» Can my company use the Data Parse Free Edition?
» Can you brand our company logo onto Data Parse?
» Where can I find a "cracked" version of your program?
» What options are there for Federal & State government purchases?
» What is your upgrade policy?
» If I send a File in a password-protected ZIP File, is it safe?
» Can I protect myself by sending you fake sample data?
» If I send you a File, will it be safe on your computers?
Here are answers to the aforementioned questions, organized by topic.
Answers: Downloadable Software
Is Data Parse Free Edition "freeware"?
This product can be used free of charge, if you use only the basic functions. Many conversions can be performed this way. If, however, you require more conversion power, you will probably need a Data Parse Basic, Business or Enterprise license.
Click here to open a new window describing the Data Parse Basic Edition, or consult the documentation that accompanies our products.
You may also review the following grid that lists the differences between the versions.
Is there a Macintosh (Mac) version of Data Parse?
There is no native version of Data Parse for the Macintosh, however you can run the software under Apple's Boot Camp or Parallels Desktop for Mac.
I can't get my script to work. Can you fix it?
You are welcome to post in the support forum or email us directly with any questions.
Can my company use the Data Parse Free Edition?
Can you brand our company logo onto Data Parse Enterprise?
Yes, we can.
At the top of the Parsing Parameters screen on Data Parse is a large banner. Some companies like to have their own banner in this spot; this is known as "branding".
This does not, of course, reassign copyright or distribution rights; the programs are still National Data Parsing Canada Corporation products. Nonetheless, this branding service is welcomed by large companies (who like their software to reflect their corporate image) and consultants (who wish to remind their clients who wrote the scripts).
If you wish to brand your program, please contact us, describing the details of your requirement and attaching a copy of the logo you intend to use (so we can include it in the branded installation package).
Where can I find a "cracked" version of your program?
We apologize for including this in the FAQ, but some people actually do enter this sort of query into search engines. We believe we should warn them about the dangers they face.
Is it worth the risk? Some "crack" sites offer a "registered" (i.e. purportedly pirated) version of the software that is actually a "trojan horse" (definition). Such programs are not always detected by anti-virus programs since they are not actual viruses. Yet they can let the pirate take over your computer, transmit or corrupt your Files, or even erase your hard disk.
Consider this: if the crackers have already been tinkering with the program, or generating an illegal registration or unlock code, how likely is it that they have your best interests at heart?
If you practice safe computing, you'd best avoid "cracks", "warez" and "keygen" sites. Even visiting the sites can expose you to "sploits" (exploits), which attempt to take over your web browser.
What options are there for Federal & State government purchases?
We offer special reduced pricing and options for Federal & State government users and purchasers. Please email us for more information and to receive our special pricing grid.
» What is your upgrade policy?
Data Parse Basic Edition customers may upgrade, after their one year of free upgrades, via our existing client discounted price. Click here for current pricing.
Business and Enterprise also come with one year of upgrades. Before the one year anniversary of your purchase, you must purchase a Service Renewal in order to continue to receive free updates. To purchase a a Service Renewal, click here.
Answers: Privacy and Security
If I send a File in a password-protected ZIP File, is it safe?
Password-protected ZIP Files are not perfectly secure, but with a sufficiently long password they can be moderately safe.
A fast password-cracking program can try about 150,000,000 passwords per second on a single 10 GHz computer. So assuming your password uses a mix of lowercase letters and numbers (for example: r39xe1fgx) and the password-cracker knows that you have restricted yourself in this way, then these are the results we see...
|Password Length||Typical Time to Decrypt|
|7 characters||4 minutes|
|8 characters||3 hours|
|9 characters||4 days|
|10 characters||150 days|
|11 characters||300 years|
|12 characters||12000 years|
If you use numbers plus a mix of uppercase and lowercase characters (for example: R39Xe1fGx), the results are like this:
|Password Length||Typical Time to Decrypt|
|7 characters||2 hours|
|8 characters||5 days|
|9 characters||20 years|
|10 characters||1,000 years|
|11 characters||50,000 years|
|12 characters||3,000,000 years|
These calculations are based on the assumption that a "brute force" search for your password will not produce a false match. Without a deeper analysis, it would probably be best to assume that a password can be cracked in about one tenth of the time shown in these tables. In other words, the tables show the approximate magnitude of the cracking task in each case.
Under no circumstances should you ever use an ordinary word (such as "Elephant") as a ZIP password. These are easily cracked, using what is known as a "dictionary" attack.
If the cracker has access to a copy of one of the original Files in the ZIP File, a "full plaintext" attack is possible, which can decrypt the ZIP instantly. To avoid plaintext attacks of any kind, you should not include any Files that contain text whose presence is fairly predictable. For example, if there was a File in the ZIP named "Letter.txt", it would be reasonable to assume that it starts with the text string "Dear" (or some variation thereof).
Of course, if you write your password down and tape it to your computer's monitor, or send it in an email, the entire encryption process can become a pointless exercise. Any passwords you have should be kept in a very secure place, away from prying eyes.
The obvious question at this point is: how does one convey the password to the person who is supposed to have it? Sending it in an earlier email is rather risky, and putting it in an encrypted ZIP File simply makes the problem circular. However, it is reasonable under most circumstances to tell the person the password on the phone — provided that both people are on land-lines. That means: no cell phones, no radio phones.
For added security, the password could be divulged gradually over the course of several different phone calls. However, this might actually be more risky if the person at the other end is writing it down on a piece of paper which is left lying on his or her desk between calls.
If, after reading the information above, you consider that sending a File in a password-protected ZIP File simply isn't safe enough, you could use a high quality public-key encryption program. However, some people find these difficult to use. Another alternative is to send the File on a CD-ROM via a bonded courier.
Can I protect myself by sending you fake sample data?
If you want us to assess your input Files, you can certainly protect the data itself by sending us fake data. However, this can end up costing you time and money.
Creating truly representative fake data is a task best left to a data conversion specialist. When we create demo input Files for our applications, we will use fake data if the information is confidential. However, we will know how to make the data reflect real input data because by that time we will have studied the original input Files.
When a non-specialist creates fake data, they can omit important variations or even drastically change the format of the data itself. For example, if the original input File contains some spurious "Carriage Return" characters and you load it into a text editor, it will probably be saved with all of the extraneous characters converted to "Carriage Return and Linefeed" pairs.
For the reasons listed above, we suggest that our clients send us real data if possible.
If I send you a File, will it be safe on your computers?
Security is very important to us. We protect our installation with a firewall and anti-virus software, applying patches and upgrades as they become available. Our operating system software is similarly kept up to date.
We avoid the standard email and browser programs — the main focus of crackers — choosing instead to work with products that we consider reliable and secure. We regularly review and identify the processes running on our computers. Our system registry is scanned and cleaned frequently, and we routinely perform anti-spyware checks. We scan any executable we download or receive via email — even if it appears to come from a trusted source.
We have implemented special measures to safeguard the physical security of our installation. For obvious reasons we can not specify the nature of these measures.
The informal answer: We have been in the technology consulting for many, many years, so we have been party to gigabytes of confidential information. We guard it as jealously as if it was our own.
The formal answer: We do not require registration to use this web site. In some cases we are able to determine how a visitor arrives at our site, but the only information this reveals is the IP address, originating web page and search term, if any.
Information garnered from email (e.g. email address) is considered company confidential. We do not engage in unsolicited bulk mailing. In rare cases we may broadcast to our clients, but this is done only in exceptional circumstances.
We do not share client contact information with anyone except subcontractors who have a legitimate need to know. We do not give out contact information to potential clients asking for references. While this would be to our advantage (since we have so many satisfied customers), we do not impose upon them in this manner. We nonetheless reserve the right to publish any non-confidential material sent to us via email; in such case will we remove any clearly identifying information unless we have permission to retain it in the republication (e.g. testimonials).
We do not divulge any non-public information we obtain about clients and visitors to our web site, with the following exceptions: (1) We will comply with requests for information if we are compelled to do so by law enforcement officials who possess the authority to make such demands; (2) We do publish (here) the company or organization names of some of our clients; (3) We reserve the right to forward information pertaining to technologically debilitating activity (e.g. spamming), or illegal activity (e.g. scams).
Answers: Data Parse Edition Issues
What is POMPT?
POMPT is an abbreviation for "Parse-O-Matic Power Tool", now known as Data Parse Free Edition, Data Parse Basic, Business and Enterprise.
To answer the question in a different way, Data Parse is a data File parsing utility. If you would like to learn more, you can view the user manual. (Please note that the manual sometimes takes a minute to load. The free Adobe PDF reader must be installed to view the File.)
One reason we included this section in the FAQ is that it isn't completely obvious how to spell the names of our product, so people occasionally have trouble finding us. We have seen various renderings of the name, including:
|Parse0Matic (with a zero)||Parse-a-mat||DataMatic|
Did we miss any? It's hard to know, because if people can't find us, they can't tell us.
If we'd known about this potential problem when we created the product in 1986, perhaps we would have named it "Data File Fixer"!
What are the differences between Data Parse Free, Basic, Business and Entperise?
Please review the following grid for more information:
Yes, you can supply Data Parse with a URL or URLs as an input File or Files.
HTTP, FTP, etc. are available as input Files.
In addtion, you may select "HTMLDelimited" as the input File type, where Data Parse will parse your data accordingly.
Answers: New Features, Bugs, Mistakes
Do you listen to suggestions for new features?
Yes, we most certainly do listen.
Most of the features of our Data Parse technology were implemented in response to a client's specific needs. Our product's evolution has always been tied directly to customer requirements.
Every idea that comes to us is retained for our next Development Priorities review. (We cannot, however, commit to a specific implementation date.)
If the feature you want is crucial to your operation, you may be able to order it as a custom enhancement.
How do I report a bug or mistake?
If you've discovered a bug in our software, please let us know. If possible, please send us a script and an input File (in a ZIP File) so we can reproduce the problem.
In addition, if you discover even a minor typographical, grammatical or spelling error in our software, documentation or web site, we hope you can take a moment to tell us about it.
You can send us email at: email@example.com
To get our attention, please set your email's subject line to "Data Parse Problem Report".