Software protects against known/unknown keylogging programs.
Working transparently and silently, Anti-keylogger v7.2 for Windows 2000/XP blocks activity of keylogging programs without use of signature bases. It can buck keylogging programs included in commercial, shareware, freeware products, as well as in Trojan horses and viruses. It keeps spy software from recording and stealing sensitive information, passwords, logins, and PINs.
Read More »Software provides real-time view of business data.
JReport OnDemand Integration, offering out-of-the-box information integration capabilities, addresses demand for embedded reporting and operational business intelligence. It creates unified abstraction layer for data across company, allowing data to be correlated regardless of application origin. Information is presented in customizable reports and charts, and using ad-hoc and interactive...
Read More »SSH Announces Future Plans for Enhanced File Transfer
SSH Tectia(TM) to Deliver Security and Simplicity for Automated File Transfers HELSINKI, Finland and WELLESLEY, Mass., March 14 / -- SSH Communications Security Corp. , a world-leading provider of enterprise security solutions and end-to-end communications security, and the original developer of the Secure Shell protocol, today announced the company's future plans for enhanced file transfer...
Read More »Software provides Internet password management.
Utilizing HMAC-MD5 encryption to generate secure password for every web site based on user's Master Password, 1-Password(TM) provides user with automatic 1-click secure web login, mitigating risks from keyloggers and phishing attacks. It does not employ password database, and does not store user's passwords or encrypted passwords anywhere. Program uses personal email to store and synchronize...
Read More »The Comprehensive Guide to Photo Chemical Machining
There are many benefits that photo chemical machining can provide for your precision components. Download this white paper, and learn everything you need to know about this versatile process.
Read More »CMDB Solution suits multi-platform database environments.
Clarity database automation software functions as Configuration Management Database (CMDB) at database level, and transforms existing database infrastructure into centrally administered and automated data utility. By simplifying repetitive tasks, enforcing standard operating procedures and change management processes, and correlating events for root cause analysis, organizations can increase...
Read More »Software captures keystrokes to encrypted log file.
Suited for networked and personal computers, PC Activity Monitor Net(TM) v6.4.1 captures events such as switching between applications/windows, file and system registry operations, and keystrokes. Invisible and undetectable software saves window content of most chat clients, content of Internet browser window, and mail content. Converted to HTML format, log file can be sent via e-mail or saved to...
Read More »German University Students in North Rhine-Westphalia Use Aladdin eToken for Strong Authentication
CHICAGO, March 7 / -- Aladdin Knowledge Systems (NASDAQ:ALDN), the worldwide leader in Software Digital Rights Management (SW DRM) and USB-based authentication solutions, and a leading innovator in enterprise secure content management, today announced that universities in North Rhine-Westphalia, the most populous state in Germany, have set a new trend regarding data privacy and protection....
Read More »mdnationwide Selects GFI to Boost Business Efficiency Across the Network
GFI suite of products frees up valuable time spent ensuring the smooth running of the network, in addition to allowing mdnationwide to adhere to FSA regulations London, UK, 7th March 2006 - mdnationwide, a remortgage specialist for consumers with poor credit ratings, has selected GFI to increase business efficiency and security. As a leading developer of messaging software, network and content...
Read More »Software facilitates particle image analysis/organization.
VisualSpreadsheetÃ-© organizes images and other data acquired through FlowCAMÃ-® particle analysis instrumentation to facilitate analysis in visual environment based on Excel spreadsheet. It lets users view hi-res digital images of individual sampled particles and access their corresponding data set, which includes size, length, width, shape, fluorescence, and other parameters. Particle...
Read More »Software provides password management and identity security.
Intended for Windows PC users, Password Magic Release 1.03 securely stores logins, passwords, and usernames as well as confidential information such as bank and credit card details within encrypted database and automatically retrieves details to fill out web order forms or complete web logins. Using Blowfish encryption algorithm, program can be used to securely access on-line banking, credit card...
Read More »Standex Engraving Mold-Tech Offers Nickel Shell Capabilities on a Global Scale
Standex Engraving Mold-Tech is the premier, global supplier for mold texturing and surface finishing. With a full range of services, Standex Engraving Mold-Tech is also the only nickel shell supplier producing in three global locations. See our video to learn more.
Read More »