Home | Submit a file  |  New  |  Categories  |  Our awards  |  Link to us  |  RSS Feeds

Popular search phrases :: A :: access control
Display: short descriptions | full descriptions
  • Report, track and manage bugs, issues, changes and new features involved in product development. Key attributes include extreme ease-of-use and flexibility, a shared XML repository accessible to multiple users, multiple projects with assigned responsibilities, configurable access and privileges for users on each project. Virtually everything in QuickBugs is configurable to the organization and specific user needs including data collection fields, workflow, views, queries, reports, security and access control. Highly targeted email messages notify people when specific events require their attention.
  • Taking ownership of files or folders is not a simple task. Whether you use the GUI or the command line, it takes far too many steps to take ownership of files or folders. Rizonesoft Ownership will add a "Take Ownership" option under the Explorer right-click menu that will handle all the steps for you. This menu option is used to modify the Discretionary Access Control lists (DACLs). Simply put, it unlocks or gets ownership of a file or folder.
  • CCProxy, from www.youngzsoft.net, is a proxy server for windows, an internet access control proxy software. CC Proxy server software can support broadband, DSL, dial-up, optical fiber, satellite, ISDN and DDN connections, it helps building your own proxy server and share Internet connection within the LAN efficiently and easily. This proxy software can act as an HTTP, mail, FTP, SOCKS, news, telnet and HTTPS proxy server. It features account management functions, including Internet access control, bandwidth control, Internet web filtering, content filtering and time control. It also provides web caching, online access monitoring, logging and bandwidth usage statistics functions. Besides, it can work with active directory. CCProxy features with rich functions as below: 1. Modem, Cable Modem, ISDN, ADSL, Satellite, DDN, WiFi and so on are supported. 2. HTTP, FTP, Gopher, SOCKS4/5, Telnet, Secure (HTTPS), News (NNTP), RTSP and MMS proxy are supported. 3. Port Mapping is supported. 4. Web cache c ...
  • DC ReturnKeyEnable allows you to access form controls using the Return key instead of Tab. This way, you don't have to switch between keys to enter codes, access controls, and navigate through your form. With DC ReturnKeyEnable, you can spend less time defining events and more time perfecting your application.
  • Access Manager for Windows allows you to restrict access to to key features of Windows, such as Control Panels or Start menu, network, Taskbar, desktop, system tray, Network Access Control Page, Control Internet usage and more. It can also disable the Ctrl+alt+delete keys, the function keys at startup, allows to password protect Windows and restrict users to running specific applications only, control Internet usage, view statistics of computer u
  • An identification solution with options such as PIN, barcode read with webcam, RFID contactless card and biometric fingerprint. Easily interacts with your human resource and security applications connecting to an existing database or exporting data in your specific format and passing this information through plain text files or email autonomously, generate a report or design one. Includes auto-updates, video tutorials and configuration wizards.
  • Desktop locking security utility to protect desktop when you are not near PC. Password protection can be automatically activated on boot or with a click of an icon in the system tray. Log access attempts and enforce a custom background image. Simple messaging system allows your visitors to leave short messages on your locked desktop. Two locking methods are supported: with hiding your desktop; and without hiding to allow others to see desktop.
  • Remote Access Control is a utility to remotely control client's computers via the Internet or Lan. This program is one of few that can Reboot the remote computer and still connect back to itself without any user-interaction (via an in-build time-delay function). RAC was made with the "Technician" in mind that has to do repairs or virus removal of remote PC's.
  • A quick solution for creating Modern PDF documents with password features and access control. You can add security to your files with Modern PDF Generator's 128-bit encrypted password features. You can also restrict viewing, printing, editing, or copying of documents to only individuals with the correct password. The PDF documents created with Modern PDF Generator are fully compliant to Adobe PDF Specification, fully searchable and vector based.
  • A quick solution for creating CMYK PDF documents (press-ready PDF/X documents with CMYK colors) with password features and access control. CIE color space and ICC Profile can be integrated into PDF files with ease. Besides on-the-fly conversion to CMYK, Modern PDF Printer adds security to your files with the password features. You can also restrict viewing, printing, editing, or copying of documents to only users with the correct password.
  • DC ReturnKeyEnable allows you to access form controls using the Return key instead of Tab. This way, you don't have to switch between keys to enter codes, access controls, and navigate through your form. With DC ReturnKeyEnable, you can spend less time defining events and more time perfecting your application.
  • Go2PDF enables you to convert instantly any document into PDF format with a simple click. Go2PDF contains a Virtual PDF Printer, which is a high-quality PDF converter and generator with passwords protection, PDF access control, PDF scaling, PDF version and compatibility control, font embedding options and more. The generated PDF is small yet clear. Go2PDF is Freeware, offering an effective solution to create PDF documents with ease and joy.
  • NSF Local Security Remover from SysInfoTools is a robust and powerful tool that allows user to remove local security restrictions from secured NSF database files of lotus Notes. This tool removes security in no time with just few mouse clicks and key strokes. NSF Local Security Remover from SysInfoTools is a perfect solution for removing security from secured NSF database file of Lotus Notes. Lotus Notes has an attribute named as Access Control List (ACL) using which administrator set access rights to particular NSF file. Using this attribute file owner manages the NSF file. But sometimes situation arises when Lotus Domino server act inaccessible stops responding and the user or administrator is not able to access the NSF file. Every time when they try to do so the above mentioned errors are flashed making situation worse. NSF Local Security Remover from SysInfoTools is especially designed to deal with such type of situations. It erases NSF security aptly and helps you to open and read Lotus Notes NSF file ...
  • AllowBlock is a parental control software with web contents filter and access control features. Its Internet content filter blocks or allows visiting selected websites in Internet Explorer. You may create two lists of websites: allowed and blocked. If a website is on allowed list then its contents are displayed in the browser, if not then the browser is forwarded to a blocked info page. Features include access and uninstall password protection.
  • Website Block access control software utility allows you to block unwanted websites from display in Internet Explorer. If a website is blocked the user is forwarded to a blank page and the contents of the page are not loaded on your PC. Stop loading banners and ads, block Myspace, and Facebook, block your kids from chatting in chat rooms or remove undesired websites from their view. Software access and uninstall password protection are available.
  • iCafe Manager is an easy to use Complete Cyber Cafe Management software It is used in 20,000 Cyber Cafes in over 350 Cities across the world. It has a rich set of features that help in managing your Internet Cafe with ease & efficiency, freeing you from monitoring and administrative tasks. It enables to perform all tasks such as billing, monitoring Bandwidth Usage, managing Printers, viewing status of the Client Terminals, managing Rate Plans, creating membership packages, Inventory management, various Reports and getting help on all features from the server It is a Client-Server application and is made up of two parts - the Server and the Client Terminals. The iCafe Manager application is managed from the server, and all its features and functions are available on the server screen. The iCafe Manager client is the computer Terminal at which the user logs in to surf the internet. All client terminals connect to the iCafe Manager server and are monitored and controlled from there. The client&#0 ...
  • Time Track Time and Attendance Software is a new secure tracking, access control, and visitor management software system allowing organizations to track employees and contractors with detailed activity logs by individual or groups, and provides visitor management functionality, including data entry, badge design, and badge printing. It can interface with multiple databases concurrently. Export time and attendance to use with your payroll system.
  • Virtual PDF Printer serves as a real printer to convert anything printable to PDF. The printer is a high quality PDF generator with high printing resolution, PDF document information creation, PDF content encryption with passwords protection, PDF access control, PDF scaling, PDF version and compatibility control, font embedding options and more. Virtual PDF Printer is an affordable, effective solution offering dynamic generation of PDF documents.
  • Test 000-736 exam dumps Related certifications: * IBM Certified Advanced Database Administrator - DB2 9 for Linux UNIX and Windows * IBM Certified Database Administrator - DB2 9 DBA for Linux, UNIX and Windows Section 1 - Server Management (29%) 1. Understand the functionality of AUTOCONFIGURE 2. Ability to manually configure communications (protocol image(IPV6)) Section 2 - Data Placement (21%) 1. Ability to CREATE DATABASE (new default behavior) 2. Ability to create and manage Automatic Storage tablespaces Section 3 - XML Concepts (13%) 1. Ability to use XML Data types 2. Ability to create and manage XML indexes Section 4 - Analyzing DB2 Activity (16%) 1. Ability to use DB2 Utilities (db2bfd, db2mtrk, db2pd) 2. Ability to monitor deadlocks Section 5 - High Availability (10.5%) 1. Ability to use RECOVER DATABASE command 2. Knowledge of High Availablity Disaster Recovery (HADR) Section 6 - Security (10.5%) 1. Understanding of Labe ...
  • ACL Report Tool - SecReport Enterprise generates Acl reports for your network's NTFS Files and Folders Permissions - Access Control List Reporting Tool
  • S.O.S Backup Database is the ideal software for those who need to perform online backup of Oracle databases, SQL Server, Exchange Server, MySQL, PostgreSQL, Sybase, Interbase, Firebird, Lotus Notes and Windows system state. It uses magnetic tapes (DAT, DLT, LTO, SLR and others). Key Features: - Microsoft SQL Server 7/8/2000/2005/2008 online database backup - Oracle 11g and earlier versions online database backup - Online backup of Lotus Notes, Sybase, Interbase, and Firebird - Online backup of MySQL 4.0/4.1/5.0/5.1/5.4/6.0 - Online backup of PostgreSQL 8.2/8.3/8.4 - Microsoft Exchange Server 5.5/2000/2003/2007 online e-mails server backup - Microsoft Exchange Server 2003/2007 Brick-Level online e-mails server backup - Use of magnetic tape with multiple drive management - Backups using VSS (Volume Shadow Copy Service) - Disaster recovery for Windows 2000/XP/2003/Vista/2008/7 - Windows 2000/XP/2003/Vista/7 System State online backup - Network data access - Network Linu ...
  • HSLAB Access Control is a powerful and flexible system for the tracking of the staff working hours usage in a corporate networn or on a terminal servers. There are a lot of the programs to solve a similar problem. Part from them - simply spyware programs intended first of all for capturing of user’s passwords, keystrokes and various messages.
  • The PINoptic Secured Storage product allows content such as files, documents and pictures on your PC or removable media to be completely secured. By using One Time Symbol CAPTCHA based Passwords for Data File access control, PINoptic Secured Storage uses patented One Time Visual Probablistic password (OTP) combined with industrial and military grade encryption to completely secure systems and media from unauthorized access
  • Access Control is a advanced and flexible system for the control of the staff working hours usage in a network or on a terminal server. There are many of the programs to solve a similar problems. Part from them - simply spyware programs intended first of all for capturing of user’s keystrokes, passwords and various messages.
  • Remote Access Control (RAC) is a Plugin for Uvnc to ease the removal of Viruses, and controlling of Remote-Computers via the Internet or Lan. This Utility is one of few that can Reboot the “Remote Computer” and still connect back to itself without any user-interaction from the client (Must be a 24/7 connection, NO dialup). If your “line” gets disconnected, RAC will assure you get re-connected again. Features a) Offline Compiler; b) 50 Connections supported; c) Re-Boot with Safe Mode Support on all Connections; (Not meant for Dial-Up connections) d) Monitoring of Dropped Connections (Direct AND Reboot) If your “line” gets disconnected for any reason, the “Remote” will Automatically re-connect to your PC...you just need to hit the “accept” button...NO Client interaction needed! (Although there WILL be circumstances when the client DOES have to be at the “remote” for emergencies, especially if you are dealing with Virus Issues!!!) e) Aero and UAC Manipulation; f) Get your ...

Page 1 of 4
1 2 3 4


Legal disclaimer | Privacy policy

© 2004-2014 IT Shareware