|
||||||
|
||
|
Home > Mute software |
Related keywords: mute sound card |
|
|
221. | Hotkey Assistant 1.5 (spellway.com) | ||
application closing - Sound control (volume up, volume down, mute) - Screensaver control - Removable Drive Control - management of portable data medium drives (CD-ROM drives, MO drives, Tape libraries) - Quick launch of any applications with the help of hotkeys Advanced features - A possibility to assign separate settings for any application - Differentiation of the | |||
Updated: 9, 2005 | Rating: 0 | Author: Spellway Ltd | Size: 765 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
222. | HotKeyz 2.4.2.0 (skynergy.com) | ||
with a hotkey. Control your windows sound by increasing, decreasing, muting and changing the balance with a hotkey! Randomly change your desktop wallpaper with a hotkey. Open the recycle bin or empty it with a hotkey. Define a username and password to automatically login into your favourite website | |||
Updated: 2, 2006 | Rating: 812 | Author: Magnus Kruger | Size: 1020 kb | Freeware Go to category: Development > Other Similar programs | |||
223. | IntraMail 2003.01.20 (dplanet.ch) | ||
Secure exchange of messages in a local network Intranet (Windows 95, 98, Me, NT, 2000, XP). The mail (or Email) can be written or read from any PC easily. Every mail-account can be protected by a password. The personal messages are always strongly encrypted (with 3 adaptive codes). These short mails are Every mail-account can be protected by a password. Personal messages are strongly encrypted | |||
Updated: 9, 2005 | Rating: 42 | Author: Jean-Maurice Tellenbach | Size: 2918 kb | Shareware Go to category: Communications > E-Mail Clients Similar programs | |||
224. | Invisible Secrets Encryption Software 4.4 (neobytesolutions.com) | ||
Invisible Secrets Encryption Software 4 not only encrypts your data and files for safe keeping or for secure transfer across the net, it also hides them in places that on the surface appear totally innocent, such as picture or sound files, or web pages. These types of files are a perfect disguise for | |||
Updated: 2, 2006 | Rating: 0 | Author: NeoByte Solutions | Size: 2740 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
225. | Jetico Personal Firewall 1.0.1.61 (jetico.com) | ||
Jetico Personal Firewall protects your computer from unwanted hacker's attacks from outside as well as from malicious programs "living" secretly inside your computer's memory and hard drive. Three levels of protection are included: low-level network packets filtering, application-level network events as well as from malicious programs "living" secretly inside your computer's memory and hard drive | |||
Updated: 9, 2005 | Rating: 42 | Author: Jetico Inc. | Size: 2744 kb | Freeware Go to category: System Utilities > Other Similar programs | |||
226. | Lock Folder 5.0 (realclicks.com) | ||
Lock Folder is a new security tool that lets you lock your files and folders with your personal password. Now nobody but you can access your most sensitive information. Locking folders and files also effectively protects you from malicious programs, such as viruses, worms and trojans. Here is how Lock Folder | |||
Updated: 9, 2005 | Rating: 146 | Author: Leo van Opstal | Size: 1400 kb | Freeware Go to category: System Utilities > Other Similar programs | |||
227. | LockTheFile 1.8 (okosoft.com) | ||
LockTheFile is a tool that encrypts files with strong encryption alghorytm. You may protect any information - text files, pictures, video and audio files from other eyes and ears, as many files as you need, without any limites. The core functions of this program are: Strong encryption alghorytm; Handy | |||
Updated: 9, 2005 | Rating: 0 | Author: Andrew Maltsev | Size: 1808 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
228. | Lock Folder XP 3.4 (everstrike.com) | ||
Lock Folder XP is a new security tool that lets you lock your files, folders and drives with your personal password. Now nobody but you can access your most sensitive information. Locking folders, files and drives also effectively protects you from malicious programs, such as viruses, worms and trojans. Here | |||
Updated: 9, 2005 | Rating: 126 | Author: Richard Davids | Size: 1243 kb | Shareware Go to category: Security & Privacy > Access Control Similar programs | |||
229. | MMHotkeys 1.1 (librarysmith.co.uk) | ||
or home users who need instant control of sound settings. (Instant mute when the phone rings!) User definable hotkeys enable you to select only the features of the utility that you require and define your own hotkeys simply by pressing them. Runs silently in the background and is configured using | |||
Updated: 9, 2005 | Rating: 16 | Author: Matthew Smith | Size: 775 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
230. | Mutilate File Wiper 2.92 (mutilatefilewiper.com) | ||
Normal File Deletion is NOT secure. Deleting files merely removes the file system's pointer to the file, ALL THE DATA REMAINS ON YOUR HARD DRIVE. The remaining data can be easily recovered with data recovery or forensic software. Your sensitive files may also be vulnerable to advanced recovery techniques | |||
Updated: 9, 2005 | Rating: 82 | Author: Craig Christensen | Size: 823 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
|
Home > Mute software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|