Search results for 'eliminate sensitive data'.
1657 products found. Showing 97-111 in 10 groups sorted by relevance.
97. ISAX Modbus RTU Master ActiveX
Communication speed has been further increased, eliminating any delay between master request and slave response. Buy now button has been added to license screen. Added methods for reading/writing 32-bit data types (both long integer and floating points data), with word/byte swap, in order to enhance the flexibility of the driver. DetailsDownload trialBuy now ($62.56) Find similar
Platform: Windows 95, Windows NT, Windows 2000, Windows XP, Windows 98, Windows ME
Vendor: ISAX
98. TrueUpdate 1.0
As a self-contained, standalone executable, TrueUpdate can be used to update any electronic content, from software applications to time sensitivedata such as product catalogs, spreadsheets, financial information, sales figures and budgets. DetailsBuy now ($395.00) Find similar
Platform: Windows 95, Windows NT, Windows 2000, Windows XP, Windows 98, Windows ME
Vendor: Indigo Rose Software
Forensic Reports is extremely secure, as final report document is created without the touch of a human, so mistakes are eliminated. Will read this template and insert all data gathered from the device. All blocks of data like phonebook are protected by MD5 hash algorithm.
100. Setup Factory 7.0
The language also supports conditions, loops, arrays, functions and everything else you'd expect, including color syntax highlighting and context sensitive help. Setup Factory is smart enough to maintain your folder structure, automatically query version resource information, create shortcut icons and ensure 100% data integrity with reliable CRC-32 checking. DetailsBuy now ($395.00) Find similar
Platform: Windows 95, Windows NT, Windows 2000, Windows XP, Windows 98, Windows ME, Windows Server 2003
Language: English, German, Portuguese, Spanish, Italian, French
Vendor: Indigo Rose Software
Security suite to protect data against new threats and intrusions. Detection and elimination of known threats Safe'n'Sec detects known malicious code such as viruses, Trojans, and worms and eliminates them, using the antivirus databases from well-known antivirus software vendors.
107. PlayBasic
Keyword sensitive indent. Keyword sensitive help system. Language Data Types: Embedded Data statements. Resize arrays in real time without loss of data. Source Inspector lists psubs, functions, types, global variables, constants and data lines Messages displayes error messages and search results. DetailsDownload trialBuy now ($34.95) Find similar
Platform: Windows NT, Windows 2000, Windows XP, Windows 98, Windows ME
Vendor: Underware Design
AES-256 is a FIPS-approved, military grade symmetric encryption algorithm that is used by U.S. Government organizations (and others) to protect sensitive information. Login King does NOT send any data to anywhere by any means whatsoever.
109. DC Help Authority
DC.HelpAuthority is a COM based component that allows you to assign a sensitive help for every control in within your form or even every column in your grid DC.HelpAuthority may be used with any developing language support COM based application like Visual Basic, Visual C++, Borland C++, Delphi and others.. EgyFirst has done a lot of work for you. Now you can develop your application and make it comprehensive by supporting it with your sensitive help. DetailsDownload trialBuy now ($29.00) Find similar
Platform: Win CE / Pocket PC, Windows NT, Windows 2000, Windows XP, Windows 98, Windows ME, Windows Server 2003, XP Tablet PC
Vendor: EgyFirst Software ,Inc
110. Mah-Jongger
MAH-JONGGER is similar to the ancient Chinese game of Mahjongg. The goal of the game is to eliminate all tiles on the board by matching pairs of free tiles. DetailsBuy now ($19.95) Find similar
Platform: Windows 95, Windows NT, Windows 2000, Windows XP, Windows 98, Windows ME
Vendor: Alexander Militsin