Search Software:      

  

Free User Security Downloads

 

East-Tec Sanitizer 2004

Don't give away sensitive information, valuable corporate trade secrets, business plans, personal files and letters, or traces of Internet or newsgroup activity with the old computers that you or your company resells, donates, reassigns to different departments or removes from operation. Deleting all the files or even formatting the hard disk is not enough to stop people to restore information using basic recovery programs. East-Tec Sanitizer 2004 however removes all traces of data from the computer hard disk, by overwriting and destroying beyond recovery every sector and bit of information. Data is removed according to U.S. Department of Defense standards or custom user security levels. East-Tec Sanitizer 2004 can be operated from a floppy disk, CD or DVD to sanitize any drive or partition from the computer, regardless of the file system or the operating system. Whether you want to prevent identity theft, protect your privacy or stop competitors from stealing your sensitive information, East-Tec Sanitizer 2004 offers the solution.

eraser erase wipe delete disk drive data destroy dod navso sanitizer

4POS RETAIL

POS inventory and sales software for general stores and restaurants $49. The ideal solution for any small or medium size business that needs to do retail sales. It provides a database for stock and customers and an intuitive interface for sales staff to work. Full user security and barcode printing.

point of sale point of sale retail inventory store sales pos epos barcode

The Lock XP

The Lock XP provides user access, Internet and system security for any computer running Windows 95 to Windows XP (with Fast User Switching [also supports Terminal Server Connections]), and now supports Windows Server 2003. All user security is group based configurable by any members of the Administrators group. User security can define system policy, logon times, internet access times, web site restrictions, and access to local resources such as programs and files and folders. Logging features will record web sites visited, programs run, and any security violations occurring while the user is logged in. User security data is stored locally or on a shared network folder. The Lock XP, the local Windows system, a Netware Server, a Windows NT server, or a remote Lock XP Security Manager server, can verify user passwords. The Lock XP has a built in cloning feature designed to make network installations a simple one step process. When used in conjunction with the Lock XP Security Manager, all remote systems may be kept up to date when The Lock XP has been updated on the Security Manager system. Tools are included with the Security Manager that will allow remote monitoring of any systems running The Lock XP and connecting to the Security Manager. A web-based interface is also included with the Security Manager so that administration may be done from the administrator's desktop rather than from the Security Manager server itself. An updated Users guide is also available. Now includes active Password monitoring used to combat modification of Windows 2000/XP/2003 user passwords (usually with a bootable hacking disk) outside of the Windows GUI.

the lock xp the lock 2002 thelock lock secure security logon security user security access control secure windows desktop protection

Timesheets Lite

Timesheets Lite is our free timesheeting software. It is ideally suited to a project based environment where you need to track your employees time against projects. Key features of Timesheets Lite include: Completely free for use Simple to use interface Create and delete employees and projects Allow employees to book time against projects Generate reports suitable for invoicing in Microsoft Excel Multi user system with user security (including password control) and permissions Centralised database allowing multiple client installations and one secure database location Uses Microsoft Access database allowing you to generate your own reports easily using Access. Full source code available for modification On going support and development Timesheets Lite is ideal for: Project based businesses Consultants Builders Accountants Programmers Engineering firms

timesheets projects invoicing timesheets lite our free timesheeting software

LASsie (Light Application Security) for MS Access

LASsie (Light Application Security) is a Microsoft Access Add-In that enhances your Access application with a simplified user security system. Intended as an alternative to Access? built-in security, LASsie offers a less complicated way to secure forms, reports, controls and certain records from unauthorized user access. With LASsie, you can prevent a user from opening specific forms/reports, restrict their ability to update data on a form, disable certain controls, filter certain records, all based on a user?s assigned Security Level. LASsie includes a friendly user sign-on form that prompts for a login user name and password. Users can change their own passwords via the included "change password" form. Optionally, the sign-on form can be bypassed and the user's network login username can be used. Once the user name is verified, his/her session is assigned a Security Level code that determines which forms or reports can be accessed, if data updates are allowed, and more. LASsie is called "light" application security because it is not intended to be a robust, high-end security application. In fact, a sophisticated user could edit the underlying tables and change their own security level. By hiding the LASsie tables, and/or linking to them in an external, encrypted database, you could minimize the possibility of such potential breaches, but you should understand that we do not guarantee that such a breach will never occur. That being said, LASsie can serve quite well as an application security system where users are relatively unsophisticated, or where application data is not of a highly classified nature.

microsoft access ms access access security security restrict access sign on password protect password library reference implement

dbQwikSite Demo

dbQwikSite: Easy Data driven web sites

A revolutionary software for building all kinds web applications connected to databases. dbQwikSite is an intelligent code generator saving hours of tedious web programming. Absolutely no coding required!

Features:

  • 100% code generation you don't need to code ASP/PHP/HTML or SQL
  • Connects to almost any database Access, SQL Server, MySQL and more...
  • You choose an Integrated shopping cart to to link to your PayPal Shopping Cart.
  • Integrated Drag & Drop Query Builder
  • Generates:
    • List & catalog Pages,
    • Search,
    • Add, Edit and Delete Pages,
    • email pages,
    • "more" pages,
    • Master/Detail pages
  • Test right on your PC
  • Sort, Filter and selected Records
  • Customizable Data Formatting
  • Visual Design preview
  • Split "n" records per page
  • Generate Index Pages
  • Color scheme templates
  • Generate Next Prev Navigation
  • Each page type can have its own headers, footers and color scheme.
  • Integrated FTP publishing.
  • Pages can contain controls: Drop Down Lists, Radio Buttons, Hidden Fields, Memos Text input, Date Picker & File upload.
  • Site Explorer integrates all your design functions.
  • Images can be added to projects and published.
  • User definable page items.
  • User Security with a Login Page

html asp php ecommerce demo web database web design web development online database ecommerce web site solution create web page

SDE for JDeveloper (SE) for Windows

SDE for JDeveloper is a full-featured UML modelling tool seamlessly integrated with JDeveloper. SDE supports full software development life-cycle - analysis, design, coding, testing and deployment. You can draw UML diagrams (class, use case, sequence, collaboration, state, activity, component, deployment) in JDeveloper... +MS Visio integration +Round-trip engineering +Plug-in and template support +Import Rational Rose +more

jdeveloper uml modeler add-ins plugins uml 2-0 uml tools modelling tools uml diagrams case tools class diagrams use cases rational rose

File Substring Replacement Utility

File Substring Replacement Utility (FSRU) can search and replace multiple strings in multiple files. It was designed specifically for computer programmers working on large projects with many source code files, however any type of file can be used including HTML. FSRU provides a detailed report of every substring that is found or replaced. FSRU supports case-insensitive, "whole word", command line, and wildcard searches.

file substring replacement utility search replace multiple string search and replace programmer programming tool search replace

Cramgene

Cramgene is a unique puzzle game inspired by today's advances in genetic science. Players compete through rounds, deciphering creature DNA to create specific meals for bizarre pets. Bonus genes add an element of surprise and strategy to every match. Cramgene offers a solitary mode played against the computer, as well as a 2-player option through an Internet connection.

cramgene yamisoft game pet genomic genome gene puzzle incredibly unique puzzle game played alone

007 Spy Software

007 Spy Software can secretly track computer user's activity and automatically deliver logs to you via Email or FTP, including keystrokes, emails, online chat, files operation, Web site visited, and take snapshot of the entire desktop like a surveillance camera. Features include start and stop scheduling, logs remote delivery, stealth mode, user filter, password protection, suspend on idle, HTML report, logs sorting and searching, and much more!

spy software key logger keylogger spyware secretly record activities computer users deliver logs via email ftp

WatchetShot!

Screenshot your desktop and crop to size - ideal for bug tracking, documentation, help and web site construction. Illustrate what's going on on your desktop - to report a fault or explain to someone else. WatchetShot! is fast and easy to use. Save the results in economical jpeg format. Capture error messages or program screens. Allows you to open existing jpeg images for cropping too.

screenshot capture desktop crop jpeg jpg image programs screens messages errors documentation help html snapshot

Strike-A-Light

This simulation was designed to train operatives in the strategic use of the Strike X-1, a mind altering weapon of the future. Play against the computer, or with your friends and family, either individually or as teams. Original strategic gameplay, multiple board sizes, nine difficulty levels, undo and redo, skins, save games and play-by-email. Master the last Strike. Who strikes last, strikes best. Your freedom of will depends on it!

board game strategy chess reversi othello mind puzzle tic tac toe laser bounce laser

Becks News Ticker

An animated Formula1 race car will drive through your desktop from one side to another. You can find out up to date news and information when you right click it and then a menu comes down but unfortunately only in German.

screen saver fun animation news ticker animated ticker displays latest f1 news

 
Audio Software
Office & Business
Games Software
Graphics Software
Internet Software
Home Software
Software Developers
Tools and Utilities
 
 
 

Copyright 2004-2010 FilesWeb.com