Content Access Mail
- Downloads:
- Views:
- Rating:

It achieves this by adding an action to the Rules module.
Installation:
Unpack in your modules folder (usually '/sites/all/modules/')
Enable under Administer > Site Building > Modules
Free download from Shareware Connection - This Drupal module allows sending rule-based emails to all users with permission to view a specific node
Version: 6.x-1.0 | Size: 10 KB | Platform: PHP, Scripts
Released Date: 26-04-2013 | Rating: 0 | Title: Content Access Mail
Author Url: http://drupal.org/project/content_access_mail
Program Info Url: http://drupal.org/project/content_access_mail
Download Url: http://ftp.drupal.org/files/projects/content_access_mail-6.x-1.0.tar.gz
Node Reference Variables - This Drupal module exposes CCK node reference fields in a variety of ways in order to populate variables
Dataset - The Dataset module is for grouping nodes together in sets.
Known User Role - For a Drupal 5.x equivalent to this module, see http://drupal.org/project/recognized_user
FileField AuthCode - This module extends the FileField module to allow you to provide a simple text string as a code users must enter before they can download the files attached to a specific file field
Node to Word - The Node to Word module simply provides two links in the links area of nodes of the enabled content types.
bbPress Post Topics
Mobile Comments Signature
bbPress Admin Bar Addition
All In One Social Network Buttons
Add image to Post
Toggle WWW
Simple Full Screen Background Image
Trucking Cargo Fleet Mgmt
Mobile App Showcase Widget
BanglaPress
Paint Color Insert Tool
Add Links to Pages
Zopim Live Chat Addon
Social Networks
Affiliate Programs
Animation
Auctions
Audio Systems
Banner Rotation
Blog
Bulletin Boards & Forums
Business & Enterprise
Buttons
Calendars & Events
Charts & Graphs
Chat
Classified Ad Managers
Communication
Extract Specific Niche Emails
Outlook Rule Duplicate Emails
Node Based Graphics
Node Based Software
Node Based Graphic
Recovery for Access - Recovery for Access repairs corrupted Access databases (.mdb, .mde, .mdw, .mda, .accdb, .accde). Supported Access versions: 2010, 2007, 2003, 2002, 2000, 97, 95 and 2.0. The recovered data is saved into a new Access database.
ASCII Text Files Folder Search Routine - ASCII Text Files Folder Search Routine is a very lightweight tool that was created in order to allow you to perform searches by providing a simple set of parameters that include the search string, the folder name and the extension.
Access Workgroup Password Recovery - Access Workgroup Password Recovery is a program to recover lost or forgotten passwords for Microsoft Access workgroup files. (*.mdw, *.mda). All passwords are recovered instantly regardless of length. All versions of Microsoft Access are supported.
DBSync for MS Access & MS FoxPro - DBSync for MS Access & MS FoxPro is an easy-to-use database migration tool that helps you synchronize and convert from:· MS Access to MS FoxPro· MS Access to MS Access· MS FoxPro to MS Access· MS FoxPro to MS FoxPro·
Advanced Access Repair Program - Corrupt access database .
Shareware Connection periodically updates pricing and software information of 'Content Access Mail' from company source 'Greg Harvey' , so some information may be slightly out-of-date. You should confirm all information before relying on it. Software piracy is theft, Using 'Content Access Mail' crack, password, serial numbers, registration codes, key generators is illegal and prevent future development of Content Access Mail.
Style Jukebox - No matter if you use a computer for personal needs or work in a networked setup, listening to music is commonplace. It is required for relaxation amidst work and nearly every user indulges in it. For music playback on PC, the WMP is not the only ...
Sculptris - For 3D modeling and design, there are so many apps to pick from noondays. From feature laden and expensive apps of Autodesk to mid level and lesser known contenders, users are spoilt for choice. However, it is also possible to use a decently ...
Imagina - Average PC users have to deal with an ever increasing number of digital images these days. This has become a trend after invasion of digital cameras and smart phone with high quality cameras among the mass. You also need to edit and retouch ...
DriveHQ Online Backup Enterprise Edition - For individual users as well as organizations, taking backup of data is vital nowadays. You really cannot count on the PC hard drive solely to store your data forever in a secure manner, as it is! Backup software is a prerequisite and choosing ...
HDD Guardian - No matter how costly a desktop or laptop is, it is necessary to keep a tab on its hardware components. While you can spot signs and symptoms of hardware malfunction and impending failure in some instances, some mishaps may just strike you out of ...
Xvirus Personal Guard - Nowadays, it is quite risky to use a computer without having suitable security suite or antivirus installed in it. Your computer’s security can be breached any moment without a suitable antivirus or Internet security software. There are so ...
LastPass - Nearly every computer and internet users need to deal with a lot of passwords and this number only goes up with time! Remembering so many passwords becomes tedious with time and that can add to inconvenience. While you can assign the task of ...
VLC Media Player Portable - There are plenty of media player applications available for Windows and some of the popular ones are actually freeware. If you find the Windows media player inadequate or sluggish, give VLC media player a try. This versatile media player plays ...
Nero Kwik Media - Nero is known mostly for its legendary disc burning software that has metamorphosed into a media editing powerhouse over a decade. The multimedia suite offered by the company caters to needs of intermediate and advanced users well but its price ...
Emsisoft Emergency Kit - The way malware creators and hackers are adapting to newer measures to sneak past PC security, it is no longer enough to stay complacent after installing a standalone antivirus. You never know when a stealthy malware sneaks past its scan and ...

