|
||||||
|
||
|
Home > Damaged access software |
Related keywords: access, Access, access control, ms access, remote access, microsoft access, MS Access, Microsoft Access, restrict access, damaged |
|
|
491. | DataLock 1.0 (unicorntech.net) | ||
many passwords - easy 3 step process - Eliminates unauthorised access - Designed for all Windows based OS Easy file - folder Security with Datalock for any file/folder, any size, any format - High ratio Data Compression achieved - Secure communication of data over internet, Lan - No need to remember many | |||
Updated: 9, 2005 | Rating: 0 | Author: Parish Meghani | Size: 1213 kb | Demo Go to category: System Utilities > Other Similar programs | |||
492. | DB Maker 2.0 (internet-soft.com) | ||
DataBase Maker allows you to extract specific data from HTML and TXT documents and create text databases. The program lets you analyze and search a selected document for specified data, and convert the unstructured results into a text file for further processing in a spreadsheet application like Microsoft | |||
Updated: 9, 2005 | Rating: 42 | Author: DB Maker | Size: 537 kb | Shareware Go to category: Network & Internet > Search/Lookup Tools Similar programs | |||
493. | DCPP 2.7 (securstar.com) | ||
at the sector level, ensuring that only authorized users may access it. The encryption algorithm used by DCPP is a trusted, validated algorithm chosen by the National Institute of Standards and Technology (NIST) and slated to be the cryptographic standard for years to come. AES-256 is a FIPS-approved symmetric encryption algorithm that may be used by U.S. Government organizations | |||
Updated: 9, 2005 | Rating: 0 | Author: Wilfried Hafner | Size: 5411 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
494. | Desktop Scout 4.0 (globalpatrol.net) | ||
remotely. Beyond surveillance, Desktop Scout allows you to block access to any program, document or web site based on the current user. You can simply deny access altogether, impose a time restriction, or require a password to access anything in the secured list. The program | |||
Updated: 9, 2005 | Rating: 56 | Author: Global Patrol | Size: 1291 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
495. | Diskeeper Server Standard Edition 8.0 (execsoft.com) | ||
is, it only takes a few hours for disk fragmentation to increase access times and drag down performance and reliability. If you haven’t installed Diskeeper 8.0 on your servers, your investment is being nullified. There’s only one automatic disk defragmenter specifically designed for Windows server operating systems: Diskeeper 8.0 Server. No matter how fast your storage system is | |||
Updated: 9, 2005 | Rating: 0 | Author: Colleen Toumayan | Size: 148000 kb | Demo Go to category: System Utilities > System Maintenance Similar programs | |||
496. | DocCommander 1.20.10 (utilityplanet.com) | ||
InternetExplorer); SuperRecent technology stores links to recently accessed documents. You can easily pick up a file you've been using a week or month ago! One-click access to system Favorites folder. All your bookmarks and links are easily accessible there; Available in four European languages; Works with all versions of Windows including Windows XP! DocCommander replaces | |||
Updated: 9, 2005 | Rating: 0 | Author: Denis Sheverdyaev | Size: 896 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
497. | DRemote 1.0 (products.asynchrony.com) | ||
What if you have to check the database server downstairs, start the webserver at second floor, and your computer is at the first floor! Well, now you can control & monitor remote computers from your PC. Whatever your job function is, there will always be a need to go around to other computers - whether it is DRemote comes with powerful features, easy customizability, cool interface, optimized resource usage and much more! Make your life much simpler with this cool program | |||
Updated: 8, 2004 | Rating: 165 | Author: Shawn Roach | Size: 1057 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
498. | Drive Health 2.0.30 (helexis.com) | ||
By implementing this technology the Drive Health provides access to the hard disk drives reliability monitoring, and keeps you informed about any potentially dangerous degradations of performance or reliability of your HDDs. The monitoring program eats minimum CPU and memory resources and can be run as a NT service. Drive Health is a Windows program that helps you to estimate | |||
Updated: 9, 2005 | Rating: 45 | Author: Alexander Burlakov | Size: 465 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
499. | DriveCryptPlusPack 1.0c (securstar.de) | ||
at the sector level, ensuring that only authorized users access it. The encryption algorithm is a trusted,validated algorithm chosen by the National Institute of Standards and Technology(NIST) and slated to be the cryptographic standard for years to come. AES-256 is a FIPS-approved symmetric encryption algorithm that may be used by U.S.Government organizations(and others) to | |||
Updated: 9, 2005 | Rating: 0 | Author: Wilfried Hafner | Size: 2779 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
500. | Easy File Protector 4.14 (softstack.com) | ||
a very flexible password protected security utility that restricts access to your files and folders by user-defined time schedule. You choose users, define restricted files/folders and time periods for them, and activate the program. After that, your system disables/enables your files automatically depending on current time and user. Protection is achieved by making files and folders | |||
Updated: 2, 2006 | Rating: 0 | Author: IM Soft | Size: 736 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
|
Home > Damaged access software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|