|
||||||
|
||
|
Home > Magnetic software |
Related keywords: Magnetic Ink Character Recognition, magnetic stripe |
|
|
21. | Eraser 5.3 (tolvanen.com) | ||
based on Peter Gutmann's paper "Secure Deletion of Data from Magnetic and Solid-State Memory" and they are selected to effectively remove the magnetic remnants from the hard disk. Other methods include the one defined in the National Industrial Security Program Operating Manual of the US Department of Defense and overwriting with pseudo-random data. You can also define | |||
Updated: 9, 2005 | Rating: 0 | Author: Sami Tolvanen | Size: 750 kb | Freeware Go to category: System Utilities > File & Disk Management Similar programs | |||
22. | FingerPoint 1.4 (neurotechnologija.com) | ||
identity are needed. It allows to avoid using of paper documents or magnetic cards, which can be lost, stolen, forgotten, etc. Demo version allow enroll only 10 persons. For more information please contact us or review our Web Site. FingerPoint is an end user software package for person identification using his/her fingerprints as a unique | |||
Updated: 9, 2005 | Rating: 16 | Size: 8012 kb | Demo Go to category: System Utilities > Other Similar programs | |||
23. | Mutilate File Wiper 2.92 (mutilatefilewiper.com) | ||
recovery techniques, EVEN WHEN OVERWRITTEN, by analyzing latent magnetic traces. Mutilate File Wiper is a file shredder or file eraser that securely deletes sensitive files. Use Mutilate to prevent attempts to recover sensitive deleted files from your hard drive by data recovery or forensic software. The program overwrites all bits in selected files, including cluster slack | |||
Updated: 9, 2005 | Rating: 82 | Author: Craig Christensen | Size: 823 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
24. | RPN Engineering Calculator 6.3.2 (j-a-associates.com) | ||
of transformers and inductors with many built in functions unique to magnetic component design.Trig; solves Arc Length, Right Triangle, and any Defined Plane Triangle problems, also computes the trig functions, as well as some hyperbolic functions. Converts Radians to Degrees, and Hours, Minutes | |||
Updated: 2, 2006 | Rating: 0 | Author: Jim Allen | Size: 1466 kb | Shareware Go to category: Business > Calculators & Converters Similar programs | |||
25. | YukonSoft E-Business Solutions (Y.E.S.!) 7.00.0003 (yukonsoft.com) | ||
Easily and Affordably Upgrade your business, in-store & on-line, with Y.E.S.! version 7.0 Y.E.S.! enables you to grow your business internationally, without sacrificing the ease of use and cost effectiveness that has long been the staple in the Y.E.S.! product line. You will offer your products worldwide | |||
Updated: 9, 2005 | Rating: 0 | Author: Stanley Siegel | Size: 115559 kb | Shareware Go to category: Web Development > E-Commerce Similar programs | |||
26. | CPS Plus 1.11 (programbl.com) | ||
acquisition software enables serial devices like bar code scanners, magnetic stripe readers, gages, electronic scales, sensors, laboratory instruments and modems to communicate with any Windows application. Supports Com1 to Com8, even multiple serial ports simultaneously! Create charts and graphs in your applications that automatically update with data from your serial devices / | |||
Updated: 9, 2005 | Rating: 0 | Author: Ljubisa Knezevic | Size: 760 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
27. | WinConverter 2.1 (volny.cz) | ||
Field, Inductance, Linear Current Density, Linear Charge Density, Magnetic Flux, Magnetic Flux Density, Magnetomotive Force, Resistance, Resistivity, Surface Current Density, Surface Charge Density, and Volume Charge Density. WinConverter is a unit conversion program. The version 2.1 is | |||
Updated: 9, 2005 | Rating: 42 | Author: Petr Wagner | Size: 874 kb | Shareware Go to category: Business > Calculators & Converters Similar programs | |||
28. | Mutilate File Wiper 2.92 (home.att.net) | ||
recovery techniques, EVEN WHEN OVERWRITTEN, by analyzing latent magnetic traces. Mutilate securely deletes sensitive files. Use Mutilate to prevent attempts to recover sensitive deleted files from your hard drive by data recovery or forensic software. The program overwrites all bits in selected files, including cluster slack space, with binary 1's, 0's, and/or random bit | |||
Updated: 9, 2005 | Rating: 0 | Author: Craig Christensen | Size: 824 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
29. | MICR Font Set 3.4 (micrfonts.com) | ||
can be done on any laser printer, provided you purchase a special magnetic toner cartridges for it. Note that MICR printing must be exceedingly accurate. This package includes a number of variations of the MICR font (E-13B), plus instructions and calibration routines to ensure the checks you print will work at your bank. This is the only MICR font set you will find that comes with an | |||
Updated: 2, 2006 | Rating: 0 | Author: Gary Elfring | Size: 1166 kb | Demo Go to category: Business > Accounting & Finance Similar programs | |||
|
Home > Magnetic software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|