Navigation
Home
Top Downloads
New Downloads
Submit Programs
Bookmark
Celebrities
Contact
Discussion Forum
Add to Social Bookmarks
Digg  del.icio.us  Blink  Stumble  Spurl  Reddit  Netscape  Furl 
Access Software Download
CASE Studio 2 v 2.23.1
CASE Studio 2 is a professional database design tool, which allows you to visually create Entity Relationship Diagrams (ERD) for various database systems - e.g. MS SQL Server 2005, Oracle, DB2, Access, Sybase, Firebird, MaxDB, MySQL, PostgreSQL and more. With CASE Studio 2, you can reverse engineer your already existing database structures easily. Features include: SQL scripts generation, version manager, user-defined templates, HTML reports...
case, er diagram, case, studio, database, model, design, tool, ddl, sql,
HWDIRECT 1.88
HWDIRECT is an advanced low-level hardware register access software utility for Windows. It allows user to read and modify PC system hardware registers. With current latest version, HWDIRECT encapsulates nine separate tools. They are OSInfo, CPUID Info, PCI Read/Write (Support PCI Express Enhanced Configuration registers), I/O Read/Write, MSR Read/Write, CMOS Read/Write, Memory Dump, Hex Viewer/Editor, and SMBUS Access.
hardware direct, hardware access, hardware register access, access, msr, cpu msr, cpu msr tool, mtrr, smbus, pci access,
WGP Folder Lock 1.1
Lock and hide your folders by making them appear as another part of your computer, such as the Control Panel. Folder locking is completed in seconds and your data is unmodified - no complicated encryption keys to remember. The program will also include any subfolders when locking them. Plus disable folder delete - users will not be able to delete the locked folder or drag to Recycle Bin.
encryption, encrypt, file, files, folder, folders, drive, drives, directory, directories,
FreeFile 1.2
"Make sure the disk is not full or write-protected and that the file is not currently in use." "There has been a sharing violation." "The source or destination file may be in use." - These are typical error messages you get when you try to delete a file that is locked by a process. But which process has locked the file? Use FreeFile to automatically find out which process is locking your file, and free the file by ending the process.
freefile, grubletrang, skrubbeltrang, free, locked, file, process, cannot, delete, rename,
WGP Folder Lock 1.1
Lock and hide your folders by making them appear as another part of your computer, such as the Control Panel. Folder locking is completed in seconds and your data is unmodified - no complicated encryption keys to remember. The program will also include any subfolders when locking them. Plus disable folder delete - users will not be able to delete the locked folder or drag to Recycle Bin.
encryption, encrypt, file, files, folder, folders, drive, drives, directory, directories,
EMS Data Import 2007 for PostgreSQL 3.0
EMS Data Import for PostgreSQL is a powerful tool to import your data quickly from MS Excel, MS Access, DBF, XML, TXT and CSV files to PostgreSQL tables. It provides adjustable import parameters, including source data formats for all the fields and destination data formats for the selected fields, commit options, number of records to skip, etc.
ems, postgresql, postgres, pg, import, tool, data, sql, server, gui,
Internet Password Lock 5.4.0
Password protect all access to the Internet (Web surfing, Instant Messaging, email, etc.). Protect children by making sure they do not use the Internet without a parent present or lock out unauthorized Internet use on business computers. Once Internet Password Lock is installed, all Internet access is blocked when Windows starts. Input a password to access the Internet. You can then access the Internet freely until you lock the Internet again.
password, internet, web, access, block internet, password protect, lock internet,
Desktop Lock Express 2
Desktop Lock Express is an access control software that can lock your screen to prevent people from accessing your computer. It is one of the Desktop Lock products family, which provides the major features of Desktop Lock but decreased its size, removed unnecessary options. Desktop Lock Express can be used directly without the need of installing, all features have been included in the single exe file. Desktop Lock Express can safely lock computer
lock, lock keyboard, lock mouse, keyboard, mouse, system, lock desktop, lock system, .desktop lock, system,
EPL 4.0.2
Powerful, easy to use RAD programming language & software development environment, for all levels of developers. It provides a very high quality compiler and allows user to build standalone application. Build & debug high performance Windows Form Application, Windows Console Application, Windows Dynamic Library, Linux Console Application in one IDE.
epl, easy programming language, embedded database engine, windows linux rad, api, control, access, sql server, mysql, ado,
ANPR 1. 0. 10. 5
LPReditor, offers a robust, transportable, automatic license plate recognition (LPR) capability, designed exclusively for system integrators, value-added resellers, and volume end-users. LPReditor is built entirely on industry-standard modules. LPReditor is built entirely on industry-standard modules and features : Independent of type of frame grabber - Optimized reading from multiple images - Comparison 1 to N -Fully automatic Syntax-checker
anpr, automatic, number plate, recognition, lpr, license, plate, reader, camera, sdk,
StealthDisk 3.4
StealthDisk is a patent pending security system enabling you to completely hide Folders & Files on your computer, including complete applications. Invoke StealthDisk with a secret user selectable Hot-Key combination + password and anything you have pre-defined as secret simply vanishes! ANY type of file search or software audit will not be able to reveal the existence of anything hidden with StealthDisk.
folders, hide, files, security, stealth, stealthdisk, encryption, password, hidden, secure,
Office Key Professional 7.9
Office Key Professional is a password recovery tool for MS Office files: Word, Excel, Access, Powerpoint, Outlook and Visual Basic for Applications (VBA) projects. Dictionary, Brute-force and Brute-force with Xieve Optimization attacks are used to recover File-Open passwords; other types of passwords are recovered or reset instantly. Word and Excel File-Open passwords can be instantly removed in Online Mode. Download and try a free demo version.
password recovery, xls, outlook, pst, word, doc, access, vba, project, password,
Program Lock and File Encrypt 6.5
Protect yourself from unauthorized access to your computer free of charge. Secure your computer by Password protecting your Windows applications, programs and EXE files. Plus encryption for your files, folders and drives - direct from Windows Explorer. Extra features allow you to disable Task Keys, Software Installation, Internet Explorer, Mozilla FireFox, Downloading Files, Zip and Self Extracting Files and the Boot Keys (F8).
encryption, encrypt, file, files, folder, folders, drive, drives, directory, directories,
MultiNetwork Manager Pro 8.0.11
Connect anywhere fixed or wireless, quickly and securely, using powerful multi-profiling UI and wizards. The need to connect your computer to different networks is growing as we enjoy the new possibilities of mobile working. Wireless networking is changing the way we work and live our lives. We expect to be able to connect and work from wherever we are. The benefits are obvious, but the technical complexity for the user is increasing.
connectivity, domain, switching, emobility, tcp/ip, laptop, wlan, access, multinetwork, connect,
Excel Extract Images From Multiple Workbooks Software 7.0
Get pictures and photos from multiple Excel files quickly. This application will scan your xls files and save the embedded graphics found within to external bitmap files.
get, pictures, photos, photographs, graphics, embedded, pic, sheet, xls, workbook,
Database Tour Pro 5.8.3.1241
Cross-database tool with report builder. It allows viewing, editing, and printing data, building SQL queries, building reports, control transactions, configuring BDE aliases, sorting and filtering data, viewing structure, searching and replacing text, importing and exporting data (with format converting), special functions to work with MEMO, graphic, numeric, string fields. Includes command line support.
db, dbf, database, database tool, database utility, db tool, cross-database, dbase, interbase, access,
Easy File & Folder Protector 4.83
Protect files and folders situated on local media of Windows 95/98/ME/NT/2000/XP with Easy File & Folder Protector at Windows kernel level. Your can deny access to certain files and folders, or to hide them securely from viewing and searching. Easy File & Folder Protector has an easy-to-use user interface allowing you to allocate access to your files and folders between your users according to predefined timetables. Each PC user can have his own
password, security, access, control, protect, privacy, restrict, restrictions, restricting, computer,
CPS Plus 1.11
CPS Plus serial data acquisition software enables serial devices like bar code scanners, magnetic stripe readers, gages, electronic scales, sensors, laboratory instruments and modems to communicate with any Windo Supports Com1 to Com8, even multiple serial ports simultaneously! Create charts and graphs in your applications that automatically update with data from your serial devices / instruments.
rs232, rs-232c, rs-485, scanner, reader, scale, gage, balance, serial, barcode,
NetWatcher 2.9.3
Do you want to supervise users' every action on remote computers simultaneously? NetWatcher, a Real Nuke for you to supervise and control computers over Internet/network in a Windows. For more info, please visit http://www.netguarder.com/en/netwatcher.htm. You will get remote computer screens, URL access, program run and keystroke input history of remote users in a Windows of your computer.
supervise, supervision, control, remote, access, instant, terminal, forbid, device, email,
ABF Password Recovery 1.74
ABF Password Recovery is a program to retrieve lost or forgotten passwords for many well known programs and popular file formats. All passwords are recovered instantly. Passwords for programs can be recovered for current installation of Windows only. There are some useful tools inside the program, such as: Password picker, Hidden passwords browser, Personal folder recovery. Program interface is customized.
abf, microsoft, windows, outlook, express, office, access, password, login, key,
Hide Files & Folders 3.23
Hide Files & Folders is a an easy-to-use password-protected security utility you can use to password-protect certain files and folders, or to hide them from viewing and searching. Upon accessing any protected file or folder, dialog box querying password appears on the screen, and by entering a valid password, user gets access to the selected file or folder.
password, security, access, control, protect, privacy, restrict, restrictions, restricting, computer,
WindowsGuard 6.5
Free program to secure your computer by password protecting your Windows programs and EXE files. Plus encrypt your files, folders and drives - direct from Windows Explorer. Extra features inc. Disable CRTL+ALT+DEL, Software Installation, Internet Explorer, Mozilla FireFox, Downloading Files, Zip and Self Extracting Files and the Boot Keys (F8). NEW Deny access to any file, folder or file extenstion. ALSO AVAILABLE IN PREMIUM (OPTIONAL BUY LINK)
encryption, encrypt, file, files, folder, folders, drive, drives, directory, directories,
Database Migration Tool 2.0
Database Migration Tool is one of the most powerful applications based-windows platform database Management.It can manage MSSQL, Oracle, Access, Excel and DBF databases. It easily see table structure and data. It can easily import and export data. It can query data and execute command used direct SQL statements, more easily debug SQL syntax errors and logic errors. You do not have to install the other components to use these features.
export data, import data, mssql, access, dbf, excel, oracle, connect db, procedure,
Full Convert Enterprise 2.17
Full Convert provides powerful and comfortable way to convert data of many databases. Databases supported: Microsoft Access, dBase, FoxPro, Microsoft Excel, Interbase/Firebird, Lotus 1-2-3, MySQL, Oracle, Paradox, SQL Server, Text files, ODBC, XML. All editions feature target database tree-like browser with multiselect which greatly simplifies certain actions, as well as powerful actions recording/replay and parameters handling.
database, conversion, convert, migration, migrate, data, databases, access, dbase, foxpro,
mst IsUsedBy 2.0.6.148
mst IsUsedBy is a software Tool which you can use to determine what process on your system has a particular file open. This is important, for example, if you want to copy or delete a file and you don't know why it isn't working.
mst isusedby, isusedby, mst, mst software, process, file, open, system, erase file, delete file,
BPACLer 1.0.0.4
BPACLer eliminates the tedious process of selecting a file or folder object and having to browse through each individual access control entry (ACE) to see the effective permissions for different users and groups (trustees). BPACLer quickly displays all allow and deny access control entries (ACE) from the ACL for a selected file or folder. The selected file or folder owner information is also displayed on the same screen.
acl, ace, access, control, list, permission, file, folder, security, entry,
Advanced Office Repair 1.0
Advanced Office Repair(AOFR) is a Microsoft Office data recovery suite. It includes recovery tools for corrupt or damaged MS Access databases (MS Access 95, 97, 2000, XP and 2003), MS Excel worksheets (MS Excel 3, 4, 5, 95, 97, 2000, XP and 2003), MS Word documents (MS Word 6.0, 95, 97, 2000, XP and 2003), MS Outlook data files (MS Outlook 97, 98, 2000, 2002 and 2003), and MS Outlook Express dbx and mbx files (MS Outlook Express 4, 5 and 6).
ms, office, recovery, repair, fix, recover, microsoft, 2000, 2003, repair office,
Extract Data & Text From Multiple Files Software 7.0
Search for text within multiple files and, if found, extract the line. Extract lines that do not contain certain text. Extract text between starting and ending characters throughout files. Extract the same lines by number from multiple files.
extraction, extracting, extracted, extracts, from, csv, how to, txt, huge, delimited,
Access Administrator 4.83
Protect your files and restrict other users from being able to start, see, change or delete them. File protection activates automatically according to the current user's idenity and the timetable that is defined for it. You can disable Internet access, games and the other entertainment during the working time. For example, from 9:00 AM till 17:00 PM the user "User" can use Microsoft Office only, but after 17:00 PM he can also play his games and..
password, security, administrator, access, control, protect, files, privacy, restrict, lock,
Folder Security Personal 4.1.312
Folder Security Personal allows you to hide and lock folders and files. You can choose to hide them completely or restrict access by making them read-only, preventing modification or deletion by other users or programs. It can restrict access to Floppy, CDRom, USB sticks, and other removable drives by locking them or making them read-only. It also includes a proactive spyware defender. Version 4.1 now supports Windows Vista.
hide, protect, file, folder, drive, access, control, lock, password, ie,

 

Browse Pages: 1 [2] [3] [4]
Login
Username

Password



Not a member yet?
Click here to register.

Forgotten your password?
Request a new one here.
Search Software
Subscribe RSS
Subscribe with My Yahoo!
Subscribe with NewsGator
Subscribe with My AOL
Subscribe with Bloglines
Subscribe with Netvibes
Subscribe with Google
Subscribe with Pageflakes
Celeb of the day


Una Stubbs