Search our site:

Control

.NET WebScheduler  .NET WebScheduler 1.3
We had to worry about bandwidth limitations, multiple browser compatibility, etc. Implementing simple things like drag&drop or edit-in-place is quite an experience with ASP.NET. No wonder it is usually not implemented in components others develop. We were frequently asked to do it, but only an advent of ASP.NET 2.0 made it possible to keep the high standard we wanted to keep.

dhtmlxGrid - JavaScript Grid Control  dhtmlxGrid - JavaScript Grid Control 1.1
dhtmlxGrid is flexible JavaScript grid control with powerful API and Ajax support. This component allows displaying, editing and sorting tabular data in browser. Using dhtmlxGrid you can easily create dynamic tables with scroll bars, freezed columns, fixed headers and multiple cell types (text, image, checkbox, radio button, combobox etc.). Smart rendering and paging output allow this grid to work effectively with large datasets.

PC James Bond 007 2007  PC James Bond 007 2007 5.2
PC James Bond 007 secrectly records keystrokes, screenshots, websites visited, windows opened, applications run, Skype, MSN IM, ICQ, AIM, Yahoo! IM, clipboard, emails read, docs, passwords and more. In Stealth Mode, it is completely invisible to computer users. You can set hotkey and password to access the program. Receive all logs from a preset email or ftp at set interval. Usages: monitors employees, children, spouse and investigate crimes.

.NET CalendarGo Bundle Professional  .NET CalendarGo Bundle Professional 5.1
Calendaring Bundle is fully managed code written in 100% C#. There are major enhancements to presentation capabilities such as displaying shadows and updates to paint mode. Multi-page printout capabilities were also updated. There is support for context menus, new events and properties. A Pro version includes C# source code.
resource, calendar, calendaring, schedule, scheduling, gantt, date, month, year, week,

MSN Spy Monitor 2007  MSN Spy Monitor 2007 5.2
Spy all version MSN IM chatting records. Spy stealthily so that the user won't know such monitoring exists. Possible usages of MSN Spy Monitor include: Spy employees, children and spouse chatting on MSN. View logging records from the program or send a report to a pre-determined email address. Use your hotkey to activate it from complete stealth mode and protect program access by password. Uninstall it easily from the program interface.
monitor, msn, spy, camera, cam, spyware, record, email, key, stroke,

Barcode Blitz (Windows XP / Vista)  Barcode Blitz (Windows XP / Vista) 1.01
Barcode Blitz creates Code EAN 8, EAN 13, ISBN 10, ISBN 13. EPS and high resolution raster export. Automatic checksum generation. Very easy to use.
barcode, dll, datamatrix, code ean, code 128, 128 gs1, isbn, bookland, library, ocx,

.NET WebDailyCalendar  .NET WebDailyCalendar 1.1
We had to worry about bandwidth limitations, multiple browser compatibility, etc. Implementing simple things like drag&drop or edit-in-place is quite an experience with ASP.NET. No wonder it is usually not implemented in components others develop. We were frequently asked to do it, but only an advent of ASP.NET 2.0 made it possible to keep the high standard we wanted to keep.
resource, calendar, calendaring, eip, aspx, web outlook, webc, date, month, year,

FlowChart.NET  FlowChart.NET 4.2.1
FlowChart.NET adds to applications the ability to create and present workflow, flowchart and process diagrams, database entity-relationship diagrams, organizational, hierarchy and relationship charts, network schemes, graphs and trees. Its basic types of items - boxes, tables, and arrows - can be grouped and attached one to another and combined in complex structures. The control provides many predefined box shapes and allows custom-designed ones.
flow, flowchart, chart, diagram, workflow, organizational, process, hierarchy, network, .net,

PC Spy Monitor 2007  PC Spy Monitor 2007 5.2
PC Spy Monitor secrectly records keystrokes, screenshots, websites visited, windows opened, applications run, Skype, MSN IM, ICQ, AIM, Yahoo! IM, clipboard, passwords, emails, docs and more. In Stealth Mode, it is completely invisible to computer users. Set hotkey and password to access the program. Send logs to a preset email or ftp at set interval. Usages: monitors employees, children, spouse and investigate crimes.
monitor, pc, spy, camera, msn, icq, aim, ie, yahoo, messenger,

mCore .NET SMS Library (LITE)  mCore .NET SMS Library (LITE) 1.0
mCore .NET SMS Library - LITE is a powerful and easy to use .NET Class Library written in 100% managed code. It can be used with any ETSI 07.05 compliant GSM modem or phone handset connected to the PC serial port using a data cable, Infrared device, Bluetooth etc. It can be used for developing .NET applications that require to send/receive SMS in English as well as applications that require to send receive SMS in local languages (Unicode)
.net sms class library, sms, component, control, gsm, modem, phone, cellphone, text message, unicode,

Planner.NET  Planner.NET 4.0
Planner.NET is a calendar and scheduling component for the .NET framework. The control supports yearly, monthly, weekly and daily schedule views. Each view provides a distinct layout of the time cells and can display events such as appointments and meetings. The timetable view displays a day's schedule where the columns represent dates, locations, tasks or contacts, and the rows represent hours or minute intervals. The control is royalty free.
calendar, scheduling, schedule, appointment, .net, dotnet, control, component,

LanTool  LanTool 0.2.1.2
LanTool is a system service for remote network administration. Features include ability to determine possible network faults, Network bandwidth tests, File Transfers, chat, system uptime, remote shutdowns, restarts, session locks, useful hardware and software information on local or remote machines, network inventory and so on.
network administration, network inventory, remote shutdown, remote reboot, restart, lock, logoff, control, management, bandwidth,

SC-KeyLog PRO  SC-KeyLog PRO 3.2
SC-KeyLog PRO is the ultimate stealth surveillance tool for recording computer usage. Secretly spy on remote computers and receive all keystrokes, system logon passwords, chat sessions, visited web sites and much more periodically by e-mail. Download the demo to see all features of this amazing program. Limitations of the demo: 10 day trial. Invisible monitoring is disabled and only the first 3 characters of passwords are logged.
keylog, keylogger, keyloggers, monitor, capture, remote, stealth, spy, e-mail, email,

Hide & Protect any Drives  Hide & Protect any Drives 2.6
Hide or restrict access to any drives such as Hard drive, CD, DVD, floppy and flash, and deny access to partitions of your hard drives with "Hide & Protect Drives". Stop unauthorized software installations and data leak by removable media.
cd, dvd, hard drive, password, security, access, control, protect, privacy, restrict,

Mom Knows Best  Mom Knows Best 3.0
Mom Knows Best is an easy way to restrict and monitor usage of your computer. Our logging features, keyword triggers and our manual white/black lists make Mom Knows Best a great solution for home or small business use. See whats being typed into any program, when its typed and by the user that typed it. Use keyword triggers to restrict a broad range of web sites quickly. Or restrict by domain and file rules.
control, monitoring, spy, parental, keylogging, access, password protect, log, system,

Browse Pages: 1 [2] [3] [4] [5]