Access

Delete Files By Date Software Delete Files By Date Software 7.0
Search for files on your computer before, after or on a specified date (modified, created, accessed). You have the option to remove (delete) file results to the Recycle Bin. You also have the ability to specify which folders or drives to scan. This program is ideal for finding old, unused files that you no longer need ('Before this date' feature). This program works well at tracking the recent file work you have done ('After this date' feature).
delete, remove, deleting, removing, filedata, filename, time, month, year, day,
Advanced Time Control Advanced Time Control 0.91
Advanced Time Control is a program all parents need if they have children between 5 and 16. Advanced Time Control lets you specify when exactly your PC can be used, for how long and you can also select users who can use the PC without any limits. An unauthorized user cannot uninstall the product, even if the user is a computer wiz! At the same time, the program can easily be disabled by an authorized user. Limit harmful PC usage!
pc, harm, child, health, access, control, pc, parent, control, time,
Folder Lock and Hide Folder Lock and Hide 1.0.4
Lock and hide your folders by making them appear as another part of your computer, such as the Control Panel. Folder locking is completed in seconds and your data is unmodified - no complicated encryption keys to remember. The program will also include any subfolders when locking them.
encryption, encrypt, file, files, folder, folders, drive, drives, directory, directories,
PC System Tweak for Windows PC System Tweak for Windows 1.2.0.1
The PC System Tweak for Windows is the best utility for modifying system settings in the Microsoft Windows operating systems."Tweaking" an operating system refers to modifying software, hardware, or other settings that affect how the operating system works. Some Tweaks may determine what is shown on the desktop. Other tweaks may determine what programs are available in the Start Menu.You can have more control over your operating system.
utility, modifying, settings, operating systems, software, hardware, tweaks, desktop, start menu, control,
WinLock Professional WinLock Professional 4.65
WinLock is a comprehensive security solution for personal or publicly accessible computers. It is a program that ensures that only authorized people can access sensitive information on your computer. With WinLock, you can control how long others can use your computer, disable Windows hot keys (such as Alt-Ctrl-Del, Alt-Tab, Ctrl-Esc, etc.), lock Windows desktop, hide the Start button, lock files and folders, filter Internet content and much more.
security, password, lock, access,
DVD Device Lock DVD Device Lock 2.81
Hide or restrict access to removable media devices such as CD, DVD, floppy, flash and USB drives, and deny access to partitions of your hard disk drives with the program. Stop copying data between removable media and hard disk drives, deny access to removable media, protect your PC against unauthorized software installations and prevent data leaks through removable media.
drives, data, access, media, program, device, software, removable, password, system,
Office CleanUP 2007 Office CleanUP 2007 2.5
With the Office CleanUP 2007 can you repair and configure the Microsoft Office applications. In addition been sufficient only click. Supported applications are: Word, Excel, Access, PowerPoint, Outlook, OneNote, InfoPath, Publisher, Projekt, Frontpage and Office general.
microsoft office, office, open office, open, clean, offclean, offcln, cleaning, repair, office xp,
IE Internet Security IE Internet Security 9.11
It customizes different features of the Internet Explorer Web browser, lets you disable changing your web browser settings, restrict access to certain tabs of Internet Options dialog box, as well as specific settings from each tab, disable certain menu items and buttons, and prevent others from editing your Favorites. Multi-user support allows you to apply security restrictions for each user personally. Password protection is also offered.
password, security, administrator, access, control, protect, privacy, restrict, lock, screen,
Advanced Office XP Password Recovery Std Advanced Office XP Password Recovery Std 2.42
A program to recover lost or forgotten passwords to files/documents created in Microsoft Office applications (all versions up to Office 2002/XP): Word, Excel, Access (share-level), Money, IE. Most passwords are being recovered instantly; the password to open in Word/Excel 97/2000/XP can be recovered using brute-force and dictionary attacks, optimized for speed (about 5 million passwords per minute on PII).
recovery, lost, office 2000, office xp, word, excel, access, password, brute-force, dictionary-based,
MailBee WebMail Pro 3.4
MailBee WebMail Pro is advanced but easy-to-install web-based email interface. It's built as a set of ASP scripts (with source code, modification allowed) and powered by MailBee Objects (MailBee Objects license included). Users can receive, view, manage, and send email through web interface. Supports POP3, IMAP, SMTP, address book, folders, rich-text editor, skins, non-English languages, web-based admin panel. MS Access, MS SQL, or MySQL.
mail, application, web, web-interface, web interface, interface, webmail, web mail, web-based mail, email,
Full Convert Interbase/Firebird Edition Full Convert Interbase/Firebird Edition 2.11
Full Convert provides powerful and comfortable way to convert data of many databases. Databases supported: Microsoft Access, dBase, FoxPro, Microsoft Excel, Interbase/Firebird, Lotus 1-2-3, MySQL, Oracle, Paradox, SQL Server, Text files, ODBC, XML. All editions feature target database tree-like browser with multiselect which greatly simplifies certain actions, as well as powerful actions recording/replay and parameters handling.
database, conversion, convert, migration, migrate, data, databases, access, dbase, foxpro,
EMS Data Import for SQL Server EMS Data Import for SQL Server 3.2
EMS Data Import for SQL Server is a powerful tool to import your data quickly from MS Access, MS Excel, DBF, XML, TXT and CSV files to Microsoft SQL Server or MSDE tables. Data Import for SQL Server includes a wizard, which allows you to set all the import options for different files visually, and a command-line utility to execute import in one-touch.
ems, sql, server, microsoft, msde, express, import, tool, data, gui,
Virtual Network Computing++ Virtual Network Computing++ 1.0.0.0
Virtual Network Computing is a great client/server software package that allows remote network access to graphical desktops and it's available on most platforms. VNC++ can be used to perform remote control and administration tasks in Windows. It can be very helpful in distance learning and remote support. It can be very helpful in distance learning and remote customer support.
great, remote, network, access, client, server, vnc++, virtual, computing, graphical,
Bulletproof Public PC Bulletproof Public PC 6.21
Comprehensive solution to produce public PC and kiosk desktop terminals that are intended to work without supervision. Disable access to the local files and give the full access to the necessary applications only. Allow using Internet Explorer and disable all other software. Bulletproof Public PC is good for public libraries, Internet cafes, online terminals and in-store kiosks. User profiles and time-locked codes are also supported.
public, pc, access, bulletproof, workstations, workstation, user, time, terminals, software,
HWDIRECT HWDIRECT 1.83
HWDIRECT is an advanced low-level hardware register access software utility for Windows. It allows user to read and modify PC system hardware registers. With current latest version, HWDIRECT encapsulates nine separate tools. They are OSInfo, CPUID Info, PCI Read/Write (Support PCI Express Enhanced Configuration registers), I/O Read/Write, MSR Read/Write, CMOS Read/Write, Memory Dump, Hex Viewer/Editor, and SMBUS Access.
hardware direct, hardware access, hardware register access, access, msr, cpu msr, cpu msr tool, mtrr, smbus, pci access,

 

Browse Pages: [1] [2] [3] 4 [5]