Search results for 'trace data'.
1569 products found. Showing 1-12 in 10 groups sorted by relevance.
1. Perfect Privacy
Perfect Privacy protects your privacy by eliminating your Internet and offline computer usage traces, such as history lists, address bar drop downs, cache, accessed document lists and other tracks that are stored to your computer as you use it. Eliminate specific file and registry traces. DetailsBuy now ($9.85) Find similar
Platform: Windows 95, Windows NT, Windows 2000, Windows XP, Windows 98, Windows ME
Vendor: Karlis Blumentals
Deciphers Internet Explorer's ever-growing internal history logs. Dat), or searches complete folders and subfolders, or even entire hard disks for traces of browsing activity, in all files, free space, and slack space. Allows to export all data to MS Excel.
Data Destroyer is an utility that securely removes the data content from hard drives or partitions in a manner than can not be undone. Data Destroyer offers you: The remaining data can be easily recovered with data recovery or forensic software.
For advanced debugging you can save the tracedata containing name of the computer, date and time, application name, source file, method name, line number and the description in the database. So you can save all data, which are necessary for debugging in one database.
Data protection for the internet-PC. 4 products in one for the bargain price: surfing anonymously, destroy surfing traces, popup-blocker and data protection functions incl. password- and PIN-Safe with auto-login-function for internet pages!
As a developer it is sometimes difficult to trace and understand all the functionality (i.e. business logic) that fires when the user places a new order, changes an address, etc. LogSequencer generates Sequence Diagrams for these scenarios and it is easy for you to see what methods fire, in which order, and even with what data.
Included in Evidor is Davory and X-Ways Trace. That means it will even find data from files that have been deleted, if physically still existing. Evidor is also an excellent tool for proving the presence or absence of confidential data on computer media, either to detect a security leak or confirm a lack thereof.
Armor Tools will let you work on the computer without leaving traces of your activities - deleting documents, programs, and other files without the possibility to restore them and contains a set of additional adjustments related to safety, system capacity and user preferences.
Protect your privacy securely deleting all traces of your activity 77 percent of major U. S. companies record and review employee communications, including e-mail, Internet connections and computer files. American Management Association. Data destruction methods.
Dupehunter is a unique program to offer tracing specific original documents. Dupehunter Professional offers safety functions protecting you from unauthorized users and from data loss. Wiping of files, secure encryption according to 128 bit AES Rijndael and a high speed data compression are also included.