No Internet access required. Each user receives an assigned Network Groups list, independently from computer name where he is currently logged. The messenger clients receive user account list from a server and able to see current presence status of each user, i.e. Online, Offline, Auto-Reply mode (Away).
DetailsDownload trialBuy now ($115.00) Find similar
Platform: Windows NT, Windows 2000, Windows XP, Windows Server 2003
Language: English General requirements: Intel® Pentium®
Vendor: B Labs
281. Web Hotel Manager
Web Hotel Manager This is a web based hotel management system provided as an ecommerce template that lets you run a web based business from day one. Mailing list management. Click on the demo button to see account access details. DetailsDownload trialBuy now ($185.00) Find similar
Vendor: Low Cost Thai .Com
No Internet access required. Each user receives an assigned Network Groups list, independently from computer name where he is currently logged. The messenger clients receive user account list from a server and able to see current presence status of each user, i.e. Online, Offline, Auto-Reply mode (Away).
DetailsDownload trialBuy now ($195.00) Find similar
Platform: Windows NT, Windows 2000, Windows XP, Windows Server 2003
Language: English General requirements: Intel® Pentium®
Vendor: B Labs
283. Desktop Master Pro
Other workstation can dial its phone number for remote access communication. Requires continuously the access and management of those servers from a branch in Istanbul. Remote access applications are mostly used by companies which provide Internet related services (ISPs, hosting companies,... etc.). DetailsDownload trialBuy now ($39.99) Find similar
Platform: Windows 95, Windows NT, Windows 2000, Windows XP, Windows 98, Windows ME, Windows Server 2003
Vendor: Intelligence Technology Systems
Your laptop as a second monitor! Edit a word document in full screen and drag&drop information from the web page without switching between program windows. Have simultaneous visual access to your online tutorial while working in the main program.
(adware, spyware, dialers, trojans....) that gain access to your system via Browser. Collect lists yourself and pass them on in valid Stealth form. Of prescribed lists of anonymous servers or the need for expensive subscriptions.
Protect your privacy securely deleting all traces of your activity 77 percent of major U. S. companies record and review employee communications, including e-mail, Internet connections and computer files. American Management Association. Accounting and other internal documents; Recently used documents history clean-up; Find files list clean-up; Windows run list clean-up; Find computers list clean-up;
While deleting and destroying data WINSWEEP uses a 7-level process adapted to the specifications of the DoD-document 5220-22-M, National Industrial Security Program Operating Manual (American Ministry of Defense). Enables secure storage of access codes, PINs etc.
While deleting and destroying data WINSWEEP uses a 7-level process adapted to the specifications of the DoD-document 5220-22-M, National Industrial Security Program Operating Manual (American Ministry of Defense). Enables secure storage of access codes, PINs etc.
Notes about course combinations and the like can be documented. A guest list can be drawn up for each event. 7. Random seating arrangements by automatically placing guests at tables from the guest list. Guests can be seated at a maximum of 50 tables either with a mouse-click or by selecting them from a guest list.