Search results for 'data gathering'.
1564 products found. Showing 1-18 in 10 groups sorted by relevance.
1. Personnel Organizer Deluxe
Personnel Simple: complete database software solution that allows you to maintain data about all your employees in basic form. Our software solution gives you an easy way to gather, organize and manage information about all employees in your company or organization. DetailsDownload trialBuy now ($65.00) Find similar
Platform: Windows 95, Windows NT, Windows 2000, Windows XP, Windows 98, Windows ME, Windows Server 2003, Win95,Win98,WinME,WinNT 4.x,Windows2000,WinXP,Windows2003
Vendor: PrimaSoft PC, Inc.
2. Statspack Viewer Professional for Oracle STATSPACK Utility (1 - 4 Database Licenses)
STATSPACK Viewer Professional utility with easy-to-use graphical interface allows to Oracle DBAs to build graphical trend charts and generate alerts for more than 100 performance metrics for Oracle Server based on performance datagathered by Oracle STATSPACK Utility and for custom statistics defined by database administrator as well. DetailsDownload trialBuy now ($200.00) Find similar
Platform: Windows 95, Windows NT, Windows 2000, Windows XP, Windows 98, Windows ME, Windows Server 2003
Vendor: Statspack Viewer Software
8. Contact Organizer Deluxe
Quickly access your contact data: You can access and view your contact data in virtually any way. Standard Record Viewers allows you to easily enter, and modify contact data, or quickly generate data specific commands. DetailsDownload trialBuy now ($65.00) Find similar
Platform: Windows 95, Windows NT, Windows 2000, Windows XP, Windows 98, Windows ME, Windows Server 2003, Win95,Win98,WinME,WinNT 4.x,Windows2000,WinXP,Windows2003
Vendor: PrimaSoft PC, Inc.
That means it will even find data from files that have been deleted, if physically still existing. Evidor is a particularly easy and convenient way for any investigator to find and gather digital evidence on computer media. Evidor is also an excellent tool for proving the presence or absence of confidential data on computer media, either to detect a security leak or confirm a lack thereof.
Installed on one computer, ANM's powerful technology stores and compares its received data. It lets Systems Administrators gather information from every computer (even Windows 9x/Me computers) on the network without installing server-side applications on any of these computers.
Allows companies to quickly gather summary information from MS Office, Adobe documents and other source documents, and easily move that meta data into XML or post it on shared drives as an HTML documentation catalog index with hypertext links to access files.
DetailsBuy now ($175.00) Find similar
Platform: Windows 95, Windows NT, Windows 2000, Windows XP, Windows 98, Windows ME, Windows Server 2003
Language: English, German, Portuguese, Spanish, French, French English Portuguese German Spanish
Vendor: Soft Experience
Will read this template and insert all datagathered from the device. Forensic starts gathering all possible data from the mobile phone, then generates an extensive report that can be stored or printed. All blocks of data like phonebook are protected by MD5 hash algorithm.
You will benefit from our long experience gathered with its predecessor programs and in the development of the current version. Dupehunter Professional offers safety functions protecting you from unauthorized users and from data loss. Wiping of files, secure encryption according to 128 bit AES Rijndael and a high speed data compression are also included.
The result will be gathered and displayed in the list. You can go back or forward when browsing, you can add keys to the favorite, and you can edit the data of key value here. The comment for each item in the list will tell you where the key words are found, in key name, in value name, or in value data.
Login King does NOT send any data to anywhere by any means whatsoever. Spyware is software that is installed deceptively to gather information about you without your knowledge. Login King secures your saved login data with a powerful and proven encryption algorithm (AES-256), ensuring that only authorized users with the correct PIN number may access it.