To ensure your protection against new threats, Outpost updates information frequently through a custom utility. The program detects and blocks hacker attacks, guards the privacy of data stored on your computer, monitors network activity of your system and applications, provides secure web surfing, and prevents Internet worms from activating from your inbox.
Security suite to protect data against new threats and intrusions. Automatic updates. It prevents unauthorized access to user data (documents, address books, registry data, etc.) and protects them against loss or damage.
To ensure your protection against new threats, Outpost updates information frequently through a custom utility. The program detects and blocks hacker attacks, guards the privacy of data stored on your computer, monitors network activity of your system and applications, provides secure web surfing, and prevents Internet worms from activating from your inbox.
Security suite to protect data against new threats and intrusions. Automatic updates. It prevents unauthorized access to user data (documents, address books, registry data, etc.) and protects them against loss or damage.
Helps in mass update of standard and custom file properties in a folder and sub-folders to easily change a set of documents and include metadata in Word and other Office files. Allows companies to quickly gather summary information from MS Office, Adobe documents and other source documents, and easily move that meta data into XML or post it on shared drives as an HTML documentation catalog index with hypertext links to access files.
DetailsBuy now ($175.00) Find similar
Platform: Windows 95, Windows NT, Windows 2000, Windows XP, Windows 98, Windows ME, Windows Server 2003
Language: English, German, Portuguese, Spanish, French, French English Portuguese German Spanish
Vendor: Soft Experience
Security suite to protect data against new threats and intrusions. Automatic updates. It prevents unauthorized access to user data (documents, address books, registry data, etc.) and protects them against loss or damage.
92. NShred
How can NShred effectively destroy any data? Simply, the hard disk descriptor table is updated and the file entry is removed. Even when the file area is overwritten, it is still possibile to recover data, by applying certain laboratory procedures because it's rare that a portion of the hard disk is rewritten more than 3/5 times. DetailsDownload trialBuy now ($24.99) Find similar
Platform: Windows NT, Windows 2000, Windows XP, Windows ME, Windows Server 2003, Requires .NET Framework
Vendor: LittleLite Software
updates of MOBILedit! Will read this template and insert all data gathered from the device. All blocks of data like phonebook are protected by MD5 hash algorithm. You do not need to import or export stubs of data from SIMs and phones any more.
The TDBFlyTreeView and TFlyTreeView control is an advanced interface for displaying and editing hierarchical data. · Data Validation All Data after editing retrieeved by tree through OnValidateNodeData, on this event user can process data for validation, translation and storing.
95. Network Inventory System (5 Clients)
High transmission speed by the data communication by TCP/IP. Compact Package (software server, Softwareclient, Datenbankviewer, system update as well as the written additions such as manual and FAQ 10 Mbyte are contained a comprehensive Downloadfile). DetailsDownload trial (Demo: 10.2 MB) Buy now ($200.19) Find similar
Platform: Windows 95, Windows NT, Windows 2000, Windows XP, Windows 98, Windows ME
Vendor: niis.net GbR