Dupehunter Professional is an innovative search program to identify duplicate files on personal computers or in a network. The Dupehunter package is complemented by an excluded files list and the option of specific selection of single files in the result tree.
39. DemoCharge, standard edition
Create animated emails, documents and Help files by replacing static screenshots with GIF animations recorded by capturing your desktop. Webmasters can spice up their Websites with animated content, tips and tutorials. DemoCharge allows you to capture screen activity to create animated demos and content for the Web, emails, tutorials, presentations, training materials, product documentation, support forums, and knowledge base articles. DetailsDownload trialBuy now ($99.95) Find similar
Platform: Windows 95, Windows NT, Windows 2000, Windows XP, Windows 98, Windows ME, Windows Server 2003
Vendor: YesSoftware, Inc.
If you need to restore just one or a bunch of files from backup image file you don't need to restore the whole disk, you can easily browse the contents of image file just like any other drive, read and copy any number of files or folders from the image.
DetailsDownload trial (Full version: 9 MB) Buy now ($24.95) Find similar
Platform: Windows 95, MS DOS, Windows NT, Windows 2000, Windows XP, Windows 98, Windows ME
Language: English, German
Vendor: Paragon
41. kkHTMLEditor
TextDocumentBody: retrieves the plain text from the document without HTML-tags. SetHTMLStyleFromFile (strCSSFile). SetHTMLBaseURL (strRootpath)' Optional: Load CSS-File for formatting. HTMLDocument: contains the entire HTML-file inclusive of the -tag. DetailsDownload trialBuy now ($139.02) Find similar
Platform: Windows 95, Windows NT, Windows 2000, Windows XP, Windows 98, Windows ME
Language: English, German
Vendor: K&K Software AG
42. PC Spy Monitor (Professional Edition) (1-10 copies)
Program executed - Monitor and record all programs including application, executable file,documents and directories navigated with time, operation, application name (application, document, directory names with their file paths). DetailsDownload trialBuy now ($39.99) Find similar
Platform: Windows 95, Windows NT, Windows 2000, Windows XP, Windows 98, Windows ME, Windows Server 2003
Vendor: eMatrixSoft
The source files (Defs) within the zip samples have already been compiled to *. class files; both files are situated in the same subdir after unraveling the respective archive. Defs source file). File name of the application: Sim_v1_0_Main.
DetailsDownload trialBuy now ($20.85) Find similar
Platform: Windows 95, Unix / Linux, Platform independent, Windows NT, Windows 2000, Windows XP, Windows 98, Windows ME, Mac OS X, Windows Server 2003, Standard-Java
Language: English, German, Bilingual: English and German
Vendor: Henrik Pagenkopf
Forensic Reports generator based on templates (universal.rtf file you have the fully control over te resulting report: data it includes, its formatting). Full phonebook, SMS folders and file system of supported mobile phones can be part of the generated report including its MD5 hash to allow simple check of data changes.
Such activities involve deletion of system files, unauthorized altering the contents of user documents, etc. Txt files). Safe'n'Sec effectively protects computers against hacker attacks that exploit vulnerabilities existing in the Windows OS and sophisticated software to break the system integrity, access user data, execute malicious code, etc. Safe'n'Sec monitors all file operations, changes in the system registry, the status of OS processes, etc.
O A modeling of the array of arguments is defined in text file on the base of active statistical scheme with the option to sort results and save in text file. O There is an option to instantly create a MS Word document with a picture and results reflected to the content of chart screen and content result control.
256-bit AES-file encoding. WINSWEEP now even removes index-files (index. With strong cryptography you can comfortably encode files or complete directories. While deleting and destroying data WINSWEEP uses a 7-level process adapted to the specifications of the DoD-document 5220-22-M, National Industrial Security Program Operating Manual (American Ministry of Defense).