Home | Submit a file  |  New  |  Categories  |  Our awards  |  Link to us  |  RSS Feeds

Popular search phrases :: R :: reports
Display: short descriptions | full descriptions
  • The Crystal Reports Code-39 Native Barcode Generator is easily integrated into a report by copying, pasting and connecting the data source. It is a complete barcode generator object that stays embedded in the report. Supports the MOD43 check digit and N dimensions of 2, 2.5 and 3.
  • Generate USPS Intelligent Mail (IMb) barcodes as a native formula in Crystal Reports. Implementation is as easy as copy and paste. The barcode is dynamically generated in the report without any dependencies and remains even if distributed. This product includes the ability to create OneCode Service, Confirm Service, Certified Mail Service, Registered Mail Service, and address correction services barcodes.
  • Cigarette smoke slowly rises up and is spread around by the fan as I sit at my desk, filling out damned reports. It's already quite dark, and from the window, through the pouring rain, I could see the neon signs of hotels, bars and shops. I go to the can, and splash burning cold water on my face. I look at myself in the mirror and black eyes and a pale face look back. I was always tormented by the same question, that I speak in a hoarse, dry voi
  • The Native Crystal Reports PDF417 Barcode Generator is easily integrated into a report by copying, pasting and connecting the data source. Includes options to change the error correction mode, N dimension, truncation and number of columns.
  • CDR Analysis is Smart Mobile data Analysis Solutions for Call Records. Easy to trace calls record & reduce time consumption and provide results in short time by using CDR Analysis Software. You will analyze call records, and get various types of desired reports in few minutes. CDR Analysis Software used for investigation/forensic departments like police department, Special Crime investigation Departments etc.
  • Audit and recovery of PostgreSQL passwords. Account information import from databases. Password recovery using dictionary attacks, brute force attacks, hybrid dictionary/brute force attacks. Generation of reports on recovered passwords.
  • Add Data Matrix ECC-200 and GS1-DataMatrix 2D native barcode generation to Crystal Reports without any dependencies. Implementation is as easy as copying and pasting the barcode object into the report making it simple to redistribute reports. Data Matrix barcode generation is ECC-200, ANSI/AIM BC11 and ISO/IEC 16022 specification compliant.
  • Power Spy Lite secretly logs Facebook, Skype, keystrokes, chats & IMs, emails, web visits, video talk, logins, passwords, applications, searches and more. It also takes screenshots like a surveillance camera. Lets you know exactly what they do on a computer screen while you are away. Automatically sends log reports to your email. Starts monitoring with system startup. Runs silently and invisibly.
  • Generate Code-128 and GS1-128 barcodes as a native formula in Crystal Reports, including Code-128 Auto with character sets A, B, C and GS1-128. Implementation is as easy as copy and paste of the embedded barcode object. The barcode is dynamically generated in the report without any dependencies and remains even if distributed.
  • The Crystal Reports Native Barcode Generator is a barcode script that is easily integrated into a report by copying, pasting and connecting the data source. Once installed, no other components or fonts need to be installed to create barcodes, even when it is distributed or accessed from a server. The demo version of this product contains a static barcode that may be used for evaluation purposes only.
  • Audit and recovery of MySQL passwords. Account information import from databases. Password recovery using dictionary attacks, brute force attacks, hybrid dictionary/brute force attacks, precomputed hashes attacks. Generation of reports on recovered passwords.
  • Track your training records, requirements and compliance with Training Manager 2008. Print personnel transcripts and status reports. Assign training to an individual, group, or job role. Require retraining based on time, version, or one time only. Schedule and manage class sessions, attendance, cancellations, and no-shows. Training Manager 2008 is easy to use and you can get started quickly. Visit us at: http://www.kzsoftware.com.
  • Add native QR Code 2D barcode generation to Crystal Reports without any special fonts. Implementation is as easy as copying and pasting into the report. ISO/IEC 18004:2006 specification compliant. Once installed, no fonts need to be installed to create barcodes although it does require a companion UFL included with purchase; it is the complete barcode generator that stays in the report, even when it is distributed or accessed from a server.
  • Audit and recovery of Oracle Database passwords. Account information import from databases. Password recovery using dictionary attacks, brute force attacks, hybrid dictionary/brute force attacks, precomputed hashes attacks. Generation of reports on recovered passwords.
  • Power Spy software secrectly logs Facebook use, keystrokes, website visits, emails, chats and IMs: Skype, Yahoo Messenger and more. Takes screen snapshots at every X seconds like a surveillance camera. Displays exact activities, like Facebook, PC games, online searches & shopping, file transfers and webmails. You can receive reports remotely via emails or ftp. Perfect for monitoring kids, spouse and employees.
  • Quicken does not want your QFX file and reports some strange error? Convert to QIF and import under Quicken easily! Bank, credit card and investment transactions are supported under all Quicken versions. QFX preview is included.
  • Power Spy secretly logs Facebook use, keystrokes, chats, emails, web sites, web cam images, user names, passwords, applications excuted and more. It records IMs in Skype, Yahoo Messenger, ICQ and others. Power Spy runs silently with system startup and automatically sends log reports to your email or ftp. Easy to install and setup. It is widely used in offices, homes, schools, detective agencies and police department.
  • Web Log Explorer is an interactive, desktop-based log analyzer for Windows. This analyzer create "multilevel" and cross-linked reports. It allows you to dig as deep into your log files as you need to. Explore your site, proxy or other logs without any limits! Web Log Explorer supports more than 40 log file formats and can recognize log file formats automatically, extract compressed log files, process multiple log files.
  • Log Analytics Sense is a log analysis/reporting tool for many log including web, media, proxy and ftp logs. This analyzer provides the fastest an interactive, desktop-based log analysis, you can generate and upload to the server highly detailed, easily configurable usage reports in HTML format also you can export data from raw log files to your database, uses ODBC and other.
  • Power Spy (Supports x64/x86) secretly logs all Facebook, keystrokes, chats, emails, web visits, web cam images, user names, passwords, searches, microphone and more. It supports Windows Live Messenger, Skype, Yahoo Messenger, ICQ and other IMs. It sends log reports to your email or ftp. You can check logs on another PC or your cell phone. Perfect for catching cheaters, monitoring employees, children and spouse and even investigating crimes.
  • WMS Log Analyzer visitor activity analysis application for your Microsoft Windows Media Services. Unlike other analyzers, WMS Log Analyzer has been designed especially for analyzing WMS log files and supports the entire set of WMS log file data and provides the best and most complete analysis of these files. This analyzer create "multilevel" and cross-linked reports. It allows you to dig as deep into your log files as you need to.
  • Keylogger Spy Monitor spy software can secretly record all keystrokes typed on your computer. It runs completely invisiblely. You can check logging reports by simply receiving emails or opening a web page. Perfect for catching cheaters, m onitoring employees, children or spouse, acquiring others' passwords and even investigating crimes. Use hotkey to unhide it from Stealth Mode and protect the program access by password.
  • Web Log Explorer is an interactive free, desktop-based log analyzer for Windows. This analyzer create "multilevel" and cross-linked reports. It allows you to dig as deep into your log files as you need to. Explore your site, proxy or other logs without any limits! Web Log Explorer supports more than 30 log file formats and can recognize log file formats automatically, extract compressed log files, process multiple log files.
  • Proxy Log Explorer is the fastest and most powerful analysis application for monitoring the efficiency corporate Internet usage of your Proxy server. This application creates dynamic reports on-the-fly. Also, you can easily get virtually any subreport by just right-clicking the item you need and selecting the subreport you need. Needless to say, it can recognize log file formats automatically and extract compressed log files.
  • Track your training records, requirements and compliance with Training Manager 2016. Print personnel transcripts and status reports. Assign training to an individual, group, or job role. Require retraining based on time, version, or one time only. Schedule and manage class sessions, attendance, cancellations, and no-shows. Training Manager 2014 is easy to use and you can get started quickly. Visit us at: http://www.kzsoftware.com.

Page 1 of 10
1 2 3 4 5 6 7 8 9 10


Legal disclaimer | Privacy policy

© 2004-2017 IT Shareware