Блиц Акт 2.0 Программа составления актов, приказов, постановлений
Integro 1.33 Создание произвольных кросс-отчетов на любых источниках
25 мая 1925 г. родился Джон Кок (John Cocke) - ученый-информатик, специалист в области оптимизирующих компиляторов и теории кодирования, изобретатель RISC-архитектуры. Получил 22 патента на изобретения в области компьютеров.
Описание: Data Nuker. When you delete a file from Windows it just mark the file as deleted in file allocation table, but the data of the file is still on your hard disk, Windows does not physically remove deleted files from your hard disk. Emptying your Recycle Bin does NOT protect you at all. Your sensitive files can be recovered, even after you format your hard disk! This powerful program helps you shred important files & folders so that they cannot be restored & prevent attempts to recover sensitive deleted files from your hard drive by data recovery or forensic software. Shredder allows you to purge, wipe & erase data with methods that far exceed US Department of Defence standards for file deletion (DOD 5220.22). Easily automate the cleaning process with batch files, shortcuts and scheduler. Completely remove sensitive data from your hard drive by overwriting it several times with carefully selected patterns. Overwrites all bits in selected files, including cluster slack space, with binary 1’s, 0’s, and/or random bit patterns. Supports complete folder deletions including subfolders. Shreds disk free space so you can even use shredder to destroy previously deleted files on your hard drive. Drag & Drop files or entire folders Delete even if the file is locked! No trails are left of any compromising or confidential information. Easily choose the number of overwrites according to your security ambitions. The higher the number the less the probability that even finest magnetic tracks could be detected. The Department of Defense (DOD 5220.22-M) recommends seven passes for top security. You can also shred files by right-clicking on them from the MS Windows Explorer or on the recycle bin and selecting the shred item on the popup context menu.
Mobile Phone Data Recovery Cell Phone Forensic Software - Mobile phone inspection program can show the complete cell phone configuration information and generate as well as report that information in interactive text format. Detailed information can include phonebook, SMSs, manufacturer, memory status, IMEI numb
Recover My Files Data Recovery Software 3.98 - Recover My Files Data Recovery Software is a powerful data recovery and file recovery utility. Recover deleted files, including DOC, XLS, JPG, digital camera photos, ZIP, RAR, DBX, PST, email, MP3, MPEG and more. The demo includes a FREE Preview of delete
Wipe Expert - Erase all traces of Internet & system activity using advanced algorithms. Only simple file erase is not secure. Even if you overwrite files anyone can recover them using special hardware & software technology. Use Wipe Expert to delete files forever.
File Shredder Pro - File Shredder Pro - file shredder software for Windows to shred files, folders, shred free space, shred files in the Recycle Bin. Shred deleted files. 14 built-in shredding algorithms: Peter Gutmann, US DoD, B Schneier, etc. Explorer integration
Data Mining (+CD). Учебный курс - Data Mining — это процесс обнаружения в сырых данных ранее неизвестных, нетривиальных, практически полезных и доступных интерпретации знаний (закономерностей). В книге
Safe File Shredder and Mover, Erasing Traces - Did you know that the deletion of a file didnt actually erase it, and, instead, the deleted file was just moved to a garbage folder? Did you know also that even when the garbage folder known in Windows as «Recycle Bin» was «cleared», the «deleted» file still
Disk Doctors' Undelete - a reliable remedy for the problem of deleted files - Few things can be more frustrating in your communication with your PC than seeing important documents deleted with no obvious way to recover them. This can happen due to a number of reasons, starting from your children’s unintentional actions to virus attacks. However, if you think that any deleted file