|
||||||
|
||
|
Home > Database encryption software software |
Related keywords: software, database, Software, encryption, Database, RAD Software, free software, spy software, file encryption, backup software |
|
|
151. | 3D Stacked Vertical Bar Graph Software 4.6 (jpowered.com) | ||
the variety of implementations possible. New in this Release Database Access Methods Dynamic Interaction JavaScript Execution Enhanced Bar Shading Pop-Up Values URL Linking Auto Scaling Template Scripts and Implementations Multi-Language Support 3D Stacked Vertical Bar Graph provides both a client and server side solution for the incorporation of bar graphs into | |||
Updated: 9, 2005 | Rating: 39 | Author: Patrick OBrien | Size: 277 kb | Shareware Go to category: System Utilities > Text/Document Editors Similar programs | |||
152. | MyListMate 2.50.2 (castlesoft.co.nz) | ||
for your grocery shopping. MyListMate allows you to maintain a database of products that you buy, along with the price and unit for each product, and where you buy them from. You are able to prepare and save multiple shopping lists and then print any of them out to take with you to the store. MyListMate helps you maintain estimated prices for all of the products in your | |||
Updated: 9, 2005 | Rating: 0 | Author: Castle Software | Size: 2049 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
153. | PC Activity Monitor Pro (PC Acme Pro) 6.4.1 (softsecurity.com) | ||
tool for both networked and personal PCs. It is professional software that captures all users activity on the PC. All data collected by the monitoring are saved to encrypted log file. The log file can be optionally sent via e-mail to a specified address (or saved to a specified shared resource in LAN environment) for further inspection and analysis. The important advantage of PC | |||
Updated: 3, 2006 | Rating: 0 | Author: Raytown Corporation | Size: 1192 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
154. | Engineers Edition 5.2 (solarwinds.net) | ||
network? The NETWORK SONAR application can construct a MS-Access database in a matter of minutes. You can also use IP NETWORK BROWSER to quickly discover device details (IOS, cards, memory, load, etc) across a range of subnets. This tool will even tell you what software is installed and/or currently running on the discovered device. With the NETWORK PERFORMANCE MONITOR you | |||
Updated: 9, 2005 | Rating: 16 | Author: Doug Rogers | Size: 75498 kb | Shareware Go to category: Network & Internet > Other Similar programs | |||
155. | SmartSerialMail 3.3.1 (jam-software.com) | ||
Files. SmartSerialMail could directly connect to almost all kinds of databases. SmartSerialMail supports plain text and html mails. All mails and recipient groups can be saved in the SmartSerialMail database, which allows easy and effective work with a large numbers of recipients. The new user | |||
Updated: 2, 2006 | Rating: 0 | Author: Christian Winter | Size: 3219 kb | Shareware Go to category: Network & Internet > Other Similar programs | |||
156. | PC Activity Monitor Pro (PC Acme Pro) 6.4.1 (keyloggers.com) | ||
tool for both networked and personal PCs. It is professional software that captures all users activity on the PC. All data collected by the monitoring are saved to encrypted log file. The log file can be optionally sent via e-mail to a specified address (or saved to a specified shared resource in LAN environment) for further inspection and analysis. The important advantage of PC | |||
Updated: 3, 2006 | Rating: 0 | Author: Raytown Corporation | Size: 1192 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
157. | PC Activity Monitor Pro (PC Acme Pro) 6.4.1 (softsecurity.com) | ||
tool for both networked and personal PCs. It is professional software that captures all users activity on the PC. All data collected by the monitoring are saved to encrypted log file. The log file can be optionally sent via e-mail to a specified address (or saved to a specified shared resource in LAN environment) for further inspection and analysis. The important advantage of PC | |||
Updated: 3, 2006 | Rating: 0 | Author: Raytown Corporation | Size: 1192 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
158. | 007 Spy Software 3.86 (e-spy-software.com) | ||
Spy Software is a stealthy monitoring spyware which allows you to secretly track all activities of computer users and automatically deliver logs to you via Email or FTP, including all areas of the system such as email sent, Web sites visited, files operations, every keystroke, username and password, online conversation (ICQ, MSN, AIM), and take screen snapshots at set intervals just | |||
Updated: 3, 2006 | Rating: 1113 | Author: Jason H | Size: 1200 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
159. | StrongDisk Pro 3.0 (PhysTechSoft.com) | ||
a password and an external key is required. Any files, documents and databases can be kept on and opened directly from encrypted disks. The content of disk is physically stored in a common file. Thus backup can be made easily. You may store this file on hard disk, floppy, CD or any other location | |||
Updated: 9, 2005 | Rating: 0 | Size: 1914 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
160. | Captain Mnemo Pro 1.41 (refog.com) | ||
being supported by latest technology advancements such as rock-solid encryption. However, as a drawback we get the situation when an average computer user has dozens or even hundreds of complex passwords to remember. Being truly an insurmountable task this results in passwords being written down or | |||
Updated: 9, 2005 | Rating: 0 | Author: ReFog Software | Size: 898 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
|
Home > Database encryption software software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|