Storing confidential corporate data on expansion cards may be a space saver, but it is also a security threat since the cards are small and easily lost or stolen. Secure Card expands our PDA Secure line to ensure that data stored on expansion cards can not be breached by unauthorized parties.
Evidor is also an excellent tool for proving the presence or absence of confidentialdata on computer media, either to detect a security leak or confirm a lack thereof. Evidor can be used on site for electronic discovery, will not disclose irrelevant proprietary or confidential information and does not impose an undue burden on the responding party in terms of personnel, time and money.
Hide Files is powerful file security program. Lock folder feature allows to prevent access to confidential files via MRU feature (e.g. list of Most Recently Used documents in MS Office applications). Hide Files is very useful to keep your personal data away from others.
19. DC Data Entry Validator
DC.DataEntryValidator is a COM based component that allows you to Validate your data entry and restrict it to predefined type (Numeric-Alphabetic-AlphaNumeric-Date-Decimal) or to your defined DC.DataEntryValidator will Notify you with red forecolor when your entry is not proper, so there is some thing wrong with data entry in that Textbox DC.DataEntryValidator will Format data by define decimal places for numeric entry, or define letter case for charactes entry. DetailsDownload trialBuy now ($29.00) Find similar
Platform: Win CE / Pocket PC, Windows NT, Windows 2000, Windows XP, Windows 98, Windows ME, Windows Server 2003, XP Tablet PC
Vendor: EgyFirst Software ,Inc
20. Fragmentator (Data Compiler)
Represents textual content as a set of objects, - fragments. The Base text can be either attached to the Code file, or integrated into it. A special Code describes a position of required fragments in the Base text, e.g., words #10-100. DetailsBuy now ($15.00) Find similar
Platform: Platform independent
Language: Java application
Vendor: Sergiy Beloy
Data destruction methods. You deleted multiple files with confidentialdata on your computer -- are you sure these deleted files are gone? The mass media and the Internet are full of stories about used computers being sold with hard disk drives containing confidentialdata:
22. AGS SQL Data Assistant
AGS SQL Data Assistant is a program designed to help you as a DBA manage and check the data integrity of your database. AGS SQL Data Assistant is a tool designed to make your life as a DBA easier. Validate data integrity on multiple database systems. DetailsDownload trialBuy now ($299.00) Find similar
Platform: Windows NT, Windows 2000, Windows XP, Windows Server 2003
Vendor: A & G Software
On this disk you can store confidential information which you'd like to keep secret from other users. The disk is encrypted by 256-bit (32 symbols) password using AES256 algorithm in real-time mode (this ensures steady protection of your data against hacking).
24. CTL RS232
You can vae the program send some data on a regelur (timed) base, or you can make the program react (trigger) to certain received data. You can send any data in any baudrate and receive and display any data in any baudrate. DetailsDownload trial (Demo: 925 KB) Buy now ($100.09) Find similar
Platform: Windows 95, Windows NT, Windows 2000, Windows 98, Windows ME
Vendor: JvdW pc Applicaties
25. Data Questor Data Questor is one of the fastest known website downloaders and data extractor available today. Data Questor is essentially a data search robot and is designed for fast-track navigation through the hyperlinks of cyber space, extracting data and downloading web pages at the user's request. DetailsDownload trial (Full version: 579.5 KB) Buy now ($59.95) Find similar
Platform: Windows 95, Windows NT, Windows 2000, Windows XP, Windows 98, Windows ME
Vendor: InternetSoft Corporation