consumed traffic, client reporting and billing. Filtering of Internet content allows blocking access to specific websites and controlling employee-surfing habits. FREE 30-Day trial is available.
See also: network gateway, connection sharing, gatewall, modem sharer, modem sharing, internet access sharing, proxy server, internet sharing, internet connection sharing, web proxy, internet billing, nat, ics, port mapping, traffic calculation.
Web Surfer Watcher 1.0.0
Records what Web sites have been viewed on your computer. Web Surfer Watcher operates hidden in the background, recording Web site titles and URLs (addresses) of Web sites viewed using Internet Explorer or America Online. It can only record the titles of Web sites viewed with other Web browsers, such as Netscape. You can configure Web Surfer Watcher to either record this limited information form these browsers, or block these browsers.
See also: monitor internet use, monitor Web use, monitor Web usage, monitor Web access, monitor Internet, Web security, Internet security
Proactive System Password Recovery 4.1
A program to recover all types of Windows passwords: logon password (when user is logged on and has Admin privileges), NET Passport password, RAS and dial-up passwords, passwords to shared resources etc. The program also shows all users and groups (with their properties), allows to run any programs in other user's context, reveal passwords hidden under the asterisks, run brute-force and dictionary attacks on Windows 9x PWL files and much more.
See also: screensaver, secrets, shared resources, VPN, dial-up, dialup, user, logon, login, network, security, audit, 2003, 2000, lost, Passport, administrator, password, recover, access rights, credentials
SecureXP allows you to customize your access control settings for your Windows software. Lots of people using your computer? Don't want them changing your settings? SecureXP is the program for you. And it's free! SecureXP also comes with an Internet Explorer customizer, and a Windows Cleaner, which will erase sensitive history data that you may not want others to see. Try SecureXP today.
See also: access control tweak internet explorer windows xp customize custom optimize speed
Accurate Shutdown 6.30
Accurate Shutdown is a powerfully automatic software that turns off your computer and at the user-specified time. It can turn off / reboot / logoff the computer, turn off the monitor only, disconnect from the Internet, and execute one or a group of programs. It can synchronize your PC's time to atomic clock servers in world. It has many timer options to meet the needs and requirements of all kinds of users on different occasions.
See also: auto shutdown software automatic shutdown software computer shutdown timer shutdown utility sleep timer software computer access program
Remote Control PRO 2.7
Allows the Network Administrator to view and control remote network computers without having to leave their own workplace. The Administrator connects to the remote computer over the network and, having the remote computer's desktop on the screen of their own PC, launches programs, changes computer settings, etc. by using their own keyboard and mouse.
See also: Remote PC, remote control, remote access, remote control software, remote administrator, remote desktop, remote shutdown, remote admin, terminal server
File and Folder Privacy 2.5
Password-protect and hide your files and folders with a click of mouse. The program will always prompt to enter your access password when protection is enabled and a user is trying to access a protected file or folder. The protected file or folder will become accessible only is a valid password is entered. Windows Explorer integration is supported and upon installation the program creates convenient items in the context menu of Windows Explorer.
See also: access, accessible, explorer, menu, protected, user, file, folder, password