|
||||||
|
||
|
Home > Keyed access software |
Related keywords: access, Access, access control, ms access, remote access, microsoft access, MS Access, Microsoft Access, restrict access, last access |
|
|
81. | Visual TimeAnalyzer for time tracking 1.4 (neuber.com) | ||
Visual TimeAnalyzer is a extensive reporting timesheet, project and time tracking software. The easy to use application automatically tracks all computer activities, working time, pauses, projects, costs, software and Internet use and presents detailed, richly illustrated reports. You learn which programs | |||
Updated: 9, 2005 | Rating: 25 | Author: Alexander Neuber | Size: 1177 kb | Shareware Go to category: Business > Project Management Similar programs | |||
82. | Word to PDF Converter 3.0 (pdf-convert.com) | ||
not hours or days. Word to PDF Converter eliminates the need to re-key and re-format PDF documents, saving you both time and money. Accurate You will be amazed at the results you get from Word to PDF Converter. It accurately retains the layout of the original Doc file. Converts text in over 100 | |||
Updated: 9, 2005 | Rating: 0 | Author: Michael Wang | Size: 3070 kb | Shareware Go to category: Graphic Apps > Converters & Optimizers Similar programs | |||
83. | Zetafax 2006 (deksoftware.com) | ||
annotate faxes within text such as date received A key new management feature is the Junk Message Filter. This allows Network Administrators to automatically delete junk faxes (or fax spam), or to divert them to a specific folder on a system-wide basis. Administrators can choose to | |||
Updated: 2, 2006 | Rating: 164 | Author: Mark Koch | Size: 78764 kb | Shareware Go to category: Business > Other Similar programs | |||
84. | aaxIniFile 1.0.0 (aaxcomponents.com) | ||
aaxIniFile ActiveX Control is a component that gives you an easy access to any standard .ini initialization file. With this component, you can: - Open standard .ini files; - Read / Write string and numeric values; - Enumerate sections and keys A standard .ini file has the following format: [section] key=value This component comes with full documentation | |||
Updated: 9, 2005 | Rating: 0 | Size: 646 kb | Shareware Go to category: Development > Active X Similar programs | |||
85. | aaxRegistry 1.0.0 (aaxcomponents.com) | ||
aaxRegistry ActiveX Control is a component that gives you an easy access to the Windows Registry. With this component, you can: - Open / Create / Delete keys and subkeys; - Read / Write / Delete values of any type; - Enumerate keys, subkeys and value. This component comes with full documentation and many Visual Basic samples. Access the Windows Registry | |||
Updated: 9, 2005 | Rating: 0 | Size: 710 kb | Shareware Go to category: Development > Active X Similar programs | |||
86. | ActivLicense Online v1.01 (aidsoft.com) | ||
computers.ActivLicense Online verifies that a program's product key has not been used on other computers than intended by the software's license. You need to create a Activation Account with Username ID and Product Key (that you have selected) after send directly to your customer. The End-User can choose to activate your product over the Internet or by Telephone. In the | |||
Updated: 9, 2005 | Rating: 104 | Author: B Bruno | Size: 439 kb | Shareware Go to category: Development > Delphi Similar programs | |||
87. | ADEX Registry 2.5.1 (vyapin.com) | ||
that enables application developers of Microsoft technology to access the system registry from their application code. ADEX™ Registry has been developed using Microsoft ATL, providing users fast access to the registry. It provides an intuitive Object Model with a design similar to the system registry's structure, giving users access to any key/value/data | |||
Updated: 9, 2005 | Rating: 0 | Author: Venkat Raman | Size: 889 kb | Commercial Go to category: Development > Components & Libraries Similar programs | |||
88. | AidAim CryptoPressStream 1.00 (aidaim.com) | ||
compression and encryption library. It provides transparent access to compressed or encrypted data stored in the stream object. All stream objects are 100% compatible with TStream and have some advanced functionality like progress event, LoadFromStream, LoadFromFile, SaveToStream, SaveToFile methods, Lock and Unlock methods for multi-thread usage. CryptoPressStream includes | |||
Updated: 9, 2005 | Rating: 0 | Author: AidAim Software | Size: 1062 kb | Commercial Go to category: Development > Delphi Similar programs | |||
89. | AlarIT Virtual USB Driver 2.1 (alarit.com) | ||
LetOs suppose you have purchased the software protected by USB HASP KEY, but you want this product to be used on several computers, but in different time. If the computers are located close - it is not a problem to pull out the USB HASP KEY from one computer and to insert into another. There is a problem when the computers are located in different premises, or it is worse than | |||
Updated: 9, 2005 | Rating: 98 | Author: Max Zotov | Size: 547 kb | Commercial Go to category: System Utilities > Other Similar programs | |||
90. | Apex SQL Code 3.1 (apexsql.com) | ||
of perfect ASP, VB, C#, SQL (and more) code in just seconds The key feature of Apex SQL Code is Template based code generation that allow users to configure custom code patterns automated with the code scripting language of your choice, VBScript or JScript. Features [NEW] Apex SQL Code has a cool template wizard that makes creating templates as easy as following 7 simple steps | |||
Updated: 3, 2006 | Rating: 16 | Author: Apex SQL tools | Size: 6032 kb | Shareware Go to category: Development > Other Similar programs | |||
|
Home > Keyed access software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|