(sometimes we provide two download links because it may happen that the main server / link is overloaded or slow or non responding - the files are identical. Just choose one, save to the Desktop, double click to install)
: to our best knowledge this download comes from a website that is safe
(the last time we checked it, it was), but for your peace of mind (and better safe than sorry) we advise you to run an antivirus
on the downloaded file. Do not rely on MSWindows, Internet explorer, or on the electronic signature: a unsigned download is usually as safe as a signed one, signed just means the author paid Microsoft or Verisign for a stamp, it does not mean verified. Please kindly report us problems with detail (click here to report)
, if any.
Lets the end-user manipulate colors preferences. Logos can also be changed without redesigning the application. Extremely fast and accurate rescale routines. Object Viewer allows complete control of your data viewing. Sort, sift, filter and view your criteria in report form or export the data. Set individual security rights at runtime by the end user or system administrator. Manage user ID, Passwords and object rights.
(Elegant InterFace for rescale, resize, color schemes, report viewer, security
EIF40 helps your applications stay fresh and enhance productivity using an interface to let the end-user manipulate colors preferences for most controls and background textures at runtime. Menu and Report logos can also be changed without redesigning the application so the end user can enjoy the ability to add their own custom logo to their reports. ReScale Magic provides extremely fast and accurate rescale routines that ensure Access forms are resized perfectly to fit the end-users display regardless of the design resolution. Object Viewer allows complete control of your data viewing. Now you can view, sort, sift, filter and view your criteria in report form or export the data to comma delimited, MS Word Mail Merge and Excel spreadsheet formats. Security Administrator was designed to allow individual security right be set at runtime by the end user or system administrator. Easily manage user ID, Passwords and object rights including: open, read, write and delete permissions.
rescale, resize, resolution, code, Access, export