Search results for 'data deletion user'.
3751 products found. Showing 38-48 in 10 groups sorted by relevance.
38. PlayFitness
From a menu of sporting activities, users enter data on their sports-play duration and intensity. Charting shows user fitness trend. DetailsBuy now ($12.95) Find similar
Platform: Windows 3.1x, Windows 95, Windows NT, Windows 2000, Windows 98, Windows ME
Vendor: HWLData Ltd
JRStegano are using Steganographie and Kryptographie as data hiding techniques. Supports user password for decrypting and encrypting datas. A optional user password builds a perfect security data file inside the picture.
SecureCard - Secure Card provides users with options for encrypting a single or multiple files, or the entire card. The data can be encrypted on Palm and send to users on Pocket PC or Windows and allow them to decrypt or encrypte it in those devices as long as the user is authorized to do so.
TFlyTreeView Features and abilities · Displaying Data TFlyTreeView stores all nodes in memory, but data for cells connected to each node retrieved to translate and display through OnGetNodeData event. · Data Validation All Data after editing retrieeved by tree through OnValidateNodeData, on this event user can process data for validation, translation and storing.
SecureCard - Secure Card provides users with options for encrypting a single or multiple files, or the entire card. The data can be encrypted on Palm and send to users on Pocket PC or Windows and allow them to decrypt or encrypte it in those devices as long as the user is authorized to do so.
44. CryptoExpert 2004 Professional
CryptoExpert uses an on-the-fly encryption system to encrypt and decrypt data. Any data that the user attempts to write to this drive is intercepted by CryptoExpert, encrypted, and written to the volume file. The CryptoExpert system mounts a volume file to create a virtual drive that appears to applications and users like any other physical drive. DetailsDownload trialBuy now ($59.95) Find similar
Language: English only
Vendor: SecureAction Research,LLC
The user can read and delete his data, but writing is not possible. When user deletes data, in order that the directory usage falls under specified limit, he gets all the write access back. If a specified user exceeds the directory usage limit, all write processes will be prevented for them.
Which will effectively save users' time and bandwidth from being wasted unnecessarily. With easy-to-use user interface design, you may get it up and running within 5 minutes after installing. Deletion/bouncing of spams with a single click away.
The Professional Edition allows you to encrypt data for any application, including GoldMine, ACT, Palm Desktop and others. Two users account; One Admin account and one user account. Secure any data on any Desktop and Laptop.
DataTron is an easy-to-use visual data base with the possibility of the integration of picture-, sound-, video-, email-, link-, pdf-, rtf-, doc-, xls- files etc. Data fields can be positioned by the mouse. Data base knowledge ist not necessary, the user has no long training periods.