|
||||||
|
||
|
Home > Unauthorized access software |
Related keywords: access, Access, access control, ms access, remote access, microsoft access, MS Access, Microsoft Access, restrict access, last access |
|
|
61. | Actual Transparent Window 3.8 (actualtools.com) | ||
like! By using different levels of transparency which can be accessed via contextual menu, hotkey or the title button (placed on the title bar next to the standard Minimize/Restore/Close buttons), you can come up with some fantastic looking desktops. Use this tool to draw superb portraits with world-famous masterpieces. Open any picture, create a new image in Adobe Photoshop | |||
Updated: 2, 2006 | Rating: 96 | Author: Michael Tretyakov | Size: 1683 kb | Shareware Go to category: Desktop > Themes & Wallpaper Similar programs | |||
62. | Actual Title Buttons 3.8 (actualtools.com) | ||
Actual Title Buttons offers such innovative controls as Stay on Top, Minimize to Tray, Make Transparent, Align Window and other handy functions. The program does exactly what it promises, i.e. increases the efficiency of your Operating System and organizes desktop space better for those users who usually | |||
Updated: 2, 2006 | Rating: 16 | Author: Michael Tretyakov | Size: 1698 kb | Shareware Go to category: System Utilities > Shell Tools Similar programs | |||
63. | ActiveScreenLock 2.81 (dmvsoft.com) | ||
of information theft crimes are conducted without having network access to target machine. Most of us prefer not to turn computer off while we are away for coffee or going to the lavatory or have to attend a meeting in a conference room next door. That is the point where an average computer system is most vulnerable to felon's attack. The guy just has to have a glance at your | |||
Updated: 2, 2006 | Rating: 173 | Author: DMVsoft | Size: 1335 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
64. | Access Lock 2.83 (getfreefile.com) | ||
Access Lock is an easy-to-use system-tray security utility you can use to secure your desktop when you are away from your computer. Just configure the program, define a password and double click the Access Lock system-tray icon every time you need to disable and hide your desktop. While it is | |||
Updated: 2, 2006 | Rating: 16 | Author: Ixis Ltd | Size: 795 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
65. | Access Lock 2.83 (softheap.com) | ||
Access Lock is an easy-to-use system-tray security utility you can use to secure your desktop when you are away from your computer. Just configure the program, define a password and double click the Access Lock system-tray icon every time you need to disable and hide your desktop. While it is | |||
Updated: 2, 2006 | Rating: 99 | Author: Ixis Ltd | Size: 795 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
66. | Access Administrator 4.14 (softheap.com) | ||
and the timetable that is defined for it. You can disable Internet access, games and the other entertainment during the working time. For example, from 9:00 AM till 17:00 PM the user "User" can use Microsoft Office only, but after 17:00 PM he can also play his games and see pictures while the user | |||
Updated: 2, 2006 | Rating: 113 | Author: Ixis Ltd | Size: 678 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
67. | 1st Evidence Remover 2.14 (getfreefile.com) | ||
work with different software, use the Internet and online banking to access your accounts, information about all your steps is stored in various files and in the registry. This fact often results in security threat you may face because all pictures you have seen, all passwords and bank accounts you use | |||
Updated: 2, 2006 | Rating: 190 | Author: Ixis Ltd | Size: 1177 kb | Shareware Go to category: Security & Privacy > Anti-Spam & Anti-Spy Tools Similar programs | |||
68. | 1st Evidence Remover 2.14 (softheap.com) | ||
work with different software, use the Internet and online banking to access your accounts, information about all your steps is stored in various files and in the registry. This fact often results in security threat you may face because all pictures you have seen, all passwords and bank accounts you use | |||
Updated: 2, 2006 | Rating: 48 | Author: Ixis Ltd | Size: 1177 kb | Shareware Go to category: Security & Privacy > Anti-Spam & Anti-Spy Tools Similar programs | |||
69. | CyberMatrix Pro Schedule 5.03 (cyber-matrix.com) | ||
appointment scheduling system. Appointment schedules can be accessed throughout your network. Pro Schedule is ideal for doctors, dentists, nurses, lawyers, veterinarians, driving instructors or any other professionals who are often scheduling appointments. Pro Schedule can be used in clinics, hospitals, beauty salons, office buildings, driving schools or anywhere else requiring | |||
Updated: 2, 2006 | Rating: 0 | Author: Cyber Matrix | Size: 2953 kb | Commercial Go to category: Business > PIMS & Calendars Similar programs | |||
70. | X-Mailer Direct 1.3 (x-mailer.com) | ||
recipients are usually stored. ++It integrates with Outlook, Excel, Access, SQL Server, ODBC, OLE DB, or even a web-site or a CRM system. ++Download X-Mailer Direct for free and discover how it can be of advantage to your initiatives. E-mail Marketing in 4 easy steps. Download X-Mailer Direct for free and discover how it can be of advantage to your | |||
Updated: 2, 2006 | Rating: 77 | Author: Andy Max Jensen | Size: 5407 kb | Shareware Go to category: Communications > E-Mail Clients Similar programs | |||
|
Home > Unauthorized access software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|