Products similar to A7 Active Protection.
4372 products found. Showing 13-24 in 10 groups sorted by relevance.
13. ACC Imaging
Mit dem Imaging-Modul werden die Active Customizing Compo- nents (ACC) zur leistungsfähigen Grafikengine. Set the pictures made by Active Customizing Components (ACC) in motion. Create variants of tones and colours at runtime via Active Customizing Components (ACC). DetailsBuy now ($2,685.43) Find similar
Platform: Windows NT, Windows 2000, Windows XP, Windows Server 2003
Vendor: @BIT GmbH
KernelCAD Active Control displays interactively 3D solid or wire frame models. KernelCAD can be used in many ways from replacing bitmaps with 3D objects in product catalogues to creating technological process simulations and animations.
ECommerce enabled, token system or membership durations, thumbnail images, multiple image upload, Who's Online, Chat, I'm Interested teases, Favorites, Match Mail, Private Mailboxes, users can see if their messages have been read or not, bad words filter, e-mailaddress filter for ads, ban an e-mailaddress, ban an IP address, fully customizable HTML template, comprehensive admin panel and more.
Reports include: Tenant Report, Apartment Report, InActive Tenants, Active Tenants, Vacant Apartments, Occupied Apartments, Rentals by Suite #, Payments by Suite #, and more! Manage information like credit card numbers, address and phone number, social insurance #, etc. Separate tenants by status - in-active or active.
Once the message is being viewed, you can read the corresponding email if you click on the button. You can manually scroll the messages, using the navigation buttons: back and forward. An attachment could be any file on your drives, a WWW link or an e-mailaddress... or whatever you like.
Reports include: Tenant Report, Apartment Report, InActive Tenants, Active Tenants, Vacant Apartments, Occupied Apartments, Rentals by Suite #, Payments by Suite #, and more! Manage information like credit card numbers, address and phone number, social insurance #, etc. Separate tenants by status - in-active or active.
21. Easy Alarm Clock
Program Features: · Set to display always on top · Set screen position · Displays a user-defined message when the alarm sounds · Sleep function ¿ puts the alarm to sleep for five minutes · The system tray icon flashes when alarm actives · The alarm re-sounds if ignored for a minute · Status bar displaying key program information · Easy selection of sounds · Ability to use your own wave files for all sound events · The alarm can be silent, displaying text message only · Easy to enable and disable the alarm · Program menu available from program icon · The alarm message can have time, date and other information added with special control codes · Display time in 12-or 24-hour format · Display date in short or long format · Save or recall the alarm and program settings at any time · Hour and Half-hour sound events. DetailsDownload trialBuy now ($15.00) Find similar
Platform: Windows 95, Windows NT, Windows 2000, Windows XP, Windows 98, Windows ME
Vendor: Brightneon Software
22. dSPAM HotCafe
The dSPAM range of email filtering products is designed to rid your mailbox of the never-ending tide of unsolicited junk email (spam) that threatens to swamp it. DSPAM is a dedicated email filtering system, employing a combination of key-phrase matching, heuristic analysis, blacklists and trusted lists to provide a range of levels of protection against unsolicited email messages, combined with real-time program updates for maximum security. DetailsDownload trialBuy now ($89.99) Find similar
Platform: Windows 95, Windows NT, Windows 2000, Windows XP, Windows 98, Windows ME
Vendor: Dragon Enterprises
Reports include: Tenant Report, Apartment Report, InActive Tenants, Active Tenants, Vacant Apartments, Occupied Apartments, Rentals by Suite #, Payments by Suite #, and more! Manage information like credit card numbers, address and phone number, social insurance #, etc. Separate tenants by status - in-active or active.
CallerIP scans the ports on your system and alerts you to active and open' backdoors' which can provide unauthorized access to launch harmful attacks or steal confidential information. A click on a connecting IP address shows where the connection originates on a world map, along with the necessary domain and network registration details -- including abuse-reporting information -- so you can report the intruder to the authorities.