|
||||||
|
||
|
Home > Database control software |
Related keywords: database, control, Database, access control, parental control, Control, remote control, version control, activex control, ftp control |
|
|
271. | Word OCX 2.0 (ic.net) | ||
OCX is a powerful ActiveX Control with over one hundred useful functions to send data from Visual Basic to a Word document, spell check Visual Basic objects and database tables, create labels in Word, create HTML documents and much more using COM technology! Included in the download is a sample Visual Basic project which demonstrates the power of Word OCX. Download it now | |||
Updated: 9, 2005 | Rating: 0 | Author: Frank Kusluski | Size: 558 kb | Shareware Go to category: Development > Active X Similar programs | |||
272. | CaterpillarSSA 3.30 (gistatgroup.com) | ||
It combines advantages of other methods with simplicity of visual control aids. The basic Caterpillar-SSA algorithm for analyzing one-dimensional time series consists of transformation of the one-dimensional time series to the trajectory matrix by means of a delay procedure (this gives the name to the whole technique); Singular Value Decomposition of the trajectory matrix; | |||
Updated: 9, 2005 | Rating: 42 | Author: Nina Golyandina | Size: 840 kb | Shareware Go to category: Education > Mathematics Similar programs | |||
273. | Moe (Mouse Over Effects) for MS Access 97.2.3 (peterssoftware.com) | ||
procedure actually UPDATES* your application forms with a rectangle control (for control highlighting purposes), and with MouseOver event procedures for each control and form section. The process takes just a few seconds to complete, so you'll be impressing your clients and coworkers in | |||
Updated: 9, 2005 | Rating: 0 | Author: Peter De Baets | Size: 774 kb | Shareware Go to category: Business > Office Suites & Tools Similar programs | |||
274. | Image Vault 1.01 (cyber-matrix.com) | ||
web developers, image collectors or anyone else who must manage and control access to large image collections. With Image Vault you can: Manage large image collections by storing the images in one or more databases. Micro manage the databases by assigning categories to images. View images by folder, database or category. Secure your image collection by | |||
Updated: 9, 2005 | Rating: 0 | Author: Cyber Matrix | Size: 849 kb | Demo Go to category: Graphic Apps > Viewers Similar programs | |||
275. | Visual Hindsight Home Edition 2.2 (visualhindsight.com) | ||
users, user access rights and administrator functions, and encrypted databases. Also included is the Automatic Retention Monitorâ„¢ to control the amount of disk space allocated for recording purposes through user-defined values for maximum file age and total file size. Visual Hindsight is ideal for monitoring convenience stores, gas stations, day care centers, retirement | |||
Updated: 9, 2005 | Rating: 0 | Author: RFC Services | Size: 6388 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
276. | Webroot Spam Shredder 1.9 (webroot.com) | ||
can be deleted or safely held for later review. The spam threat database is regularly updated to protect you from the latest spam tactics as they emerge. You can specify your desired level of protection from spam and the size and type of messages to scan with Webroot Spam Shredder's easy-to-use controls. Webroot Spam Shredder is backed by Webroot's expert | |||
Updated: 9, 2005 | Rating: 0 | Author: Webroot Software | Size: 5335 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
277. | StartEd 4.1.0.15 (pad.outertech.com) | ||
folders and Win.ini at Windows Startup. If you need total and direct control over the programs loaded during the booting processes, then StartEd is the answer. It lets you modify and backup the Startup configuration, detects more than 100 Trojan Horses and comes also handy for every system | |||
Updated: 9, 2005 | Rating: 0 | Author: Thomas Reimann | Size: 1103 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
278. | Vidamic Netlog 01-01-15 (adminpower.com) | ||
size, operating systems. All information is collected in a Access database for easy integration with pre-existing software. Monitors your networked computers and reports hardware & software changes. The software is a valuable tool for ensuring that you have total control of where computers are located, their levels of performance and the hard/software | |||
Updated: 9, 2005 | Rating: 48 | Size: 6343 kb | Demo Go to category: System Utilities > Other Similar programs | |||
279. | RemoteKeys 8.7.2 (freewarehits.de) | ||
can automate complex control systems, but also simple jobs like inserting text passages into Word and EMails, filling out (internet-) forms with recurring phrases etc. To do this simply click onto one of the 2500 buttons, which can be freely assigned and labeled. The macros can also be released by using the keyboard if prefered. For those wishing to make full use of RemoteKeys | |||
Updated: 9, 2005 | Rating: 0 | Author: Detlev Schaefer | Size: 1582 kb | Freeware Go to category: System Utilities > Automation Tools Similar programs | |||
280. | #Remove Access Security 3.0 (e-tech.ca) | ||
Security 3.0' is the ultimate tool concerning security for Access databases. 'Remove Access Security' can reveal passwords, reset passwords and remove user-level security for secured and non-secured database (.MDB) files. This software is simple to use, and can be a real life-saver in a variety of situations, including corrupted passwords, corrupted workgroup files, forgotten | |||
Updated: 9, 2005 | Rating: 1996 | Author: Neil Britto | Size: 350 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
|
Home > Database control software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|