Absence Software

Vacation Tracking Web Based Software.

Web TimeOff
 

Replicon
 

Vacation Tracking Web Based Software. Eliminate Manual Time Off Processes and Spreadsheets! You can easily automate your employee time off processes with real-time calendar views of time off. Simple time off requests and approvals and eliminate time off errors and abuses. Highly configurable and flexible. Generate time off requests and print reports for easy sharing.

Software Keywords: leave of absence eliminate time off accrual paid time off sick leave tracking

 
Automatic button pushing utility

Push the Freakin Button (PTFB) Pro
 

Technology Lighthouse
 

Push The Freakin' Button is a utility for automatically handling confirmation screens and other windows that interrupt your workflow. PTFB quietly keeps watch from the system tray. When it sees a window that you have previously targeted it carries out the button and key presses that you have defined, saving you time, irritation and finger-wear.

Software Keywords: macro recorder macro automatic button pushing interrupt automatically push the freakin button

 
User-friendly stereogram generator

Stereogram Explorer
 

olej
 

Stereogram Explorer is user-friendly design software for creating high-quality hidden 3D graphics, also known as Single Image Random Dot Stereograms (SIRDS) or Single Image Stereograms (SIS) known from the "Magic Eye" series. Stereogram Explorer uses advanced algorithms and can import and render animations from 3DS models.

Software Keywords: image stereogram texture depth sis explorer

Allesta Web Application Firewall

Allesta Firewall
 

BuyServers Ltd.
 

Complete Web Application Protection with Allesta Instant Detection & Prevention. Allesta protects your web applications against entire classes of attacks. Allesta provides proactive detection and prevention of all known and unknown application level attacks. COMPLETE SOLUTION IN A PACKAGE FOR YOUR WEB SERVER. Allesta includes 3 key modules: Allesta Firewall Module, Allesta HTTP Filtering Module, Allesta Connection Limiting Module

Software Keywords: buyserver application scanner vulnerability scanner computer security vulnerability

Monitoring software trace user PC activities

Monitoring Software
 

Monitoring software
 

Invisible keylogger application traces all online/offline activities performed by employees during company working hours. Undetectable keylogger software performs their recording in hidden manner and user working on computer is unaware of its existence. Keylogger tool is not detectable by any active program or in add/remove program list, startup menus, desktop icons, control panel, installation folder path, system tray, Windows task manager etc.

Software Keywords: surveillance monitoring records

XML based rapid web development engine

USL XML Engine
 

Urry Software Lab
 

Urry Software Lab XML engine is rapid web development tool, designed for parsing data from xml files and including it into different HTML templates. The engine works on Internet server, and may be used as the basis of complicated web site. Currently operates under Win32 platform. The engine has several aditional features for file management, searching, including environment variables etc. Uses it's own ColdFusion - like HTML extension language.

Software Keywords: xml xml engine html extension wincgi

Step by step to flawless code!

Debugger for MySQL
 

MyDebugger.com
 

Debugger for MySQL is a powerful solution for managing and debugging stored MySQL procedures and functions. The software features standard debugging tools, such as watches, conditional breakpoints, an expression evaluator and a call stack, and enables you to take advantage of some of its unique functions, such as the SQL Window. Debugger for MySQL will make sure that the final result is well-readable and reliable code you can be proud of!

Software Keywords: sql debugger mysql routine mysql debugger mysql debugging mysql procedure mysql function

a radical way to protect your information

Hara-Kiri
 

CyTeG (CyberTech group)
 

"Hara-Kiri" (ex "Dontouch") is a radical way to keep your confidential data away from unauthorized access by "self-destructing" The files that you specify. How it works: While Windows is starting up it checks to see if you are pressing a combination of certain keys. If those keys are not being pressed, The files in a determined folders will be completely erased.

Software Keywords: protection confidential way unauthorized data away

The #1 Program for all your FCC Exams

Ham University
 

MICA
 

Ham University (TM) helps you learn Morse code and prepare for your FCC Exams. It includes Morse code lessons, exercises and a neat game (Pentode(R)) inspired by Tetris(R). For the written exam there is a training program plus practice exams. This is a solid top-of-the line Windows program with excellent instructions and ease-of-use features written by one of the developers of Windows.

Software Keywords: cw exams amateur pentode lessons

SCORM compliant Learning Management System

eLMS Pro
 

Pilot Group Ltd
 

eLMS Pro is a complete software package that includes everything you need to launch successful e-learning company. It is designed for any education formations: from small distance training companies up to big colleges. This system is PHP based and installed on your Web server. Features multi-lingual interface, multi-level courses catalog, flexible content management tools, advanced teacher and admin areas.

Software Keywords: learning managment system e-learning php e-learning software lms learning management software scorm compliant lms

 

Page 3 out of 4    1 2 3 4


 

Copyright © 2003-2012 TverSoft Software