Advanced Security for Outlook 1.3
Use Advanced Security for Outlook to learn what programs are trying to access Microsoft Outlook and permanently allow or deny access to the program the next time it requests access, the action you choose for this program will be automatically executed and Outlook Security will not annoy you with messages about trying to access e-mail addresses you have stored in Outlook. Works with Microsoft Outlook 2000, 2002/XP and 2003. Freeware.
See also: alert investigation, outlook object model security guard, program is trying to access, microsoft outlook, security alert, outlook security patch
FingerCell PC EDK for Windows 1.2
FingerCell 1.2 Embedded Development Kit for PC with MS Windows. This EDK is intended for developers, who are going to use PC with MS Windows as part of their network biometric system. Includes 1 license for FingerCell DLL, interfaces for image input from either files or fingerprint sensors, sample application with source code and software documentation.
See also: fingerprint, pattern recognition, recognition, identification, matching, verification, embedded, win32, demo, evaluation, biometric, security, scan, crime, ridge, authentication, access control, criminalistics, fingerprint recognition, fingerprint identification
BPACLer eliminates the tedious process of selecting a file or folder object and having to browse through each individual access control entry (ACE) to see the effective permissions for different users and groups (trustees). BPACLer quickly displays all allow and deny access control entries (ACE) from the ACL for a selected file or folder. The selected file or folder owner information is also displayed on the same screen.
See also: administrator, system, entry, security, folder, file, permission, List, Control, Access, ACE, ACL
Easy Desktop Keeper 1.81
Easy Desktop Keeper lets you save, restore, manage and lock desktop layout that includes files and folders located on the desktop, placement of desktop icons, desired wallpaper and screen saver. If you choose to lock desktop layout, every time you reboot your PC, the program will restore desktop icons and bring them back to their original positions as well as return the old wallpaper and the screen saver to the background.
See also: download, free, screen, lock, restrict, icons, files, protect, control, access, save, restore, desktop
Easy File Protector 4.2
Easy File Protector is a very flexible password protected security utility that restricts access to your files and folders by user-defined time schedule. You choose users, define restricted files/folders and time periods for them, and activate the program. After that, your system disables/enables your files automatically depending on current time and user. Protection is achieved by making files and folders undeletable, unrenamable, unreadable, un
See also: lock, screen, free, download, computer, restricting, restrictions, restrict, privacy, protect, control, access, security, password
Hide & Protect any Drives 2.1
Hide or restrict access to any drives such as Hard drive, CD, DVD, floppy and flash, and deny access to partitions of your hard drives with "Hide & Protect Drives". Stop unauthorized software installations and data leak by removable media.
See also: free, download, computer, restricting, restrictions, restrict, privacy, protect, control, access, security, password, Hard Drive, DVD, lock
Do you want to supervise users' every action on remote computers simultaneously? NetWatcher, a Real Nuke for you to supervise and control computers over Internet/network in a Windows. For more info, please visit http://www.netguarder.com/en/netwatcher.htm. You will see remote computer screens, URL access, and program run history of remote users in a Windows of your computer.
See also: log, url, report, email, device, forbid, terminal, instant, access, remote, control, supervision, supervise
Deskman Pro 5.5
Desktop security management for home users and system administrators alike. Home users need a simple way of protecting their computers on coffee breaks, or restraining access to their desktop on shared computer environments. System administrators require an effective tool to stop users from messing up the desktop, or apply tight security measures on a per-user or system-wide basis. Deskman is the tool of choice for its simplicity and effectivity.
See also: system protection, security manager, desktop manager, user control, security software, access control, desktop restrictions, desktop security, easy security, access point
Code 128 Barcode Font Pack 1.0
Our Code 128 Barcode Font Pack lets you create and print high quality Code 128 barcodes (including UCC/EAN-128 - one variant of Code 128) in any program. In addition to the TrueType bar code fonts, our Code 128 font pack also includes Microsoft Office templates, sample documents (in Word DOC, Excel and PDF formats) VBA source code, help documentation and Code 128 encoding software.
See also: code 128 visual basic, code 128 barcode printing, print code 128 barcodes, code 128 barcode fonts, code 39 barcode font, code 128 fonts, code 128 font, code128 barcodes, code128 bar code, code128 barcode, code 128 barcodes, code 128 bar code, code 128 barcode, code128, code 128, code 128 vb, code 128 barcode vb, code 128 barcode visual basic, code 128 access, code 128 excel, code 128 word, code 128 vc, code 128 office
Mobile Database Viewer(Access,xls,Oracle)for S60 1.5
View Access,FoxPro,dBase,Excel.Oracle and any ODBC enable Database on S60 mobile phone like Nokia 7650,3650 .View database tables: all at a time or record at a time.
Apply SQL Select queries on database to purify records by adding filter.
View database tables: all at a time or record at a time.
Easy browsing: By considering the Mobile structure,All operations can also be performed via numpad keys on Mobile.
Support for search.
See also: mobile phone, Database, Series 60, UIQ. Nokia, mdb, xls, dBase, MySQL, Foxpro, Oracle, Excel, Access
Access Data Transfer Assistant 2000 3.3
Deliver updated versions of your app to customers. Easily copy data between two copies of a database, replacing all the data (from specified tables) in one (Destination) from the other (Source). The ADTA automatically determines the correct delete and import orders based on the relationships in the Destination database and documents record counts for each table before and after the process as well as table relationships and fields.
See also: relationships, queries, append, update, dump data, import data, Access developer tool, deliver updated application
FlyTreeXPro ActiveX - Fast, powerful and flexible multicolumnar Tree/Grid/List/Outline. Get more than 30 controls in one! More than 40 types of inplace editors, data-bounding, a lot of properties and events for every need!
See also: .Net, Access, ListView, data-aware, Database, TreeView, Outline, List, Grid, Tree, Control, ActiveX
BioCert Authenticator Lite Edition 10 Users 1.2
BioCert Authenticator Lite Edition 10 Users Our standard software programming toolkit offers 1:m matching capability up to 10 users. This toolkit is primarily focused upon students and learning programmers that wish to explore the feasibility of inclusion of Biometric Authentication within their projects. The Lite is a full-featured toolkit with all of the functionality of the Pro edition, with a limitation of 10 fingerprints
See also: attendance, access control, authentication, identification, security, password, fingerprint, toolkit, biometric, recognition, matching
DialServer adds a unique set of extra services to Windows XP for the dialup user. For dialup internet connections it provides a means to lock the connection, accumulate usage statistics and ways to remotely access your system. Incoming calls are processed/routed with caller information displayed, logged and spoken on the local and remote Windows 98,ME,2000,XP systems. It also includes an in-built scheduler to tie things together.
See also: scheduler, lock internet, caller logging, logging, statistics, access, DialServer, caller, lock, internet, triggers, tray
PlanetRemote Plus 2.01
PlanetRemote allows you to take control of your PC and access your files remotely as if you were actually sitting right in front of it! You can control your PC using a web browser from anywhere on the Internet, even with a dynamic IP address.
Security is provided by assigning a special access password to your computer, which is needed each time you want to control your computer or access your files remotely.
See also: Remote Computing, Desktop Sharing, Remote Desktop, Remote Management, Remote Administration, Remote Access, Remote Control, VNC, Virtual Network Computing
Access Password Recovery 1.7f
Access Password allows you to recover passwords which MS Access databases (.mdb, .mde, .mdw) are protected with (including Multilingual and Unicode ones). Recovers users and admin passwords from workgroup information file (.mdw)("System database"). Recovers Non-standard database user-level security owners names and IDs when workgroup database (security, sytem, .mdw) is lost or corrupted!
See also: break, fast, guaranteed, user id, ids, workgroup, recover, password, mde, mdw, mdb, database, access, protected
Advanced Windows Password Recovery 3.5
A program to recover all types of Windows passwords: logon password (when user is logged on and has Admin privileges), NET Passport password, RAS and dial-up passwords, passwords to shared resources etc. The program also shows all users and groups (with their properties), allows to run any programs in other user's context, reveal passwords hidden under the asterisks, run brute-force and dictionary attacks on Windows 9x PWL files and much more.
See also: screensaver, secrets, shared resources, VPN, dial-up, dialup, user, logon, login, network, security, audit, 2003, 2000, lost, Passport, administrator, password, recover, access rights, credentials
VBA Password Recovery 1.0
VBA Password Recovery recovers passwords for Visual Basic for Applications (VBA) projects source code. VBA components are used by programs such as MS Excel, Word, and Access. MS Office 95/97, 2000-2002, and XP files are supported in this version. All passwords are decoded instantly.
See also: visual basic for applications, microsoft, access, database, remove, unprotect, file, document, word, excel, recover, decrypt, decode, password, vba
DeKlarit is the model driven tool that combines: agile database modeling, declarative business rules, code generation, and seamless integration into Visual Studio 2005.
You can describe your business model in a simple, intuitive manner and convert it into a live, robust enterprise-level business framework, automatically.
Generated languages: Visual C# and Visual Basic 2005
DBMS: DB2, Oracle, MySQL, SQL Server, SQL Server Mobile and more!
See also: visual studio .net tools, RAD tools .NET, ASP.NET generator, enterprise library, visual studio 2005, visual studio .net, code generation tool, data modeling tool, .NET code generator, o/r mapping .NET, data access layer .NET, programming ado.net, ADO, code generator, model driven tool
Folder Security Personal 4.0.289
Folder Security Personal allows you to hide and lock folders and files. You can choose to hide them completely or restrict access by making them read-only, preventing modification or deletion by other users or programs. It can restrict access to Floppy, CDRom, USB sticks, and other removable drives by locking them or making them read-only.Version 4.0 comes with proactive spyware defender, and is able to block installation of spyware and adware.
See also: read-only, Hijack, password, control, lock, folder, file, protect, hide, drive, access