|
||||||
|
||
|
Home > Access recovery software |
Related keywords: recovery, access, Access, access control, data recovery, ms access, remote access, microsoft access, MS Access, password recovery |
|
|
61. | GetDataBack for NTFS 2.31 (runtime.org) | ||
scenario is - GetDataBack will recover your data if the hard drive's partition table, boot record, MTF or root directory are lost or damaged, data was lost due to a virus attack, the drive was formatted, fdisk has been run, a power failure has caused a system crash, files were lost due to a software failure, files were accidentally deleted... Recover even when Windows doesn't | |||
Updated: 9, 2005 | Rating: 1729 | Author: Ragnhild Fesel | Size: 2789 kb | Shareware Go to category: System Utilities > Backup & Restore Similar programs | |||
62. | HSLAB Print Logger SE 4.3 (hs-lab.com) | ||
on the computer to which it is installed. HSLAB Print Logger SE's main task is to collect the information about the sizes of printed documents/images and to record this information to a database for subsequent analysis. Print Logger can also compare the size of printing with the specified quotas and prohibit it if the quotas are exceeded. This feature is optional and can be | |||
Updated: 9, 2005 | Rating: 0 | Author: Oleg Golub | Size: 6105 kb | Shareware Go to category: Business > Other Similar programs | |||
63. | Internet Explorer Password 3.0.189 (lastbit.com) | ||
Explorer Password is a password recovery program for IE Content Advisor. Content Advisor was initially designed as a security feature and a tool to monitor website ratings to prevent minors from accessing adult websites. Since the rating technology never became widespread, this feature is basically useless, and may effectively block the usage of Internet Explorer. If you | |||
Updated: 9, 2005 | Rating: 0 | Author: Vitas Ramanchauskas | Size: 61 kb | Demo Go to category: Security & Privacy > Password Managers Similar programs | |||
64. | Internet Explorer Password Revealer 1.3 (rixler.com) | ||
passwords are a familiar issue to most Internet users. That's why Internet Explorer Password Revealer displays Site, User, and Content Advisor passwords as well as Autocomplete data strings. More importantly, the software provides a simple solution for removing or transferring this information. This comes in very handy when you get another computer or move to another workstation | |||
Updated: 3, 2005 | Rating: 48 | Author: Felix Kosolapov | Size: 664 kb | Shareware Go to category: Security & Privacy > Password Managers Similar programs | |||
65. | Invisible Secrets Encryption Software 4.4 (neobytesolutions.com) | ||
passwords securely and helps you create secure passwords, faster access to your passwords by accessing the password manager directly from the tray menu; a virtual keyboard created in order to prevent any key logger software from stealing your passwords; a shredder that helps you destroy beyond recovery files, folders and internet traces; a locker that allows you to | |||
Updated: 2, 2006 | Rating: 0 | Author: NeoByte Solutions | Size: 2740 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
66. | MacPhoneHome 3.0 (pcphonehome.com) | ||
Command and Tracking Center, which will provide full tracking and recovery support. When the stolen computer goes online it will send a stealth message to the pre-determined e-mail address containing its location. Once this information is received, recovery agents at MacPhoneHome will work with | |||
Updated: 9, 2005 | Rating: 0 | Author: Martin Moran | Size: 548 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
67. | Kickstart 1.02 (westfaro.com) | ||
again. You can use the same techniques for SQL Server, DB2, Access and any programming language or web development tool that lets you edit source code as text. Kickstart also simplifies the process of converting schemas from one database to a different database. For example, you could take an Access schema and a script for creating DB2 tables and create the equivalent DB2 | |||
Updated: 9, 2005 | Rating: 298 | Size: 7069 kb | Commercial Go to category: Development > Other Similar programs | |||
68. | Hard Angel 1.05 (kpot.8bit.co.uk) | ||
provides hardware protection for drive by preventing unauthorized access; blocks virus attacks which use this mechanism for destruction of the information; warns the user about the risk of a data loss if a drive starts to fail; provides reliable storage of passwords and possibility of their restoring; bypasses limitations of the BIOS regarding capacity of drive; works under any OS | |||
Updated: 9, 2005 | Rating: 401 | Author: Ozerov Evgeny | Size: 300 kb | Freeware Go to category: Security & Privacy > Anti-Virus Tools Similar programs | |||
69. | Mutilate File Wiper 2.92 (mutilatefilewiper.com) | ||
is NOT secure. Deleting files merely removes the file system's pointer to the file, ALL THE DATA REMAINS ON YOUR HARD DRIVE. The remaining data can be easily recovered with data recovery or forensic software. Your sensitive files may also be vulnerable to advanced recovery techniques, EVEN WHEN OVERWRITTEN, by analyzing latent magnetic traces. Mutilate File Wiper | |||
Updated: 9, 2005 | Rating: 82 | Author: Craig Christensen | Size: 823 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
70. | MySQL Snap 2.1 (php-art.com) | ||
and parameters settings; • Choosing the necessary database, where recovery will be implemented to (only if one database is recovered); • Setting recovery parameters; • Recovery of one or several databases from files containing SQL statements (dump files); • Possibility of displaying of recovery process with the help of special process indicator. The | |||
Updated: 3, 2005 | Rating: 0 | Author: Roman Korobitsin | Size: 1189 kb | Shareware Go to category: Business > Databases & Tools Similar programs | |||
|
Home > Access recovery software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|