|
||||||
|
||
|
Home > Locking access software |
Related keywords: access, Access, access control, ms access, remote access, microsoft access, MS Access, locking, Microsoft Access, restrict access |
|
|
241. | Sunglass++ 1.0 (sunglass.myrice.com) | ||
Sunglass++ is a hip software tool that helps you to make your translucent e-Card (SunCard)! SunCard is a new kind of e-Card, which has a translucent interface, you can choose 9 very cool effects when you make the SunCard, you can then input anything you want, of course. The size of SunCard is very very | |||
Updated: 3, 2005 | Rating: 0 | Author: Christ Lee | Size: 631 kb | Shareware Go to category: Network & Internet > Other Similar programs | |||
242. | Anti Piracy Tools 2004 Professional 2.1 (logicsoftware.net) | ||
unprecedented level of protection for applications that require access to Internet. The system consists of client and server parts. The server part is installed on Microsoft IIS server. It handles the users' database, providing live licensing data to the client part. The client part (available as a DLL to be distributed with you product) acts real smart: once the application loads | |||
Updated: 3, 2005 | Rating: 29 | Author: Logic Software | Size: 845 kb | Shareware Go to category: Development > Other Similar programs | |||
243. | SAV-MailChecker Pro 1.1 (sav-soft.com) | ||
following ways: -Show a message -Play a sound -Blink with Scroll Lock led on your keyboard -Run a program -Show the number of messages on TaskTray and change it’s icon If you receive large amounts of e-mail messages and you need to keep track on new messages on a regular basis without launching | |||
Updated: 3, 2005 | Rating: 0 | Author: Aleksey Shevchenko | Size: 321 kb | Shareware Go to category: Communications > E-Mail Clients Similar programs | |||
244. | Computers Hall 2.11 (ruslan.odessa.ua) | ||
window which to remove it is impossible or the keyboard, a mouse is locked; · The program remembers and uses the price for 1 hour of games and 1 hour of the Internet; · Roundoff of the sum of payment; · Return of the rest of money; · From one sight it is visible, what computer is free, what occupied, how many minutes are necessary to work, how many has fulfilled and when will be | |||
Updated: 3, 2005 | Rating: 16 | Author: Ruslan Scherbatuk | Size: 1798 kb | Demo Go to category: Business > Other Similar programs | |||
245. | Security Forms 1.0 (securitylanding.com) | ||
Group payroll, Immediate action required, Job description, Key log, Locker agreement, Loss prevention committee, Loss prevention employee of the month, Loss prevention safety committee, Loss prevention safety committee minutes, Loss prevention safety training notice, Loss prevention training notice, Medication log, Meeting notice, Memo, Osha form 101, Osha form 174, Osha form 200 | |||
Updated: 3, 2005 | Rating: 110 | Author: Paul Pleasant | Size: 173 kb | Freeware Go to category: Business > Other Similar programs | |||
246. | AppsProtector XP 2.1 (ax-soft.com) | ||
XP allows you to put a lock on a program file, such as a game, or your office software. The program icon is replaced with that of a padlock, and, when the program is run, it will first ask for the password. The password must then be typed in correctly before the program will run. Easy to use and quick to work, this program has limitless possibilities. Stop your kids from | |||
Updated: 8, 2004 | Rating: 243 | Author: Moser Damien | Size: 1601 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
247. | CDLock 1.4 (protect-me.com) | ||
support auto-eject feature can be used and by whom. You can control access to any removable disks, such as CD-ROMs, optical disks, or anything else depending on the time of day and day of week. CDLock even allows controlling access to the Audio CDs so you can build secure but user-friendly | |||
Updated: 8, 2004 | Rating: 16 | Author: Ashot Oganesyan | Size: 749 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
248. | HackerWacker Personal Edition 2.3.23.01 (hackerwacker.com) | ||
when viewed. Other features include stealth mode option, hot key access, Email logs, Monitoring and logging across your home network, LAN or the Internet in real-time with an optional add-on product HWIN, and much more. Logs may be sent to a decrypted comma delimited text file for importation into thousands of other applications for storage or further analysis from our exclusive | |||
Updated: 8, 2004 | Rating: 16 | Author: Thomas Streiff | Size: 5259 kb | Demo Go to category: Security & Privacy > Other Similar programs | |||
249. | Privacy Master 3.9 (webroot.com) | ||
many people have access to your computer? Do you know who they are? Hackers, visitors, co-workers, family members? The reality is most computers are accessible to multiple users making it difficult, if not impossible, to secure your personal and sensitive information. Privacy Master creates a safe haven within your computer where everything you choose is encrypted and hidden from | |||
Updated: 8, 2004 | Rating: 0 | Author: Steve Thomas | Size: 1457 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
|
Home > Locking access software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|