|
||||||
|
||
|
Home > Invisible secret software |
Related keywords: secret, invisible, invisible keylogger, secret chamber, invisible surf, invisible key logger, Secret, invisible keylogger 97, secret passwords, Surf Secret |
|
|
1. | Masker 7.0.6 (softpuls.com) | ||
Hide files and have them automatically encrypted! MASKER is able to hide your sensitive files within another file (carrier file), which is absolute discrete and looks like regular file without changing the exterior impression. MASKER encrypts files using strong encryption algorithms. (CAST 128-bit, MASKER is able to hide your sensitive files within other files (carrier files), which are absolute discrete and look like regular files without changing the exterior impression… | |||
Updated: 3, 2006 | Rating: 16 | Author: Evgeny Zaretskiy | Size: 2399 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
2. | EmailObserver 5.2.2 (softsecurity.com) | ||
invisibly copy all outgoing emails and accurately send them to your secret email address pre-configured by the program Control Panel, no matter which email client software a monitored user might use (either Microsoft Outlook Express, Eudora, Pegasus, The Bat! or similar). Full control over outgoing… | |||
Updated: 2, 2006 | Rating: 0 | Author: Raytown Corporation LLC | Size: 739 kb | Shareware Go to category: Network & Internet > Network Monitoring Similar programs | |||
3. | Invisible Secrets Encryption Software 4.4 (neobytesolutions.com) | ||
Invisible Secrets Encryption Software 4 not only encrypts your data and files for safe keeping or for secure transfer across the net, it also hides them in places that on the surface appear totally innocent, such as picture or sound files, or web pages. These types of files are a perfect… | |||
Updated: 2, 2006 | Rating: 0 | Author: NeoByte Solutions | Size: 2740 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
4. | EmailObserver 5.2.2 (softsecurity.com) | ||
invisibly copy all outgoing emails and accurately send them to your secret email address pre-configured by the program Control Panel, no matter which email client software a monitored user might use (either Microsoft Outlook Express, Eudora, Pegasus, The Bat! or similar). Full control over outgoing… | |||
Updated: 2, 2006 | Rating: 0 | Author: Raytown Corporation LLC | Size: 739 kb | Shareware Go to category: Network & Internet > Network Monitoring Similar programs | |||
5. | Steganography 1.7.1.1 (securekit.com) | ||
on the contents of the file within another file! Make your secrets invisible in just 3 quick steps! Steganography enables you to use digital data hiding techniques (steganography) to hide files and messages within other files (carriers) such as picture or sound files. This allows you to encrypt sensitive information, while at the same time hiding it in a file that… | |||
Updated: 2, 2006 | Rating: 1019 | Author: Rachel White | Size: 1106 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
6. | Steganography 1.7.1.1 (pipisoft.com) | ||
on the contents of the file within another file! Make your secrets invisible in just 3 quick steps! Steganography enables you to use digital data hiding techniques (steganography) to hide files and messages within other files (carriers) such as picture or sound files. This allows you to encrypt sensitive information, while at the same time hiding it in a file that… | |||
Updated: 2, 2006 | Rating: 0 | Author: Rachel White | Size: 1106 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
7. | Keylogger Pro 1.7 (exploreanywhere.net) | ||
low level stealth keystroke monitoring application that will secretly record and backup all keystrokes typed on your PC. It offers a wide variety of features including the ability to view keystrokes remotely by having the program send keystrokes to a specified email address every X hours. KeyloggerPro can run in total stealth mode for invisible monitoring or with an… | |||
Updated: 2, 2006 | Rating: 257 | Author: Bryan Hammond | Size: 886 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
8. | Ardamax Keylogger 2.4 (ardamax.com) | ||
Application menu! This feature makes Ardamax Keylogger absolutely invisible to everyone! Keystroke monitoring - Track all keystrokes pressed. If a keystroke is pressed, Ardamax Keylogger will secretly record it and save it to a hidden log file for you to view at a later date. Email log delivery - Ardamax Keylogger can send your recorded logs via e-mail at set times… | |||
Updated: 2, 2006 | Rating: 12034 | Author: Maxim Frolov | Size: 286 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
9. | Keyboard Collector 2.07b (softdd.com) | ||
Secretly log and view all keys typed, including emails, instant messages, passwords, and more. You simply choose to have it run all the time, or to start at a specific time of the day, and it runs undetected while capturing all keyboard and data entry. Even if the computer is restarted, Keyboard… | |||
Updated: 2, 2006 | Rating: 113 | Author: SoftDD Software | Size: 715 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
10. | PDF Editor 2.4 (cadkas.de) | ||
pages. Also you can hide the information on a page so that it is invisible in the Acrobat Reader but can be unhidden later. You can change the page size or move the content. Add stamps like "Confidential" or "Top secret". The source code of the page (a language like HTML) is editable for you. Use the program to read and write encrypted pdf files. The program leaves the layout… | |||
Updated: 2, 2006 | Rating: 42 | Author: Christian A.D. Kassler | Size: 1875 kb | Demo Go to category: Business > Other Similar programs | |||
|
Home > Invisible secret software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|