|
||||||
|
||
|
Home > Network security software |
Related keywords: security, network, Security, Network, network monitor, computer security, internet security, security software, network monitoring, network management |
|
|
321. | LASsie (Light Application Security) for MS Access 4.3 (peterssoftware.com) | ||
(Light Application Security) is a Microsoft Access Add-In that enhances your Access application with a simplified user security system. Intended as an alternative to Access’ built-in security, LASsie offers a less complicated way to secure forms, reports, controls and certain records from unauthorized user access. With LASsie, you can prevent a user from opening | |||
Updated: 9, 2005 | Rating: 0 | Author: Peter De Baets | Size: 770 kb | Shareware Go to category: Development > Other Similar programs | |||
322. | cryptlib 3.0 (download.componentspot.com) | ||
by Peter Gutmann is a security toolkit that allows even less experienced programmers to add strong encryption and authentication services to their programs, security features that are becoming more and more indispensable. The library attempts to hide the low-level details of encryption/decryption and authentication from programmers, allowing them to quickly make their | |||
Updated: 9, 2005 | Rating: 0 | Author: ComponentSpot | Size: 1347 kb | Freeware Go to category: Development > Active X Similar programs | |||
323. | Access Developer Application Architect 1.04 (fcs-software.com) | ||
You can run Code, Forms, Reports or Queries. Our Menu has built in Security features using the Access Security module or you can ignore these features. Program and Data are split. Menu program handles the location of the backend data file. This can be local or networked location. Views | |||
Updated: 9, 2005 | Rating: 814 | Author: Howard Powell | Size: 4668 kb | Shareware Go to category: Business > Databases & Tools Similar programs | |||
324. | sqlDESKTOP 1.13 (sqldesktop.com) | ||
Excel files etc..) in a database and lets you : - Add reminder's, To Do's with start / end date -Categorize and locate information quickly by using keywords. -Annotate any cataloged item to add additional information. -Search by multiple criteria to locate cataloged items. -Make off line (removable) media as an integral part of cataloged items. If you access a document | |||
Updated: 9, 2005 | Rating: 0 | Author: Rene LEVANTINH | Size: 19401 kb | Freeware Go to category: Business > Databases & Tools Similar programs | |||
325. | Time Clock Manager Pro 2.1 (vsisystems.com) | ||
show clocked in and clock out times. The application has integrated security and can work with networks or on stand alone computers. Its a very user friendly system, with this systems there is no more wasting paper with old fashion punch clock. There is also custom programming and customizing | |||
Updated: 9, 2005 | Rating: 42 | Author: Vic Szamody | Size: 9585 kb | Shareware Go to category: Desktop > Clocks & Alarms Similar programs | |||
326. | TradingSolutions 3.1 (tradingsolutions.com) | ||
of financial indicators in conjunction with advanced neural networks and genetic algorithms to create remarkable effective end-of-day or real-time trading models for the stock, futures and forex markets. TradingSolutions' user-friendly interface allows you to perform complex financial forecasting without leaving you lost in the technology. Simple wizards guide you step-by-step | |||
Updated: 9, 2005 | Rating: 0 | Author: NeuroDimension Incorporated | Size: 58568 kb | Demo Go to category: Business > Accounting & Finance Similar programs | |||
327. | Trusted Messenger 2.7 (notepage.net) | ||
use. Trusted Messenger is a peer to peer application, that allows network users to communicate in a fast effective manner, without the the delays associated with email. Companies that utilize Trusted Messenger, instant messaging software, have a competitive edge in todays fast paced business world. By increasing corporate communications, businesses are able to anticipate market | |||
Updated: 9, 2005 | Rating: 0 | Author: NotePage, Inc. NotePage, Inc. | Size: 1068 kb | Shareware Go to category: Communications > Chat & Instant Messaging Similar programs | |||
328. | OroTimesheet 4.01 (aidsoft.com) | ||
to create dynamics and more complexes reports. Finally, a complete security by user is included. Easy to use with a very user-friendly interface, OroTimesheet is the best software to manage time by project! OroTimesheet allows you to keep track of the time spent on each project by your employees in your | |||
Updated: 9, 2005 | Rating: 0 | Author: Sales department | Size: 12599 kb | Shareware Go to category: Business > Databases & Tools Similar programs | |||
329. | PassMonster 2.25 (kamatoz.com) | ||
our access to private information. Passwords are given to us by network services, paging and cellular companies, software products, e-commerce services, banks, shops and many other institutions. Good password should comply to these simple rules: use as many different symbols as possible; be rather long (8 to 16 characters preferably); be unreadable (or hard to remember) for human | |||
Updated: 9, 2005 | Rating: 0 | Author: Greg Arkadiev | Size: 678 kb | Shareware Go to category: Security & Privacy > Password Managers Similar programs | |||
330. | PC Activity Monitor (PC Acme) 6.4 (softsecurity.com) | ||
undetectable easy-to-use monitoring and surveillance tool for both networked and personal PCs. It is professional software that captures all users activity on the PC. All data collected by the monitoring are saved to encrypted log file. It is a powerful management tool for users and companies, which want to increase their productivity and profitability. This is the most remarkable | |||
Updated: 9, 2005 | Rating: 0 | Author: Raytown Corporation LLC | Size: 976 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
|
Home > Network security software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|