|
||||||
|
||
|
Home > That software |
|
|
481. | Accent 2.6 (promaxum.com) | ||
handy Windows application that makes you more productive by organizing your notes, passwords, calendar, and life. Information that used to be buried on your hard drive is now at your fingertips. Even though Accent's functions are feature-rich, the wizards make it simple for first-time users to become productive immediately. Accent's Notes manager lets you create | |||
Updated: 9, 2005 | Rating: 48 | Author: 1st Shareware Dot.com | Size: 4274 kb | Shareware Go to category: Home & Hobby > Cataloging Similar programs | |||
482. | Accent EXCEL Password Recovery 2.40 (passwordrecoverytools.com) | ||
of possible values individually for each position in the password that will be generated. The enhanced dictionary-based attack allows you to search several dictionaries and transform passwords read from them. The program will automatically change the case of letters, skip characters, interchange | |||
Updated: 2, 2006 | Rating: 1000 | Author: Denis Gladysh | Size: 734 kb | Shareware Go to category: Security & Privacy > Password Managers Similar programs | |||
483. | Accent OFFICE Password Recovery 2.40 (passwordrecoverytools.com) | ||
just so as not to lose the results of your own work. You think that these hacker guys are all geniuses? That's a myth. Stop watching those fairy tale hacker movies! The usual hacker is just a next-door teenager that learned how to apply some password-cracking algorithms. And the truth is that you can do exactly the same thing. The theory is quite | |||
Updated: 2, 2006 | Rating: 1940 | Author: Denis Gladysh | Size: 734 kb | Shareware Go to category: Security & Privacy > Password Managers Similar programs | |||
484. | Accent WORD Password Recovery 2.30 (passwordrecoverytools.com) | ||
for specifying possible values for each position in the password that will be generated, which reduces the time of recovery. The enhanced dictionary-based attack provides you with a dictionary manager and mechanisms for transforming the passwords being read. Accent WORD Password Recovery searches the | |||
Updated: 9, 2005 | Rating: 1001 | Author: Denis Gladysh | Size: 616 kb | Shareware Go to category: Security & Privacy > Password Managers Similar programs | |||
485. | Accents 2003 (overtechtechnologies.com) | ||
an accented a? Then type the letter a and BAM! Click the accented a that you want! It's easy to use and will work with most Windows programs! A MUST HAVE IF YOU MUST USE THESE SYMBOLS OFTEN! You want pi? Type in N, it looks like pi - and BAM! Click the pi symbol! Now you can paste it anywhere you want! Want an accented a? Then type the letter a and BAM! Click the accented a | |||
Updated: 9, 2005 | Rating: 0 | Author: David Grega | Size: 3068 kb | Shareware Go to category: System Utilities > Text/Document Editors Similar programs | |||
486. | Access Administrator 4.14 (softheap.com) | ||
protection activates automatically according to the current user's idenity and the timetable that is defined for it. You can disable Internet access, games and the other entertainment during the working time. For example, from 9:00 AM till 17:00 PM the user "User" can use Microsoft Office only, but after 17:00 PM he can also play his games and see pictures while the user | |||
Updated: 2, 2006 | Rating: 113 | Author: Ixis Ltd | Size: 678 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
487. | Access Administrator 4.14 (getfreefile.com) | ||
protection activates automatically according to the current user's idenity and the timetable that is defined for it. You can disable Internet access, games and the other entertainment during the working time. For example, from 9:00 AM till 17:00 PM the user "User" can use Microsoft Office only, but after 17:00 PM he can also play his games and see pictures while the user | |||
Updated: 2, 2006 | Rating: 76 | Author: Ixis Ltd | Size: 678 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
488. | Access Administrator Pro 4.14 (getfreefile.com) | ||
between your users according to predefined schedules. It means that each user has his own list of allowed and disallowed files and folders within certain time periods. The program does not modify your media: in protecting your files, it just uses a high-reliability VXD driver working at Windows kernel level. This guarantees that Access Administrator Pro will never lose your | |||
Updated: 2, 2006 | Rating: 34 | Author: Ixis Ltd | Size: 678 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
489. | Access Administrator Pro 4.14 (softheap.com) | ||
between your users according to predefined schedules. It means that each user has his own list of allowed and disallowed files and folders within certain time periods. The program does not modify your media: in protecting your files, it just uses a high-reliability VXD driver working at Windows kernel level. This guarantees that Access Administrator Pro will never lose your | |||
Updated: 2, 2006 | Rating: 16 | Author: Ixis Ltd | Size: 678 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
490. | Access Data Transfer Assistant 2000 3.1 (cbacorp.com) | ||
The ADTA is also a great way to generate numerous append queries that you can import in bulk into another Access database. The ADTA2000 works with Access 97 and 2000 data files and requires Access 2000, 2002, or 2003 to be installed. Deliver update versions of your app to customers. Easily copy all their data into the newer version from all or specified tables. Relationships used to | |||
Updated: 9, 2005 | Rating: 16 | Author: Bob Flenniken | Size: 6680 kb | Shareware Go to category: Development > Other Similar programs | |||
491. | Access Denied 3.40 (johnru.com) | ||
encryption, integration with your favorite screensaver, color's highlight log files with integrity test, setup of colored text for requesting passwords, possibility use Access Denied usernames as Windows logon names and other pleasant additions including hidden measures that can stop hackers/crackers. Screen Guard sub-system can save message events from anyone, even | |||
Updated: 9, 2005 | Rating: 58 | Author: Ivan Mayrakov | Size: 536 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
492. | Access Forms and Reports Assistant 2.0 (cbacorp.com) | ||
2000, 2002, and 2003 are available except the HasModule property (that one could be a disaster, erasing all your form and report module code in an instant). AFRA detects the version of Access your mdb file was created in and displays only those properties suitable to your database. All properties that have standard entries (other than text, command bar names, or code) are | |||
Updated: 2, 2006 | Rating: 149 | Author: Bob Flenniken | Size: 6165 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
493. | Access Lock 2.83 (softheap.com) | ||
a pop-up password-entry dialog with an input area for the password that restores your desktop to working condition. Access Lock enables you to lock your PC by two methods. The first one hides your desktop and shows a screen saver while the second one does not hide it allowing others to watch what happens there that is very useful when you would like to demonstrate something to | |||
Updated: 2, 2006 | Rating: 99 | Author: Ixis Ltd | Size: 795 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
494. | Access Lock 2.83 (getfreefile.com) | ||
a pop-up password-entry dialog with an input area for the password that restores your desktop to working condition. Access Lock enables you to lock your PC by two methods. The first one hides your desktop and shows a screen saver while the second one does not hide it allowing others to watch what happens there that is very useful when you would like to demonstrate something to | |||
Updated: 2, 2006 | Rating: 16 | Author: Ixis Ltd | Size: 795 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
495. | Account Pro 8.3.200 (accsoft-ch.com) | ||
accounting capabilities, ACCOUNT PRO has special capabilities that allow efficient financial planning and forecasting. Not only monthly budgets, but also monthly forecasts can be entered for every expense and revenue account. Monthly and yearly planning reports facilitate an overview of the system as a whole. With these features, realistic forecasts of the financial result at the | |||
Updated: 9, 2005 | Rating: 124 | Author: Willy Aus der Au | Size: 5548 kb | Shareware Go to category: Business > Accounting & Finance Similar programs | |||
496. | Accounts Receivable 3.1.5 (markosoft.net) | ||
system. This module may also be used as a stand alone application that is completely separate from the main Accounts Receivable module so that the program can be placed on individual technician's computers. Log and track all client transactions, assess late fees, create past due notices, print out reports, and generate work orders and invoices as well as track parts | |||
Updated: 9, 2005 | Rating: 42 | Author: Mark Bowden | Size: 1298 kb | Shareware Go to category: Business > Accounting & Finance Similar programs | |||
497. | Accurate Monitor for Search Engines 2.3 (cleverstat.com) | ||
tools intended for heavy “industrial” use. This means that it can be used to continuously track search results for hundreds, even thousands of keywords. It works well for multiple websites too. The results can be checked as often as one wants. The program keeps statistics and generates a variety of reports and diagrams. With one mouse-click you can get a comprehensive | |||
Updated: 9, 2005 | Rating: 0 | Author: Oleg Pivovarov | Size: 2651 kb | Shareware Go to category: Web Development > Site Administration Similar programs | |||
498. | AccuSplit 3.7.1 (members.cox.net) | ||
correctly reconstructing ANY file, even large Windows Backup files that exceed 20GB. To insure that the file reconstructed from the file segments exactly matches the original source file the application incorporates an advanced cryptographic algorithm that computes an MD5 Message | |||
Updated: 2, 2006 | Rating: 604 | Author: Joseph Flynn | Size: 230 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
499. | ACD FotoAngelo 2.0 (files.acdsystems.com) | ||
FotoAngelo 2.0 - The slide show software and screen saver creator that lets you add sound, text and transition effects. Simple tools like the image ordering drag-and-drop storyboard area, make creating shows with this multimedia builder quick and easy. When you are done, you can save your project as a stand-alone program you can send to anyone by e-mail. Whether you want to get | |||
Updated: 9, 2005 | Rating: 250 | Author: David Hooper | Size: 3484 kb | Shareware Go to category: Graphic Apps > Other Similar programs | |||
500. | ACD mPower Tools 1.0.2 (files.acdsystems.com) | ||
Tools is a set of handy extensions to Windows and other programs that let you work faster, while staying in the environment you normally use. You don't need to open separate programs to get the benefits of this digital photography | |||
Updated: 9, 2005 | Rating: 307 | Author: David Hooper | Size: 8898 kb | Shareware Go to category: Graphic Apps > Viewers Similar programs | |||
|
Home > That software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|