Search results for 'offer auto-fill data'.
2265 products found. Showing 1-12 in 10 groups sorted by relevance.
1. Secret Explorer Std
This new system inspection/maintenance tool allows exploring Windows Protected Storage that contains a lot of hidden data such as internet passwords. This includes form auto-filldataoffered by Internet Explorer every time you enter something into an form on a web page; passwords to websites with limited access; MS Outlook account and identity passwords, dial-up passwords and other data stored by Microsoft in Protected Storage. DetailsDownload trial (Demo: 300 KB) Buy now ($39.00) Find similar
Platform: Windows 95, Windows NT, Windows 2000, Windows XP, Windows 98, Windows ME, Windows Server 2003
Vendor: LastBit Software
3. Sales Data Browser
The software offers filter functions, statistic functions, search functions, calculation functions, print mode etc. and is very easy to use. It is able to extract both all needed data from registration notifications and ShareIt! Simply import a complete data list or extract a record from Windows' clipboard with only one mouse click. DetailsDownload trialBuy now ($22.50) Find similar
Platform: Windows 95, Windows 2000, Windows XP, Windows 98, Windows ME
Vendor: Michael Brick
DataTron is an easy-to-use visual data base with the possibility of the integration of picture-, sound-, video-, email-, link-, pdf-, rtf-, doc-, xls- files etc. Data fields can be positioned by the mouse. An internal language offers the possibility of interlocked inquiries and computations.
This program offers comprehensive spectral analysis of real time or pre-recorded audio. A Peak Detector offers 12 user programmable frequencies to evaluate an audio file. A precise Snyc to loop feature offers documented peak frequency analysis.. A built-in generator monitors the balance between input and output.
6. Serial-Mails
The program offers you a typical newsletter design as template. For fast sending of non personalized mails the program offers the sending as Blind Carbon Copy. Import the list of address from a DBF data base or a txt or csv file. DetailsDownload trial (Full version: 649.1 KB) Buy now ($29.00) Find similar
Platform: Windows 95, Windows NT, Windows 2000, Windows XP, Windows 98, Windows ME
Vendor: CAD-KAS GbR
ODBC Explorer is an easy-to-use database tool for Win32. It offers many powerful features for database administrators and programmers. Using ODBC Explorer you can easy navigate through the ODBC data sources on your computer, view and modify any data and SQL scripts etc.
AngularSync offers Real-Time distributed replication of data and file systems across multi-platformed environments. In particular Passive Server offers the following: Consistency check to assure data reliability.
DetailsDownload trialBuy now ($149.00) Find similar
Platform: Unix / Linux, Other systems, Platform independent, Windows NT, Windows 2000, Windows XP, Mac OS X, Windows Server 2003
Vendor: Angularis
10. abylon CRYPTMAIL
Sending never again unencrypted emails. With abylon CRYPTMAIL offer abylonsoft a simple software for certificate based encrypting (PKCS-standard) of your secret data. Additionally offer abylonsoft an user interface to create SME-files. DetailsDownload trialBuy now ($21.63) Find similar
Platform: Windows NT, Windows 2000, Windows XP, Windows 98, Windows ME
Language: English, German, Spanish
Vendor: abylonsoft - Dr. Thomas Klabunde GbR
11. Data Questor Data Questor is one of the fastest known website downloaders and data extractor available today. It offers numerous settings and options to facilitate this task. Data Questor is essentially a data search robot and is designed for fast-track navigation through the hyperlinks of cyber space, extracting data and downloading web pages at the user's request. DetailsDownload trial (Full version: 579.5 KB) Buy now ($59.95) Find similar
Platform: Windows 95, Windows NT, Windows 2000, Windows XP, Windows 98, Windows ME
Vendor: InternetSoft Corporation
Data Destroyer offers you: Data Destroyer is an utility that securely removes the data content from hard drives or partitions in a manner than can not be undone. The remaining data can be easily recovered with data recovery or forensic software.