Search results for 'protect most sensitive data'.
2742 products found. Showing 12-27 in 10 groups sorted by relevance.
12. MetaReport (site license)
MetaReport allows you to build any reports: from simple data retrieval to complex professional reports. MetaReport supports mostdata source formats: Access, dBase, Paradox, MS SQL, Oracle, InterBase and others. Locking the report designer allows to protect ready report projects from an unintentional change by an inexperienced user. DetailsDownload trialBuy now ($1,500.00) Find similar
Platform: Windows NT, Windows 2000, Windows XP, Windows 98, Windows ME, Windows Server 2003
Vendor: Metamatica Software
Wouldn't it also be great if you could just surf to any password protected sites and have your web accounts details filled in automatically for you? AES-256 is a FIPS-approved, military grade symmetric encryption algorithm that is used by U.S. Government organizations (and others) to protectsensitive information.
Store an unlimited amount of sensitive details, including: Online banking login's, URL's, memo's, credit card numbers, and internet passwords in the safely packed away hacker-proof data file, on your own computer. This means, that if you ever need to re-install the software, for whatever reason, you can goto the most recently created backup file, copy it to your PasswordGuard directory, and the program is just how you left it.
15. Setup Factory 7.0
Setup Factory 7.0 is the most important release in years. Of course, everything can be customized and overridden if you wish, but for most projects the improved Project Wizard can handle it all with just a few clicks. The language also supports conditions, loops, arrays, functions and everything else you'd expect, including color syntax highlighting and context sensitive help. DetailsBuy now ($395.00) Find similar
Platform: Windows 95, Windows NT, Windows 2000, Windows XP, Windows 98, Windows ME, Windows Server 2003
Language: English, German, Portuguese, Spanish, Italian, French
Vendor: Indigo Rose Software
All blocks of data like phonebook are protected by MD5 hash algorithm. All items are also protected against later modifications by hash code used in digital signatures. Some of the most incriminating evidence used against criminals exists in their mobile phones, yet getting that evidence to stand up in court has been a battle.
An advanced tool for everyday and emergency use: Inspect and manipulate all kinds of files, recover deleted files or lost data from corrupt hard drives or digital camera cards. Data interpreter, knowing 20 data types. Erase (wipe) confidential files securely, hard drive cleansing to protect your privacy.
18. PlayBasic
Keyword sensitive indent. Keyword sensitive help system. Reopen most recently used files window (lists up to 20 files). Language Data Types: Embedded Data statements. Resize arrays in real time without loss of data. DetailsDownload trialBuy now ($34.95) Find similar
Platform: Windows NT, Windows 2000, Windows XP, Windows 98, Windows ME
Vendor: Underware Design
19. Job Designer MultiUser
Password-protect your data with user level access control. Design custom document lay outs in any RTF (Rich text) -compatible word processor package (most popular word processors are), enabling you to add logos or additional text with ease. DetailsDownload trialBuy now ($149.00) Find similar
Platform: Windows 95, Windows NT, Windows 2000, Windows XP, Windows 98, Windows ME, Windows Server 2003
Vendor: Acvatec Software
Data protection for the internet-PC. WINSWEEP, with immediate effect, protects your privacy! Always the fastest and most up to date proxy servers available. Way beyond 24.000 servers such as DoubleClick, to name just the most prominent, will be blocked.