











Quick Search
|
Newsletter
|
|

|
|
|

Search Result:


| Overcome all the incredible obstacles, find the mayor and become a hero. |


|

| The Web Log DB exports web log data to databases via ODBC. Web Log DB uses ODBC to export data from raw log files to your database. Web Log DB allows you to use the applications you have become accustomed to such as MS SQL, MS Excel, MS Access etc. |


|

| Web Log Explorer Lite is freeware a powerful log analyzer generates interactive reports on-the-fly. It allows you to dig as deep into your log files as you need to. Explore your site, proxy or other logs without any limits! |


|

| Web Log Explorer is a powerful log analyzer generates interactive reports on-the-fly. It allows you to dig as deep into your log files as you need to. Explore your site, proxy or other logs without any limits! |


|

| This program is a powerful log analyzer for Windows Media Services server log files. It has been designed especially for analyzing WMS log files and supports the entire set of WMS log file data and provides the best and most complete analysis. |


|

| Add Powerful reporting features to your Web / Intranet pages and applications. With the advanced graphing functionality you will be quickly adding impressive and dynamic charting capabilities bringing your data alive ! |


|

| Destroy all hidden in Windows needless activity information that may potentially contain evidence and endanger you needlessly, and also remove temporary files left by Windows making it cleaner and running faster. |


|

| This is mass-mailing software to deliver personalized email messages to customers. Features: high speed; support of plain-text, rich text and HTML formats; message personalization; Import and Export features for customer database sharing. |


|

| This is mass-mailing software to deliver personalized email messages to customers. Features: high speed; support of plain-text, rich text and HTML formats; message personalization; Import and Export features for customer database sharing. |


|

| This is mass-mailing software to deliver personalized email messages to customers. Features: high speed; support of plain-text, rich text and HTML formats; message personalization; Import and Export features for customer database sharing. |


|

| This is mass-mailing software to deliver personalized email messages to customers. Features: high speed; support of plain-text, rich text and HTML formats; message personalization; Import and Export features for customer database sharing. |


|

| Comprehensive protection for Windows-based network workstations under a public environment. Restrict access to PC workstation, apply executable patches, and schedule reboots, shutdowns, and Explorer restarts remotely. |


|

| 1st Screen Lock is a password-protected desktop security utility that lets you lock your desktop with a password on boot, or at the time you are leaving your PC. You can use the built-in spy utility that works in background and enables you to spy on |


|

| Password-protected security utility for all Windows. Restrict access to Control Panel, disable Start Menu items, hide drives, disable DOS, boot keys, Registry editing, taskbar, task manager, and network access, hide desktop icons, apply password prot |


|

| 1st Security Agent Pro is a professional password-protected system security utility to secure Windows PC and restrict access to its key features. restrict access to Control Panel functions, hide local and network drives, disable the DOS prompt, boot. |


|

| This nice free security utility enables you to protect your PC by disabling some features like: use of the MS-DOS command prompt in Windows and real mode DOS applications from within the Windows shell, and disable function keys on boot up like F5 F8 |


|

| This is a set of games and logic puzzles with various board sizes and controls to allow for easy, medium, or high skill levels. You can play offered games and create your own logic puzzles using built-in game builder or your own bitmaps. |


|

| Protect your files and restrict other users from being able to start, see, change or delete them. File protection activates automatically according to the current user's idenity and the timetable that is defined for it. You can disable Internet acces |


|

| Controls access to files and folders situated on local media of Windows win98/ME/NT/2000/XP/vista at Windows kernel level, allocates access to files and folders between users according to predefined schedules, and protects system files and folders. |


|

| Access Lock enables you to lock your desktop with a password by several methods, prevent unauthorized access on boot, log the attemps of breaking the lock, allow people around to leave messages while your system is locked. |


|
|
|
|