Dupehunter is a unique program to offer tracing specific original documents. Dupehunter operates with calculations of 32 bit checksums, MD5-hashes or SHA1-hashes and is able to identify duplicate documents, pictures, programs etc. File types are unlimited, exact definition and search according to date and time, size, attributes and contents are included in this program, as in the choice of folders/directories or drives, system-wide or within whole networks.
209. #Amazing Desktop
The current tabs show a Web page and a Word document for a research project. To find out, click Windows Start button, choose menu Control Panel, and then double click icon System. To access specific folders that are otherwise hard to find, such as Program Files and Start Menu folders. DetailsDownload trialBuy now ($19.99) Find similar
Platform: Windows NT, Windows 2000, Windows XP, Windows 98, Windows ME
Vendor: SoftApproach Corp.
Dupehunter is a unique program to offer tracing specific original documents. Dupehunter operates with calculations of 32 bit checksums but also MD5 hashes and SHA1 hashes and is able to identify duplicate documents, pictures, programs etc.
Microsoft Windows stores information about the programs you use, the documents and pictures you view, including many other things. Data Destroyer is an utility that securely removes the data content from hard drives or partitions in a manner than can not be undone.
Scan your system NOW with flagship software application Anti- keylogger(TM) for Microsoft® Windows® 95/98/ME/NT/2000/XP and find out if your computer activities are being spied upon! 101 and more licenses - Euro 5.30 for each In order to get these licenses, please send us some document (by Fax - Toll Free - 1-877-AntiSpy or Email - discount@anti-keyloggers.com) to confirm that you are an employee occupied with software test and evaluation for academic institutions, schools or non-profit organizations.
Protect your privacy securely deleting all traces of your activity 77 percent of major U. S. companies record and review employee communications, including e-mail, Internet connections and computer files. American Management Association. Find files list clean-up; Find computers list clean-up; Accounting and other internal documents; Recently used documents history clean-up;
214. BlackBytes Registry for .NET
Applications that add data to the registry should always work within the framework of predefined keys, so administrative tools can find and use the new data. To retrieve data from the registry, an application typically enumerates the subkeys of a key until it finds a particular one and then retrieves data from the value or values associated with it. DetailsDownload trialBuy now ($99.00) Find similar
Vendor: BlackBytes Software & Consultancy, Ltd.
This is an extension to ESRI ArcView 3.x to process graphics and Annotation Features: Find out all the details by reading the product documentation here. Just move annotation themes in the table of contents to change their priority.
Reports can be printed and preview of resulting document is available. Forensic Reports is extremely secure, as final report document is created without the touch of a human, so mistakes are eliminated. Forensic is changing that, with their customized version intended for those forensic agents looking to submit solid proof of the contents of the phone via reports that help them to win the case.
And find which IP address are used and which IP address are free, and find when. content/title of mails could both be set by administrators, and the content could. Contain macro, which can be replaced by other content in real situation.