|
||||||
|
||
|
Home > Locking access software |
Related keywords: access, Access, access control, ms access, remote access, microsoft access, MS Access, locking, Microsoft Access, restrict access |
|
|
211. | Sexy Party 6.0.0 (adultsexygames.com) | ||
activity maintenance screen. The game includes a child lock that prevents any minors in the household from accidentally accessing the game (with child lock enabled the game's purpose is entirely unknown!). The game can be saved and resumed at a later date. Player preferences can be saved and re-loaded. There are many other design features. However | |||
Updated: 9, 2005 | Rating: 142 | Author: Richard Fairbairn | Size: 3144 kb | Demo Go to category: Games & Entertainment > Puzzle & Word Games Similar programs | |||
212. | Hairy Harry 1.0 (alawar.com) | ||
door. To open this door Harry must collect the keys to all its locks. The number of keys left you can see in the information panel at the bottom of the screen. In addition to the steel doors there are also secret stairs that also open Harry the way to freedom as soon as he collects all keys. The | |||
Updated: 9, 2005 | Rating: 0 | Author: Alawar Entertainment | Size: 6836 kb | Shareware Go to category: Games & Entertainment > Arcade Similar programs | |||
213. | PC Guard for Win32 5.00 (sofpro.com) | ||
and analyzing. - Application password protection! Protect access to your application (EXE/DLL) with password. - Hardware locking! Lock your software to target computer. - Evaluation (trial) version feature! Easily create demo version of your software with execution and date limitations. - Secure distribution! Securely distribute your software over the | |||
Updated: 9, 2005 | Rating: 48 | Author: Blagoje Ceklic | Size: 841 kb | Commercial Go to category: Development > Management & Distribution Similar programs | |||
214. | gReg 4.55 (gitanosoftware.com) | ||
out-strips the competition with state-of-the-art encryption that locks out thieves permanently. Smoke your competitors with gReg's advanced customer tracking and technical support history. You and your customer support staff can satisfy every customer quickly and efficiently with our system .Cut your advertising time and costs in half! Use gReg to distribute an evaluation version of | |||
Updated: 9, 2005 | Rating: 0 | Author: Jesus Moreno | Size: 5840 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
215. | KeyedAccess for MS Access 2.0 (peterssoftware.com) | ||
is a module for Microsoft Access that allows you to generate and validate 16 digit Reg ID/Product Keys, or to generate an installation-specific Serial Number on the end-user's computer which can be unlocked with a corresponding Unlock Code. Using KeyedAccess means you can create shareware-type versions of your MS Access application where some functionality is | |||
Updated: 9, 2005 | Rating: 0 | Author: Peter De Baets | Size: 774 kb | Demo Go to category: Development > Other Similar programs | |||
216. | AidAim CryptoPressStream 1.00 (aidaim.com) | ||
compression and encryption library. It provides transparent access to compressed or encrypted data stored in the stream object. All stream objects are 100% compatible with TStream and have some advanced functionality like progress event, LoadFromStream, LoadFromFile, SaveToStream, SaveToFile methods, Lock and Unlock methods for multi-thread usage. CryptoPressStream | |||
Updated: 9, 2005 | Rating: 0 | Author: AidAim Software | Size: 1062 kb | Commercial Go to category: Development > Delphi Similar programs | |||
217. | Amirus Mirror Memory 1.4.40 (CitrusControls.com) | ||
design is peer-to-peer with no single point of failure. A global lock facility allows cooperating programs to coordinate access to shared memory, making AmirusMM an ideal platform for the rapid development of distributed applications. Locks can be requested at either Shared or | |||
Updated: 9, 2005 | Rating: 24 | Author: Tony Cox | Size: 9454 kb | Shareware Go to category: Development > Other Similar programs | |||
218. | Codelock 2.0 (codelock.co.nz) | ||
protect your scripts with an unlock key for added security, you can lock your scripts to specific domain names or IP addresses AND you can specify an expiry time if you want to. An added feature is that you can choose to encrypt all of your browser HTML output (generated by your PHP scripts). This | |||
Updated: 9, 2005 | Rating: 101 | Author: Vince Edwards | Size: 279 kb | Demo Go to category: Development > Other Similar programs | |||
219. | Time & Chaos 5.6.5 (ChaosSoftware.com) | ||
use the same databases at the same time to collaborate without being locked out or requiring expensive server software. Appointments on your calendar and to do items on your task list can be linked back to the matching contact in your telephone book to help you keep a complete contact history of every | |||
Updated: 9, 2005 | Rating: 0 | Author: Bill Tiede | Size: 3756 kb | Shareware Go to category: Home & Hobby > Personal Finance Similar programs | |||
220. | Recall 4.0 (acastat.com) | ||
notes, contact and account information. Organize information on accessing web sites, keep project notes, store reminders, and keep a personal log of special events. Create multiple files for family members or establish a file for each type of application, such as home, work, hobbies, and school. Recall can also be used to keep a personal log of daily or weekly activities. Record | |||
Updated: 9, 2005 | Rating: 42 | Author: Phil Crewson | Size: 2639 kb | Shareware Go to category: Business > Other Similar programs | |||
|
Home > Locking access software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|