|
||||||
|
||
|
Home > Database control software |
Related keywords: database, control, Database, access control, parental control, Control, remote control, version control, activex control, ftp control |
|
|
281. | Sentry Pro Network Monitoring Solution 2.7 (sentry-pro.com) | ||
network monitoring software. It offers IT administrators full control over the IT infrastructure by monitoring all event sources and notifying the occurrence of all critical events for corrective measures to be taken, manually or automatically, thus avoiding any undesired consequences. Sentry Pro Version features customized monitoring objects for servers (MS Exchange, MS SQL | |||
Updated: 9, 2005 | Rating: 0 | Author: Ionel Orza | Size: 2960 kb | Shareware Go to category: Network & Internet > Other Similar programs | |||
282. | Password Keeper Expert 1.3 (softdemon.com) | ||
work with clipboard, gives an opportunity to create several password databases, an opportunity to create backup copies of password lists etc. Password Keeper Expert allows you to control your passwords, it has modern interface. Using Password Keeper Expert you will never lose a password you | |||
Updated: 9, 2005 | Rating: 0 | Author: Andrey Fomin | Size: 546 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
283. | Password Officer DeLuxe 5.0 (compelson.com) | ||
coupled with convenience: the strongest possible encryption, secure database of your most valued secrets, automatic logon to applications, servers, information systems, terminals and web pages, quick search, smart-card support. Now you can be more productive and secure. -universal Single Sign-on | |||
Updated: 9, 2005 | Rating: 0 | Author: COMPELSON Laboratories | Size: 934 kb | Commercial Go to category: System Utilities > Other Similar programs | |||
284. | PC Optimizer 1.00 (aidsoft.com) | ||
obsolete files from your system. Manage AutoRun Programs lets you control which program should be run at startup and logon. Memory Optimizer optimizes the Memory Management of Windows. Find Duplicate Files : Finds and Remove the Duplicate Files from your system. With Backup and Restore tools you | |||
Updated: 9, 2005 | Rating: 0 | Author: Shrishail Rana | Size: 178700 kb | Shareware Go to category: System Utilities > System Maintenance Similar programs | |||
285. | ArchiDoc (3035) (canteco.net) | ||
one easy screen. Sofisticated Security; Easy-to-install;Version Control;Team work;Office integration;Multy Language interface;Auditing and reporting. As well as (for Oracle product line) Instant back-up; Internet-type access Desktop XML version of the complete ORACLE based document management system, that gives any size enterprise the ability to quickly find, share and access all | |||
Updated: 9, 2005 | Rating: 42 | Author: Aleks Kamyshan | Size: 3991 kb | Shareware Go to category: Business > Office Suites & Tools Similar programs | |||
286. | Network Boot Tools 1.2 (emboot.com) | ||
BOOTP, and TFTP services, Boot Image Editor, Client boot parameter database editor (BOOTPTAB Editor), DOS-based pre-OS utilities, etc. - Compliance with industry standards including Wired for Management (WfM) 2.0, PXE, DHCP, BOOTP, TFTP and NCP/IPX - Fully compatible with client-based network boot firmware: 3Com, emBoot and other Managed PC Boot Agents, Intel Boot Agent, emBoot | |||
Updated: 9, 2005 | Rating: 0 | Author: Steve Marfisi | Size: 2006 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
287. | Email Audit 3.2 (km-vision.com) | ||
folders. The email audit utility comes with a host of built in spam control filters and flexible user defined filters. You can now create Whitelist of email IDs belonging to your friends, colleagues, relatives so that mails originating from your Whitelist contacts are secured. Features of Email | |||
Updated: 9, 2005 | Rating: 0 | Author: Shama Hegde | Size: 8172 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
288. | Anti-Trojan Shield 2.1.0.14 (atshield.com) | ||
blocker of Trojans, worms, viruses, backdoors, malicious ActiveX controls, and Java applets. It efficiently scans, detects, and removes malicious files, while maintaining an exceptional level of personal privacy and security. Without this tool, you definitely should worry about new Trojan horses and viruses, but with Anti-Trojan Shield you have no need for concern. Its integrated | |||
Updated: 9, 2005 | Rating: 280 | Author: ATShield Team | Size: 6366 kb | Shareware Go to category: Security & Privacy > Anti-Virus Tools Similar programs | |||
289. | Backup Watcher for Interbase 2.0.1 (dswsoft.com) | ||
Backup Watcher allows you to create Backup databases under the control of Interbase 6.x server. Having customized this program once, you can forget about a problem of the data backup. Interbase Backup makes databases' backups automatically. The program has a simple and convenient interface for customizing the backup structures. While using Backup Watcher for | |||
Updated: 9, 2005 | Rating: 0 | Author: Desktop Software | Size: 2111 kb | Shareware Go to category: System Utilities > Backup & Restore Similar programs | |||
290. | CCAutoSoft 3.04.11 (ccautosoft.com) | ||
a cyber cafe easier. CCAutoSoft has the capabality to monitor and control a LAN connected computer such as take a look at remote screen, take control of terminal volume control and terminating a running application. Managing a cyber cafe is never easier then before when CCAutoSoft also | |||
Updated: 9, 2005 | Rating: 152 | Author: Azal Azani | Size: 11390 kb | Freeware Go to category: Business > Other Similar programs | |||
|
Home > Database control software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|