|
||||||
|
||
|
Home > Access add ins software |
Related keywords: access, Access, access control, ms access, remote access, microsoft access, MS Access, Microsoft Access, restrict access, last access |
|
|
671. | StormWindow 95 4.55 (cetussoft.com) | ||
StormWindow [TM] for Windows 95 will allow the authorized user to add several types and degrees of protections to the desktop and system of a Windows 95 computer. Intelligent use of StormWindow security measures will allow secure use of any shared Windows 95 computer. Examples of desktop protections include: protecting individual desktop icons; hiding individual Start Menu program | |||
Updated: 9, 2005 | Rating: 0 | Author: Cetus Software | Size: 1457 kb | Shareware Go to category: Security & Privacy > Access Control Similar programs | |||
672. | StormWindow 98 5.14 (cetussoft.com) | ||
StormWindow [TM] for Windows 98 will allow the authorized user to add several types and degrees of protections to the desktop and system of a Windows 98 computer. Intelligent use of StormWindow security measures will allow secure use of any shared Windows 98 computer. Examples of desktop protections include: protecting individual desktop icons; hiding individual Start Menu program | |||
Updated: 9, 2005 | Rating: 0 | Author: Cetus Software | Size: 1476 kb | Shareware Go to category: Security & Privacy > Access Control Similar programs | |||
673. | StormWindow Me 6.02 (cetussoft.com) | ||
StormWindow [TM] for Windows Me will allow the authorized user to add several types and degrees of protections to the desktop and system of a Windows Me computer. Intelligent use of StormWindow security measures will allow secure use of any shared Windows Me computer. Examples of desktop protections include: protecting individual desktop icons; hiding individual Start Menu program | |||
Updated: 9, 2005 | Rating: 16 | Author: Cetus Software | Size: 1476 kb | Shareware Go to category: Security & Privacy > Access Control Similar programs | |||
674. | StormWindow NT 2.14 (cetussoft.com) | ||
StormWindow [TM] for Windows NT will allow the authorized user to add several types and degrees of protections to the desktop and system of a Windows NT computer. Intelligent use of StormWindow security measures will allow secure use of any shared Windows NT computer. Examples of desktop protections include: protecting individual desktop icons; hiding individual Start Menu program | |||
Updated: 9, 2005 | Rating: 0 | Author: Cetus Software | Size: 1283 kb | Shareware Go to category: Security & Privacy > Access Control Similar programs | |||
675. | StormWindow XP 7.01 (cetussoft.com) | ||
StormWindow [TM] for Windows XP will allow the authorized user to add several types and degrees of protections to the desktop and system of a Windows XP computer. Intelligent use of StormWindow security measures will allow secure use of any shared Windows XP computer. StormWindow security schemes may be imported from and exported to other computers. StormWindow protections would | |||
Updated: 9, 2005 | Rating: 0 | Author: Cetus Software | Size: 1375 kb | Shareware Go to category: Security & Privacy > Access Control Similar programs | |||
676. | SuperSecret 1.0 (madlogic.com) | ||
of your other account and password information is stored securely in an encrypted format on your computer and can be accessed only with your one and only password. SuperSecret allows each family member or coworker to have his/her own storage area for passwords. Your confidential information is | |||
Updated: 9, 2005 | Rating: 0 | Author: Richard Anton | Size: 139 kb | Shareware Go to category: Security & Privacy > Password Managers Similar programs | |||
677. | System Shield 2.1c (iolo.com) | ||
is deleted, it is permanently and irrecoverably "gone". The error in this belief is that it relies on some basic assumptions that are very far from the truth. Realistically, the following must be true in order for a file to be irrecoverably deleted: 1. The data within it must not exist | |||
Updated: 9, 2005 | Rating: 0 | Author: iolo technologies | Size: 656 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
678. | THE Rename 2.1.6 (herve-thouzard.com) | ||
read only, archive) and date/time (date of creation, date of last access and date of last modification). Search internal name of HTML files to rename files. Preview pictures and MP3, VQF, OGG and WMA tags. File organizer, you can create folders with names and copy or move your files in them. THE | |||
Updated: 9, 2005 | Rating: 118 | Author: Hervй Thouzard | Size: 2827 kb | Freeware Go to category: System Utilities > File & Disk Management Similar programs | |||
679. | TK8 Safe 2.5 (tk8.com) | ||
can keep all user names, passwords, secret notes and serial numbers in one secured database file. The file is encrypted and not available to anyone else. TK8 Safe password manager not only stores your information, but helps you to use it. A fast and easy-to-use interface allows you to find information quickly. You can also use folders in your files to group the information | |||
Updated: 9, 2005 | Rating: 0 | Author: Tonis Kask | Size: 3487 kb | Shareware Go to category: Security & Privacy > Password Managers Similar programs | |||
680. | ToggleKEYBOARD 1.0.4 (toggle.com) | ||
adds brand new features to your keyboard allowing you to work faster and choose the settings that best suit you. Hotkeys You can assign actions to hotkeys so you can easily launch the apps you use most often without having to root around in the Start Menu. For example, if you use Microsoft Word often then you can assign it to Ctrl+W and start it right away by | |||
Updated: 9, 2005 | Rating: 0 | Author: Don Leclair | Size: 738 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
|
Home > Access add ins software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|