|
||||||
|
||
|
Home > Damaged access software |
Related keywords: access, Access, access control, ms access, remote access, microsoft access, MS Access, Microsoft Access, restrict access, damaged |
|
|
101. | Access Administrator Pro 4.14 (softheap.com) | ||
Access Administrator Pro is intended for controlling access to files and folders situated on local media of Windows 95/98/ME/NT/2000/XP at Windows kernel level. It enables you to deny access to certain files and folders, or to hide them securely from viewing and searching. An easy-to-use | |||
Updated: 2, 2006 | Rating: 16 | Author: Ixis Ltd | Size: 678 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
102. | 4UOnly 1.2.7 (dillobits.com) | ||
password and then forces you to enter it each time you want to access your password list? 4UOnly is a password manager for Microsoft Windows 98, Me, NT, 2000 and XP with a unique feature that saves you time while promoting good security: No longer are you required to enter your master decryption password each time you need to access your password list. A built-in password | |||
Updated: 2, 2006 | Rating: 0 | Author: Dillobits Software Dillobits | Size: 640 kb | Freeware Go to category: Security & Privacy > Password Managers Similar programs | |||
103. | 4UOnly 1.2.7 (dillobits.com) | ||
password and then forces you to enter it each time you want to access your password list? 4UOnly is a password manager for Microsoft Windows 98, Me, NT, 2000 and XP with a unique feature that saves you time while promoting good security: No longer are you required to enter your master decryption password each time you need to access your password list. A built-in password | |||
Updated: 2, 2006 | Rating: 0 | Author: Dillobits Software Dillobits | Size: 640 kb | Freeware Go to category: Security & Privacy > Password Managers Similar programs | |||
104. | 1st Evidence Remover 2.14 (getfreefile.com) | ||
work with different software, use the Internet and online banking to access your accounts, information about all your steps is stored in various files and in the registry. This fact often results in security threat you may face because all pictures you have seen, all passwords and bank accounts you use | |||
Updated: 2, 2006 | Rating: 190 | Author: Ixis Ltd | Size: 1177 kb | Shareware Go to category: Security & Privacy > Anti-Spam & Anti-Spy Tools Similar programs | |||
105. | 1st Evidence Remover 2.14 (softheap.com) | ||
work with different software, use the Internet and online banking to access your accounts, information about all your steps is stored in various files and in the registry. This fact often results in security threat you may face because all pictures you have seen, all passwords and bank accounts you use | |||
Updated: 2, 2006 | Rating: 48 | Author: Ixis Ltd | Size: 1177 kb | Shareware Go to category: Security & Privacy > Anti-Spam & Anti-Spy Tools Similar programs | |||
106. | 1st Desktop Guard 1.63 (emailarms.com) | ||
from changing desktop wallpaper and screen saver, secure your public access computers, save, restore, manage and lock desktop layouts. With personal computers becoming part of our lives and everyone in the household using them, it's hard to keep track of the icons that are located on the desktop. Many | |||
Updated: 2, 2006 | Rating: 903 | Author: emailarms emailarms | Size: 841 kb | Shareware Go to category: Security & Privacy > Access Control Similar programs | |||
107. | Flash ScreenSaver Master 3.20 (flash-screen.com) | ||
Flash ScreenSaver Master is an easy-to-use but powerful screensaver maker, which enables you to make your own screensavers from your favorite images(JPG,BMP and GIF files) or Macromedia Flash files, and you can add MP3 or MIDI sound files as background sounds. You can also use mask and frame on the screen | |||
Updated: 2, 2006 | Rating: 0 | Author: Kastora Low | Size: 4299 kb | Shareware Go to category: Graphic Apps > Editors Similar programs | |||
108. | Project Clock Pro 8.00 (cyber-matrix.com) | ||
punching in and out for each project. Project Clock Pro can be accessed by multiple people over a network and has a custom reporting feature and a timesheet entry form. External applications can be monitored and punched in on program start and out on program close. Reports summarize all billed project time in the given time period. Clients can be billed using the simple invoicing | |||
Updated: 2, 2006 | Rating: 0 | Author: Cyber Matrix | Size: 5396 kb | Commercial Go to category: Business > Project Management Similar programs | |||
109. | CyberMatrix Pro Schedule 5.03 (cyber-matrix.com) | ||
appointment scheduling system. Appointment schedules can be accessed throughout your network. Pro Schedule is ideal for doctors, dentists, nurses, lawyers, veterinarians, driving instructors or any other professionals who are often scheduling appointments. Pro Schedule can be used in clinics, hospitals, beauty salons, office buildings, driving schools or anywhere else requiring | |||
Updated: 2, 2006 | Rating: 0 | Author: Cyber Matrix | Size: 2953 kb | Commercial Go to category: Business > PIMS & Calendars Similar programs | |||
110. | ZOC 5.06 (emtec.com) | ||
emulations make it the preferred tool for people who have to access Unix shell accounts from a Windows platform. Linux admins will feel like sitting on their native console with ZOC's support for colors, meta-keys and local printing. Besides that, it features widely used terminal emulations like vt102, vt220 and several types of ansi and not so widley used ones like | |||
Updated: 2, 2006 | Rating: 132 | Author: Markus Schmidt | Size: 2668 kb | Shareware Go to category: Network & Internet > Terminal & Telnet Clients Similar programs | |||
|
Home > Damaged access software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|