|
||||||
|
||
|
Home > Bay software |
|
|
1. | Flashpaste Lite 3.41 (softvoile.com) | ||
Bored with typing the same text over and over? Stop! Flashpaste can help! Flashpaste is a new breed of text copying utility. The Windows clipboard is enough for most computer users but writers, coders, and developers need a more powerful, easily customizable and practical tool. Flashpaste is all that, and With Flashpaste, a user "programs in" frequently used addresses, e-mail text blocks, HTML codes, words, phrases and paragraphs. Then, the material can be easy inserted | |||
Updated: 3, 2006 | Rating: 0 | Author: Nikolay Tyushkov | Size: 372 kb | Freeware Go to category: System Utilities > Clipboard Tools Similar programs | |||
2. | Calendarscope 3.0 beta 2 (calendarscope.com) | ||
Calendarscope is a full-featured calendar program for planning, managing, and scheduling appointments, meetings, birthdays, vacations, important dates, special events, and tasks. It allows you to view all your events in standard calendar views and supports to-do lists. Reminder windows have customizable | |||
Updated: 3, 2006 | Rating: 486 | Author: Vladimir Kulemin | Size: 2220 kb | Shareware Go to category: Business > PIMS & Calendars Similar programs | |||
3. | Database Tour Pro 5.0.7.655 (vlsoftware.net) | ||
Universal database tool with report builder. Tested on Paradox, dBase, FoxPro, ASCII, Lotus, HTML, InterBase, Oracle, SQL Server, MS Access, MS Excel. Main features are: -Viewing, editing and printing data. -Automatically created reports and convenient report builder (with templates, expressions, preview | |||
Updated: 3, 2006 | Rating: 0 | Author: Vitaliy Levchenko | Size: 1758 kb | Shareware Go to category: Business > Databases & Tools Similar programs | |||
4. | Super Utilities 6.25 (superlogix.net) | ||
Super Utilities offers 26 tools for fixing, speeding up, maintaining, and protecting your PC. It encompasses four suites of utilities: System Cleaner, Privacy Protector, System Maintenance, and Special Utilities. 1.System Cleaner features a spyware-removal component as well as tools for cleaning your disk and | |||
Updated: 3, 2006 | Rating: 16 | Author: li jiangnan | Size: 3328 kb | Shareware Go to category: System Utilities > System Maintenance Similar programs | |||
5. | UninsHs 2.1.0.92 (han-soft.com) | ||
This extension program for Inno Setup allows you to add repair, modify and remove support to your applications with minimal effort. It is very small because use Assemble. Please read the readme file included in the package for further instructions on how to use UninsHs with your own application setups | |||
Updated: 3, 2006 | Rating: 391 | Author: JING YU HAN | Size: 26 kb | Freeware Go to category: Development > Install & Setup Similar programs | |||
6. | Masker 7.0.6 (softpuls.com) | ||
Hide files and have them automatically encrypted! MASKER is able to hide your sensitive files within another file (carrier file), which is absolute discrete and looks like regular file without changing the exterior impression. MASKER encrypts files using strong encryption algorithms. (CAST 128-bit, MASKER is able to hide your sensitive files within other files (carrier files), which are absolute discrete and look like regular files without changing the exterior impression | |||
Updated: 3, 2006 | Rating: 16 | Author: Evgeny Zaretskiy | Size: 2399 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
7. | Invisible Secrets Encryption Software 4.4 (neobytesolutions.com) | ||
Invisible Secrets Encryption Software 4 not only encrypts your data and files for safe keeping or for secure transfer across the net, it also hides them in places that on the surface appear totally innocent, such as picture or sound files, or web pages. These types of files are a perfect disguise for | |||
Updated: 2, 2006 | Rating: 0 | Author: NeoByte Solutions | Size: 2740 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
8. | Dekart Private Disk 2.07 (dekart.com) | ||
Powerful, reliable and flexible disk encryption program that lets you create encrypted disk partitions (drive letters) to protect your confidential information. Private Disk hides your programs and data, and restricts access to them. Dekart Private Disk includes innovative Disk Firewall mechanism - a unique | |||
Updated: 2, 2006 | Rating: 0 | Author: Dekart Contact | Size: 1159 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
9. | Starfish Family Mail 1.51 (lincolnbeach.com) | ||
Starfish Family Mail is a Windows email program that lets you communicate via email with all your friends and family! Parents or teachers can set up friend lists for each person so that you can rest assured that they are only communicating with their friends! Each person logs in as themselves and using | |||
Updated: 2, 2006 | Rating: 0 | Author: Lincoln Beach Software | Size: 2409 kb | Shareware Go to category: Network & Internet > Other Similar programs | |||
10. | PrintForm 2.1.0.7 (winformreports.co.uk) | ||
Get everything you need to add powerful printing features to your application. PrintForm.NET integrates with the .NET printing architecture enabling you to print and print preview any Windows Form. Simply design and code your Form in the usual way, add a PrintForm component, and you have a printing enabled | |||
Updated: 2, 2006 | Rating: 0 | Size: 1063 kb | Commercial Go to category: Development > Components & Libraries Similar programs | |||
11. | Image Broadway 5.1 (filestream.com) | ||
Easy-to-Use Graphic Tools at Your Fingertips Image Broadway lets you create and edit graphic images with special effects like a pro in just minutes. From simple tasks to advanced image editing capabilities, Image Broadway does it all and does it very well. It offers state-of-the-art digital image | |||
Updated: 2, 2006 | Rating: 0 | Author: Yao Chu | Size: 10414 kb | Shareware Go to category: Graphic Apps > Editors Similar programs | |||
12. | Folder Lock 5.3.9 (newsoftwares.net) | ||
Folder Lock is a fast file-security program that can password-protect, lock, hide and encrypt any number of files, folders, drives, pictures and documents in seconds. Protected files are hidden, undeletable, inaccessible and highly secure. It hides files from kids, friends and co-workers, safeguards them from | |||
Updated: 2, 2006 | Rating: 6296 | Author: Salman Ashraf | Size: 1941 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
13. | Hide Window Hotkey 2.5 (elongsoft.com) | ||
Hide Window Hotkey is a utility which allows you to hide the windows, and programs which are running on your screen.It will instantly hide or close all (or some) programs on your screen through Mouse Hotkey or Keyboard Hotkey in order to prevent uninvited persons from seeing them.It will serve you well at | |||
Updated: 2, 2006 | Rating: 0 | Author: Helen Lin | Size: 885 kb | Shareware Go to category: System Utilities > Shell Tools Similar programs | |||
14. | UnzipThemAll 1.4 (herve-thouzard.com) | ||
If you ever had to unzip a bunch of compressed zip files and struggled with a graphical interface or tried to interpret arcane command line programs then you will appreciate UnzipThemAll. - Select all your archive files and in one click, the program will decompress them in the current folder or in a selected | |||
Updated: 2, 2006 | Rating: 3733 | Author: Hervй Thouzard | Size: 1230 kb | Freeware Go to category: System Utilities > File Compression Similar programs | |||
15. | Steganography 1.7.1.1 (securekit.com) | ||
Steganography: an excellent method of embedding information on the contents of the file within another file! Make your secrets invisible in just 3 quick steps! Steganography enables you to use digital data hiding techniques (steganography) to hide files and messages within other files (carriers) such as | |||
Updated: 2, 2006 | Rating: 1019 | Author: Rachel White | Size: 1106 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
16. | Steganography 1.7.1.1 (pipisoft.com) | ||
Steganography: an excellent method of embedding information on the contents of the file within another file! Make your secrets invisible in just 3 quick steps! Steganography enables you to use digital data hiding techniques (steganography) to hide files and messages within other files (carriers) such as | |||
Updated: 2, 2006 | Rating: 0 | Author: Rachel White | Size: 1106 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
17. | FileBox eXtender 1.91.01 (hyperionics.com) | ||
Navigate easily through Windows folder maze with FileBox eXtender buttons placed on standard Windows file boxes. Access your favorite and recently visited folders and documents with one mouse click or hot key. Make the file boxes bigger to see more folders and files. Optionally FileBX buttons can be also | |||
Updated: 2, 2006 | Rating: 0 | Author: Greg Kochaniak | Size: 631 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
18. | 1st Privacy Tool for Windows 4.9.2.2 (privacywindows.com) | ||
1st Privacy Tool is a powerful security utility that allows you to restrict access to Windows important resources. This easy-to-use utility helps you to keep your computer in order. It enables you to impose a variety of access restrictions to protect your privacy. You can deny access to each individual | |||
Updated: 2, 2006 | Rating: 0 | Author: Eugene Mihailov | Size: 1500 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
19. | RFC Browser Standard Edition 3.0 (rfcbrowser.com) | ||
Large RFC required to read? Lots of RFCs required to read? RFC Browser is the tool you need. RFC Browser is a viewer tailored to RFC browsing. It is the most powerful utility to view RFCs that renders RFCs into HyperRFCs: intra-RFC and inter-RFC hyperlinking, Colorful, Visual, Scalable. Hyper: RFC | |||
Updated: 2, 2006 | Rating: 39 | Author: RFCBrowser.com RFCBrowser.com | Size: 1111 kb | Shareware Similar programs | |||
20. | 2Flyer Screensaver Builder Pro 7.4.1 (2flyer.com) | ||
2Flyer Screensaver Builder is a powerful tool which lets you create high-quality screensavers and share them with others. 2Flyer's ease of use and robust features make it perfect for both beginning and expert computer users. The program supports photographs taken from your digital camera as well as | |||
Updated: 2, 2006 | Rating: 341 | Author: Seany Mercier | Size: 2933 kb | Shareware Go to category: Desktop > Similar programs | |||
21. | Modem Spy 1.8 (softcab.com) | ||
Modem spy is handy utility for phone calls recording. Features: 1) records phone conversations. 2) records from microphone. 3) plays back recorded mesages via phone line. 4) Plays back recorded mesages via sound card. 5) Can record ALL incomming phone calls. 6) Has built-in software automatic gain control. 7) | |||
Updated: 2, 2006 | Rating: 90 | Author: Sergei Polishchuk | Size: 78 kb | Shareware Go to category: Audio & Multimedia > Rippers & Converters Similar programs | |||
22. | Wipe Expert 1.60 (bodrag.com) | ||
Wipe Expert is an award winning privacy protection tool that helps remove all traces of online and offline activity. Did you know that a consequence of internet browsing is the recording of many confidential data on your computer: visited pages, credit card info, passwords? Did you know that by simply | |||
Updated: 2, 2006 | Rating: 16 | Author: Dragos Diaconescu | Size: 2984 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
23. | Tracks Eraser Pro 5.61 (acesoft.net) | ||
Your computer is spying on you now! It stores all the evidence of your activities into your hard disk. Anyone using your computer can see where you have been on Internet, what images and movies you have seen, and even anything you have done on your computer could be seen by others. The Windows built-in | |||
Updated: 2, 2006 | Rating: 90 | Author: Acesoft | Size: 1624 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
24. | WiseTerm Telnet/Serial (32-bit) 3.1.2 (johnnypops.demon.co.uk) | ||
Win32 emulation of WY50, WY50+ and WY60 terminals. Part of the WiseTerm suite of telnet/serial emulators. Features: programmable keyboard; protect/write-protect modes; 24/25/42/43 line by 80/132 column display including Econ-80; char, line, page attributes; multiple, sizeable page modes; full split-screen | |||
Updated: 2, 2006 | Rating: 48 | Author: John Popplewell | Size: 415 kb | Shareware Go to category: Network & Internet > Other Similar programs | |||
25. | Windows Security Officer 6.8.1.1 (1securitycenter.com) | ||
Windows Security Officer is an autonomous provider of log-on and resource restriction security application integrated with, yet independent of, the Windows operating system. It has the capability of providing extremely strong, secure control of who can access a personal computer resources, and exactly what | |||
Updated: 2, 2006 | Rating: 0 | Author: Eugene Mihailov | Size: 1578 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
26. | NCrypt TX 1.8 (littlelite.net) | ||
This text based encryption tool allows easy message hiding, to be used in e-mail, messenger and other communications. NCrypt TX also has hashing capabilities to verify message integrity. It supports DES, Rijndael-AES, SHA, and MD5 algorithms, as well as historical algorithms such as ROT13 and Vigenere. With | |||
Updated: 2, 2006 | Rating: 0 | Author: Alessio Saltarin | Size: 511 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
27. | Maverick Launch Centre 2.1.004 (skaro.net) | ||
If you're tired of trudging through endless menus from the start button, this may be the answer to your prayers. Maverick is a powerful and flexible launcher that can be configured to provide quick access to your documents, applications and games, etc. It combines ease of use with a myriad of features and | |||
Updated: 2, 2006 | Rating: 0 | Author: James Turner | Size: 1569 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
28. | 4UOnly 1.2.7 (dillobits.com) | ||
What good is a password list manager that secures your secret passwords using a master password and then forces you to enter it each time you want to access your password list? 4UOnly is a password manager for Microsoft Windows 98, Me, NT, 2000 and XP with a unique feature that saves you time while promoting | |||
Updated: 2, 2006 | Rating: 36 | Author: Dillobits Software Dillobits | Size: 640 kb | Freeware Go to category: Security & Privacy > Password Managers Similar programs | |||
29. | SocksChain 3.11.151 (ufasoft.com) | ||
A program that allows to connect to any Internet service through a chain of SOCKS or HTTP proxies to hide the actual IP address. It also possible to work with a programs that are not designed to support SOCKS protocol directly. A program that allows to connect to any Internet service through a chain of SOCKS | |||
Updated: 2, 2006 | Rating: 1079 | Author: Ufasoft company | Size: 683 kb | Shareware Go to category: Servers > Firewall & Proxy Servers Similar programs | |||
30. | EGuest PRO 4.1 (esoftpro.com) | ||
EGuest PRO is a comprehensive guestbook system based on the popular guestbook system EGuest. New features including Image Verification Code, Admin Interfaces, Theme, 250+ Emoticons, Advanced Search with Highlight, Auto Web/Email Links, IP/Word Banning, Blank Line Protection and much more. It excels other | |||
Updated: 2, 2006 | Rating: 0 | Author: Eric Leung | Size: 313 kb | Shareware Go to category: Network & Internet > Other Similar programs | |||
31. | All in One SECRETMAKER 4.2.1 (secretmaker.com) | ||
All-in-One Secretmaker combines several tools: a security watchdog, a intruder blocker, a spam fighter, a pop-up blocker, a banner blocker, a movie blocker, a privacy protector, history cleaners, a worm hunter and a cookie eraser. Security Watchdog recognizes malicious "mysteryware" and parasites that may | |||
Updated: 2, 2006 | Rating: 264 | Author: secretmaker team | Size: 1249 kb | Freeware Go to category: Security & Privacy > Anti-Spam & Anti-Spy Tools Similar programs | |||
32. | Interactive JPEG Optimizer 7.01 (fullyregistered.com) | ||
Interactive JPEG Optimizer is the premier solution for compressing JPEG images singly or in batches. The latest version is faster than ever, sports a brand new, more logical interface and even supports scanning! It allows you to visually see the effect of compression (something some expensive graphics | |||
Updated: 2, 2006 | Rating: 0 | Author: Development Manager | Size: 1047 kb | Freeware Go to category: Graphic Apps > Other Similar programs | |||
33. | ZoneTick 2.7.0 (products.wrconsulting.com) | ||
ZoneTick World Time Zone Clock is a download for Windows that replaces the regular system clock with several time zones of your choosing. Knowing the time around the world has never been simpler. Whether you travel from timezone to timezone or have international friends, ZoneTick is the clock for you | |||
Updated: 2, 2006 | Rating: 1410 | Author: Sales Rep | Size: 1072 kb | Shareware Go to category: Desktop > Clocks & Alarms Similar programs | |||
34. | WinLock Professional 4.32 (crystaloffice.com) | ||
WinLock is a comprehensive security solution for personal or publicly accessible computers. It is a program that ensures that only authorized people can access sensitive information on your computer. With WinLock you can control how long others can use your computer. It runs from the system tray and requires | |||
Updated: 2, 2006 | Rating: 0 | Author: Denis Zolotov | Size: 1628 kb | Shareware Go to category: Security & Privacy > Access Control Similar programs | |||
35. | WinLock 4.32 (crystaloffice.com) | ||
WinLock is a comprehensive security solution for personal or publicly accessible computers. It is a program that ensures that only authorized people can access sensitive information on your computer. With WinLock you can control how long others can use your computer. It runs from the system tray and requires | |||
Updated: 2, 2006 | Rating: 280 | Author: Denis Zolotov | Size: 1550 kb | Shareware Go to category: Security & Privacy > Access Control Similar programs | |||
36. | Windows Security Officer 6.8.1.1 (mybestsoft.com) | ||
Windows Security Officer is an autonomous provider of log-on and resource restriction security application integrated with, yet independent of, the Windows operating system. It has the capability of providing extremely strong, secure control of who can access a personal computer resources, and exactly what | |||
Updated: 2, 2006 | Rating: 0 | Author: Eugene Mihailov | Size: 1578 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
37. | Win Spy Software Pro 8.6 (win-spy.com) | ||
Monitor your PC or multiple remote PCs with Win-Spy. Win-Spy operates in stealth mode, so users will not be aware of its existence or be able to terminate or uninstall it. Win-Spy comes with a screen-capture tool, a key recorder, a key-recorder e-mailer, e-mail alerting by keyword, a folder hider, the ability | |||
Updated: 2, 2006 | Rating: 346 | Author: Ben Nelson | Size: 2246 kb | Shareware Go to category: Desktop > Other Similar programs | |||
38. | Webroot Spy Sweeper 4.5 (webroot.com) | ||
NEW Spy Sweeper 4.5 takes another leap ahead of the competition. As the leading anti-spyware product available, it detects and completely removes the nastiest spyware out there like Elite Keylogger, LOP, Trojan Backdoor-Haxdoor & iSearchDesktop. Webroot pioneered always-on protection and arms Spy Sweeper with | |||
Updated: 2, 2006 | Rating: 124 | Author: Webroot Software | Size: 8959 kb | Shareware Go to category: Security & Privacy > Anti-Spam & Anti-Spy Tools Similar programs | |||
39. | 1st Security Agent 6.14 (getfreefile.com) | ||
1st Security Agent is an excellent password-protected security utility to secure Windows-based computers. It works under any Windows platform and offers an administrative support for controlling which users are allowed to access your computer and the level of access each user may have. You can choose to | |||
Updated: 2, 2006 | Rating: 214 | Author: Ixis Ltd | Size: 1105 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
40. | Task Commander 2.5 (resortlabs.com) | ||
Modern operating systems offer many cool interface features to make our lives easier. However, the ever-increasing number of various programs we use on a daily basis makes the task of managing open windows, running programs and processes way too complicated and time-consuming. As our taskbars get | |||
Updated: 2, 2006 | Rating: 0 | Author: Grishin Sergey | Size: 2219 kb | Shareware Go to category: System Utilities > Launchers & Task Managers Similar programs | |||
41. | SysDate 1.42 (SouthBayPC.com) | ||
SysDate shows the day of the month in the system tray (next to the time). This lets you see the current date with just a glance, instead of hovering the mouse pointer over the time. Great timesaver for those who are in front of a computer all day! Of course, the display is fully customizable: you can choose | |||
Updated: 2, 2006 | Rating: 16 | Author: South Bay Software | Size: 209 kb | Shareware Go to category: Desktop > Clocks & Alarms Similar programs | |||
42. | SuperCleaner 2.89 (southbaypc.com) | ||
SuperCleaner is an all in one disk cleaner for Windows. Its built-in Garbage Finder can find hundreds or even thousands of megabytes of unneeded files taking up space on your computer. The Internet Privacy features of SuperCleaner will let you erase your web browser's cache, history, cookies, and even the | |||
Updated: 2, 2006 | Rating: 121 | Author: South Bay Software | Size: 409 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
43. | Stealth Folder Hide XP 9.3 (folder-hider-stealth.com) | ||
Hide any folder on your PC. With Stealth Folder, folders and files can't be deleted, viewed, modified, or run. Stealth Folder Operates in Stealth mode, special hotkey is required to pull it up. Stealth Folder is not visible in Start, Toolbar, Taskbar, Add/Remove Programs or CTL ALT DEL.. Stealth Folder is | |||
Updated: 2, 2006 | Rating: 0 | Author: Ben Nelson | Size: 540 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
44. | Security Administrator 10.14 (softheap.com) | ||
Restrict access to your PC with Security Administrator. This password-protected security utility enables you to impose a variety of access restrictions to protect your privacy and stop others from tampering with your desktop. You can deny access to each individual component of several Control Panel applets | |||
Updated: 2, 2006 | Rating: 0 | Author: Ixis Ltd | Size: 1104 kb | Shareware Go to category: Security & Privacy > Access Control Similar programs | |||
45. | Security Administrator 10.14 (getfreefile.com) | ||
Restrict access to your PC with Security Administrator. This password-protected security utility enables you to impose a variety of access restrictions to protect your privacy and stop others from tampering with your desktop. You can deny access to each individual component of several Control Panel applets | |||
Updated: 2, 2006 | Rating: 0 | Author: Ixis Ltd | Size: 1104 kb | Shareware Go to category: Security & Privacy > Access Control Similar programs | |||
46. | SecureIT Encryption Software 3.1.7 (cypherix.co.uk) | ||
Cypherix's Secure IT 2000 is an easy to use, feature packed program that protects all your files and folders using 448bit strong Blowfish encryption. It includes a powerful, customizable file shredder. Secure IT 2000 has the ability to generate self-decrypting email attachments that allows the user to send | |||
Updated: 2, 2006 | Rating: 0 | Author: Cypherix Cypherix | Size: 2088 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
47. | SafeSystem 2006 (gemiscorp.com) | ||
SafeSystem allows you to prevent access to your personal and important files and folders, as well as protect and guarantee the integrity and well functioning of your system. It can make your files and folders completely invisible, inaccessible or simply read-only and prevent the change of configuration and | |||
Updated: 2, 2006 | Rating: 0 | Author: GemiScorp | Size: 2376 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
48. | PS Tray Factory 2.1 (pssoftlab.com) | ||
PS Tray Factory is a powerful and handy tool meant to flexibly control ALL the other icons in the system tray of the taskbar. PS Tray Factory will help you to manage all the applications that place their icons in the taskbar tray. When you have installed PS Tray Factory, you will forget about the problem of | |||
Updated: 2, 2006 | Rating: 48 | Author: Sergey Poplavsky | Size: 842 kb | Shareware Go to category: Desktop > Clocks & Alarms Similar programs | |||
49. | PS Tray Factory 2.1 (pssoftlab.com) | ||
PS Tray Factory is a powerful and handy tool meant to flexibly control ALL the other icons in the system tray of the taskbar. PS Tray Factory will help you to manage all the applications that place their icons in the taskbar tray. When you have installed PS Tray Factory, you will forget about the problem of | |||
Updated: 2, 2006 | Rating: 0 | Author: Sergey Poplavsky | Size: 842 kb | Shareware Go to category: Desktop > Clocks & Alarms Similar programs | |||
50. | Professional Renamer 2.35 (miklsoft.com) | ||
Professional Renamer helps catalogue images, music and other content of your hard drive via meaningful file names. The program offers sophisticated templates and filtering to save time and maintain consistency of name patterns. Professional Renamer is a robust tool for batch editing of file names. It | |||
Updated: 2, 2006 | Rating: 0 | Author: Mihail Cherkashin | Size: 1144 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
51. | PowerKey 2.11.01.22 (elcor.net) | ||
PowerKey is an advanced encryption toolkit designed to protect your most sensitive data. Thanks to its easy-to-use and flexible interface you can now fastly encrypt your files and not worry about your information anymore, cause now it's safe. PowerKey allows creation of SFX packages (like WinZip). It | |||
Updated: 2, 2006 | Rating: 0 | Author: Nick Nifontov | Size: 1029 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
52. | PC LockUp 2.185 (softheap.com) | ||
PC LockUp is a computer security software, which enables you to apply password protection to Windows and restrict others from being able to use your PC while you are away. It starts automatically with Windows and optionally locks your desktop upon loading. It hides your desktop at the same time and shows a | |||
Updated: 2, 2006 | Rating: 0 | Author: Ixis Ltd Ixis Ltd | Size: 839 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
53. | Password Protected Lock 2.92 (softfolder.com) | ||
Password Protected Lock is an excellent security computer lock you can use to secure your PC and protect your privacy. It is attractive, secure, and very easy to use. It starts automatically with Windows and optionally activates desktop lock with password upon loading. It hides your desktop at the same time | |||
Updated: 2, 2006 | Rating: 0 | Author: SoftFolder Inc | Size: 724 kb | Shareware Go to category: Security & Privacy > Access Control Similar programs | |||
54. | Maverick Launch Centre 2.1.004 (skaro.net) | ||
If you're tired of trudging through endless menus from the start button, this may be the answer to your prayers. Maverick is a powerful and flexible launcher that can be configured to provide quick access to your documents, applications and games, etc. It combines ease of use with a myriad of features and | |||
Updated: 2, 2006 | Rating: 0 | Author: James Turner | Size: 1569 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
55. | Lock My PC 3.4 (fspro.net) | ||
These days, computers are everywhere: from banks and government offices to shops and homes. We tend to rely on our machines more and more each day. We store our valuable data, personal and business-critical information, photos, credit card information, important phone numbers and vast amount of other private | |||
Updated: 2, 2006 | Rating: 0 | Author: FSPro Labs | Size: 1005 kb | Shareware Go to category: Security & Privacy > Access Control Similar programs | |||
56. | PC LockUp 2.185 (getfreefile.com) | ||
PC LockUp is a computer security software, which enables you to apply password protection to Windows and restrict others from being able to use your PC while you are away. It starts automatically with Windows and optionally locks your desktop upon loading. It hides your desktop at the same time and shows a | |||
Updated: 2, 2006 | Rating: 0 | Author: Ixis Ltd Ixis Ltd | Size: 839 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
57. | ID_Bank 1.24.13 (rainbow-innov.co.uk) | ||
Passwords can be trouble especially on the Internet. You may have too many to remember and if you don't take care someone else will gain access to them! ID_Bank can help solve your problem. ID_Bank is a secure identity and password protection system from Rainbow Innovations. ID_Bank is able to hold your ID_Bank is able to hold your personal information relating to usernames, passwords, pins, login details etc; information in a secure encrypted file | |||
Updated: 2, 2006 | Rating: 0 | Author: John Hudson | Size: 1546 kb | Shareware Go to category: Security & Privacy > Password Managers Similar programs | |||
58. | Hide Files 3.4 (hide-files.biz) | ||
You have any files or programs that you don't want to share with other or they contain financial and tax information, passwords, personal letters and emails, private images, and other confidential or personal data. But typically, computer files and folders have not security protection so the best way to | |||
Updated: 2, 2006 | Rating: 0 | Author: Eric Nilsson | Size: 234 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
59. | Hide Files & Folders 2.4 (softstack.com) | ||
Hide Files & Folders is a great easy-to-use password-protected security utility working at Windows kernel level you can use to password-protect certain files and folders, or to hide them securely from viewing and searching just with a click of mouse. Upon accessing any protected file or folder, dialog box | |||
Updated: 2, 2006 | Rating: 0 | Author: IM Soft | Size: 789 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
60. | Hide Files 3.4 (spydex.com) | ||
You have any files or programs that you don't want to share with other or they contain financial and tax information, passwords, personal letters and emails, private images, and other confidential or personal data. But typically, computer files and folders have not security protection so the best way to | |||
Updated: 2, 2006 | Rating: 0 | Author: Eric Nilsson | Size: 234 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
61. | Hide & Protect any Drives 2.01 (softstack.com) | ||
Hide or restrict access to any drives such as Hard drive, CD, DVD, floppy and flash, and deny access to partitions of your hard drives with "Hide & Protect Drives". Stop unauthorized software installations and data leak by removable media. Protect Hard drive, CD, DVD, floppy and flash, and deny access to | |||
Updated: 2, 2006 | Rating: 244 | Author: IM Soft | Size: 764 kb | Freeware Go to category: System Utilities > Other Similar programs | |||
62. | File & Folder Protector 2.33 (softheap.com) | ||
Protect Files and Folders is a great easy-to-use password-protected security utility working at Windows kernel level you can use to password-protect certain files and folders, or to hide them securely from viewing and searching just with a click of mouse. Upon accessing any protected file or folder, dialog | |||
Updated: 2, 2006 | Rating: 113 | Author: Ixis Ltd | Size: 740 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
63. | Directory Snoop 5.02 (briggsoft.com) | ||
Directory Snoop is a cluster-level search tool that lets Windows users snoop through their FAT and NTFS formatted disk drives to see what data may be hiding in the cracks. Use Directory Snoop to recover deleted files you thought you would never see again or permanently erase sensitive files so that no one | |||
Updated: 2, 2006 | Rating: 0 | Author: Kent Briggs | Size: 1534 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
64. | Database Tour Pro 5.0.5.629 (raritet.com.ua) | ||
Universal database tool with report builder. Tested on Paradox, dBase, FoxPro, ASCII, Lotus, HTML, InterBase, Oracle, SQL Server, MS Access, MS Excel. Main features are: -Viewing, editing and printing data. -Automatically created reports and convenient report builder (with templates, expressions, preview | |||
Updated: 2, 2006 | Rating: 203 | Author: Vitaliy Levchenko | Size: 1741 kb | Shareware Go to category: Business > Databases & Tools Similar programs | |||
65. | Dark Files 3.3.1.1 (mybestsoft.com) | ||
Dark Files can help you keep your files protected. You can choose who gets access to what files on your computer. This program provides three levels of protection to suit any user : "Hidden", "Read Only", "Full Control". It works with any Windows platforms : 9.x/ME/NT/2000/XP . Dark Files can work with | |||
Updated: 2, 2006 | Rating: 0 | Author: Eugene Mihailov | Size: 1006 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
66. | Cursor Hider 1.4.4 (softexe.com) | ||
Cursor Hider helps you to work more productively. It removes the mouse pointer (the mouse cursor does not cover the entered text) while you are working with the keyboard and returns the pointer with any mouse action. Real example: You are going to visit aweb site with forms to fill in. At first you type the | |||
Updated: 2, 2006 | Rating: 0 | Author: Nickolas Smith | Size: 279 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
67. | CD-DVD Lock 2.01 (getfreefile.com) | ||
CD-DVD Lock is intended for restricting read or write access to removable media devices such as CD, DVD, floppy and flash, as well as for restricting access to certain partitions of hard disk drives. You can restrict access by two ways: hide your devices from viewing or lock access to them. You can gain | |||
Updated: 2, 2006 | Rating: 48 | Author: Ixis Ltd | Size: 822 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
68. | CD-DVD Lock 2.01 (softheap.com) | ||
CD-DVD Lock is intended for restricting read or write access to removable media devices such as CD, DVD, floppy and flash, as well as for restricting access to certain partitions of hard disk drives. You can restrict access by two ways: hide your devices from viewing or lock access to them. You can gain | |||
Updated: 2, 2006 | Rating: 16 | Author: Ixis Ltd | Size: 822 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
69. | Astatix Launcher 1.62 (astatix.com) | ||
Astatix Launcher allows you to quick start any applications, open documents and explore folders in a single click. It allows assigning hotkeys to any actions, fulfilling several special functions: open/close CD door, run screen saver, hide task bar and others. One of additional possibilities is a control of | |||
Updated: 2, 2006 | Rating: 16 | Author: Sergey Goncharov | Size: 666 kb | Shareware Go to category: System Utilities > Launchers & Task Managers Similar programs | |||
70. | Advanced Security Level 6.1 (softfolder.com) | ||
Advanced Security Level is the best computer security application for Windows-based computers. It gives you an excellent administrative support to control the user access rights for your computer by setting up the desired access control level for each user. You can restrict access to Control Panel applets | |||
Updated: 2, 2006 | Rating: 16 | Author: SoftFolder Inc | Size: 1065 kb | Shareware Go to category: Security & Privacy > Access Control Similar programs | |||
71. | Advanced Security Administrator 10.14 (getfreefile.com) | ||
Protect your computer and restrict access to Internet with Security Administrator. This nice password-protected security utility enables you to impose a variety of access restrictions to protect your privacy and stop others from tampering with your PC. You can deny access to each individual component of | |||
Updated: 2, 2006 | Rating: 16 | Author: Ixis Ltd | Size: 1104 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
72. | Advanced Security Administrator 10.14 (softheap.com) | ||
Protect your computer and restrict access to Internet with Security Administrator. This nice password-protected security utility enables you to impose a variety of access restrictions to protect your privacy and stop others from tampering with your PC. You can deny access to each individual component of | |||
Updated: 2, 2006 | Rating: 0 | Author: Ixis Ltd | Size: 1104 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
73. | Active Keyboard 3.1 (drive-software.com) | ||
HotKey Program, Launch applications, documents, and URLs, and over 80 other actions to hot keys - Create shortcut keys supporting both mouse and keyboard macros - Minimize any window to the system tray with this utility - Hide application windows by using a hotkey or an icon in the system tray - - Control your Winamp player - Hide application windows - Open, Play and close your CD-ROM - Change the volume, mute - Empty recycle bin - Lock/Unlock Desktop | |||
Updated: 2, 2006 | Rating: 144 | Author: Dmitri Drive | Size: 914 kb | Shareware Go to category: Desktop > Other Similar programs | |||
74. | Active Key Logger 3.0 (winsoul.com) | ||
Active Key Logger this is the best choice for you if you think that others are using your computer when you are not home or away from your working place. After you install Active Key Logger on your computer, it will allow you to make program settings for tracking activities on your computer. If you enable | |||
Updated: 2, 2006 | Rating: 242 | Author: Alex Atushev | Size: 703 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
75. | Cursor Hider 1.4.4 (softexe.com) | ||
Cursor Hider helps you to work more productively. It removes the mouse pointer (the mouse cursor does not cover the entered text) while you are working with the keyboard and returns the pointer with any mouse action. Real example: You are going to visit aweb site with forms to fill in. At first you type the | |||
Updated: 2, 2006 | Rating: 0 | Author: Nickolas Smith | Size: 279 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
76. | Access Lock 2.83 (getfreefile.com) | ||
Access Lock is an easy-to-use system-tray security utility you can use to secure your desktop when you are away from your computer. Just configure the program, define a password and double click the Access Lock system-tray icon every time you need to disable and hide your desktop. While it is locked, the | |||
Updated: 2, 2006 | Rating: 16 | Author: Ixis Ltd | Size: 795 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
77. | Access Lock 2.83 (softheap.com) | ||
Access Lock is an easy-to-use system-tray security utility you can use to secure your desktop when you are away from your computer. Just configure the program, define a password and double click the Access Lock system-tray icon every time you need to disable and hide your desktop. While it is locked, the | |||
Updated: 2, 2006 | Rating: 99 | Author: Ixis Ltd | Size: 795 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
78. | Access Administrator Pro 4.14 (getfreefile.com) | ||
Access Administrator Pro is intended for controlling access to files and folders situated on local media of Windows 95/98/ME/NT/2000/XP at Windows kernel level. It enables you to deny access to certain files and folders, or to hide them securely from viewing and searching. An easy-to-use user interface gives | |||
Updated: 2, 2006 | Rating: 34 | Author: Ixis Ltd | Size: 678 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
79. | Access Administrator Pro 4.14 (softheap.com) | ||
Access Administrator Pro is intended for controlling access to files and folders situated on local media of Windows 95/98/ME/NT/2000/XP at Windows kernel level. It enables you to deny access to certain files and folders, or to hide them securely from viewing and searching. An easy-to-use user interface gives | |||
Updated: 2, 2006 | Rating: 16 | Author: Ixis Ltd | Size: 678 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
80. | 4UOnly 1.2.7 (dillobits.com) | ||
What good is a password list manager that secures your secret passwords using a master password and then forces you to enter it each time you want to access your password list? 4UOnly is a password manager for Microsoft Windows 98, Me, NT, 2000 and XP with a unique feature that saves you time while promoting | |||
Updated: 2, 2006 | Rating: 0 | Author: Dillobits Software Dillobits | Size: 640 kb | Freeware Go to category: Security & Privacy > Password Managers Similar programs | |||
81. | 4UOnly 1.2.7 (dillobits.com) | ||
What good is a password list manager that secures your secret passwords using a master password and then forces you to enter it each time you want to access your password list? 4UOnly is a password manager for Microsoft Windows 98, Me, NT, 2000 and XP with a unique feature that saves you time while promoting | |||
Updated: 2, 2006 | Rating: 0 | Author: Dillobits Software Dillobits | Size: 640 kb | Freeware Go to category: Security & Privacy > Password Managers Similar programs | |||
82. | 1st Security Administrator Pro 10.14 (softheap.com) | ||
Restrict access to Windows applications, protect PC, and password-protect boot with 1st Security Administrator. This is the best professional password-protected security utility to apply access restrictions to PC, and to protect your privacy stopping others from tampering with your desktop. Deny access to | |||
Updated: 2, 2006 | Rating: 222 | Author: Ixis Ltd | Size: 1104 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
83. | 1st Security Agent 6.14 (softheap.com) | ||
1st Security Agent is an excellent password-protected security utility to secure Windows-based computers. It works under any Windows platform and offers an administrative support for controlling which users are allowed to access your computer and the level of access each user may have. You can choose to | |||
Updated: 2, 2006 | Rating: 42 | Author: Ixis Ltd | Size: 1105 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
84. | 1st Security Agent Pro 6.14 (softheap.com) | ||
1st Security Agent Pro is a professional password-protected system security utility to secure Windows PC and restrict access to its key features. 1st Security Agent Pro offers an administrative support for controlling access to your PC and changing user access level. Password-protect and restrict access to | |||
Updated: 2, 2006 | Rating: 0 | Author: Ixis Ltd | Size: 1105 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
85. | 1st Security Administrator 10.14 (softheap.com) | ||
Protect PC, restrict access to Windows applications and password-protect boot with 1st Security Administrator. This is the best password-protected security utility to apply access restrictions to PC, and to protect your privacy stopping others from tampering with your desktop. Deny access to Control Panel and | |||
Updated: 2, 2006 | Rating: 432 | Author: Ixis Ltd | Size: 1104 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
86. | 1 Click & Go 1.275 (softstack.com) | ||
1 Click & Go works as a Windows toolbar designed for easy access, open and execute files and folders that you often use. Program similar well-known Microsoft Office Panel, but not lose configuration in case of a system crash. It supports the Drag&Drop and has a simple and comprehensible interface. There is a | |||
Updated: 2, 2006 | Rating: 0 | Author: IM Soft | Size: 302 kb | Freeware Go to category: System Utilities > Other Similar programs | |||
87. | 1 Click & Lock 2.83 (softstack.com) | ||
1Click & Lock up is a system tray security utility you can use to secure your desktop when you step away from your PC. It's secure and very easy-to-use. Just define a password, and select Lock to hide and deny access to your desktop to anyone without the proper password. You can set the program to launch | |||
Updated: 2, 2006 | Rating: 56 | Author: IM Soft | Size: 1338 kb | Shareware Go to category: Security & Privacy > Password Managers Similar programs | |||
88. | Hot Corners 2.3 (southbaypc.com) | ||
Hot Corners lets you quickly activate or disable your screen saver by moving the mouse into any corner of the screen that you set. This is particularly useful when you need to leave your computer for a brief period, but don't want anybody to be able to access it. Using Hot Corners, you can turn on your screen | |||
Updated: 2, 2006 | Rating: 0 | Author: South Bay Software | Size: 185 kb | Shareware Go to category: Desktop > Similar programs | |||
89. | AllWallpapers 2.1 (nimblesoftware.com) | ||
The very first wallpaper management utility that really saves user money. AllWallpapers is the first and only utility that combines the capability in creating mobile wallpapers for any device, flexible desktop wallpaper management, and full-screen image slide show packed with numerous graphic effects. Taking | |||
Updated: 2, 2006 | Rating: 504 | Author: Nimble Software | Size: 2441 kb | Shareware Go to category: Desktop > Themes & Wallpaper Similar programs | |||
90. | Internet Secure Tunneling 2.0.0.228 (han-soft.biz) | ||
Internet Secure Tunneling can forward otherwise insecure TCP traffic through encrypted SSH Secure Shell tunnel. You can secure for example DATABASE, POP3, SMTP and HTTP connections that would otherwise be insecure. The tunneling capability of SSH Secure Shell is a feature that allows, for example, company | |||
Updated: 2, 2006 | Rating: 0 | Author: JING YU HAN | Size: 927 kb | Shareware Go to category: Network & Internet > Other Similar programs | |||
91. | #1 Smart Protector Pro - Internet Eraser 4.12 (smartprotector.com) | ||
Smart Protector Pro is an easy to use software that protects your privacy by erasing all the traces of your Internet activity automatically. It completely erases your Internet Explorer history, cookies, temporary files(cache), typed URLs(the drop down address list), AutoComplete, recent document list, Other features: Cookie Manager, Save/Restore State, Scheduling, Stealth mode, Emergency Key and more | |||
Updated: 2, 2006 | Rating: 440 | Author: Ivelin Kovatchev | Size: 440 kb | Shareware Go to category: Network & Internet > Browsers Similar programs | |||
92. | Proxifier 2.00 (proxifier.com) | ||
Proxifier is a program that allows network applications that do not support working through proxy servers to operate through a HTTP or SOCKS proxy server or a chain of proxy servers. There are many network applications that do not support working through proxy servers and thus cannot be used from LAN or with | |||
Updated: 2, 2006 | Rating: 3044 | Size: 685 kb | Shareware Go to category: Network & Internet > Other Similar programs | |||
93. | NoAds 2006.02.04 (southbaypc.com) | ||
NoAds stops Internet popup ads from getting in the way of your web surfing. NoAds is fully configurable, allowing you to specify which ads you want to be destroyed automatically. It supports most popular web browsers, including Microsoft Internet Explorer, Mozilla Firefox, Netscape, and America Online. The | |||
Updated: 2, 2006 | Rating: 0 | Author: South Bay Software | Size: 201 kb | Freeware Go to category: Network & Internet > Ad Blockers Similar programs | |||
94. | Internet Secure Tunneling 2.0.0.228 (han-soft.com) | ||
Internet Secure Tunneling can forward otherwise insecure TCP traffic through encrypted SSH Secure Shell tunnel. You can secure for example DATABASE, POP3, SMTP and HTTP connections that would otherwise be insecure. The tunneling capability of SSH Secure Shell is a feature that allows, for example, company | |||
Updated: 2, 2006 | Rating: 0 | Author: JING YU HAN | Size: 927 kb | Shareware Go to category: Network & Internet > Other Similar programs | |||
95. | HTML Guardian 7.2.9 (protware.com) | ||
Encrypt HTML, SHTML, JavaScript, VBScript, PHP and ASP files. Hide HTML source code from web site thieves. HTML Guardian is a solution for total Web site protection -it will make impossible stealing and re-using your source code in other websites.. Image protection add-on [Image Guardian] is especially Hide html source from thieves. Disable right-click,page printing,text selection/copying, clipboard,offline usage of encrypted files. Html password protection | |||
Updated: 2, 2006 | Rating: 0 | Author: Ivan Ned | Size: 7563 kb | Demo Go to category: Web Development > HTML Tools Similar programs | |||
96. | Easy File & Folder Protector 4.14 (softstack.com) | ||
Protect files and folders situated on local media of Windows 95/98/ME/NT/2000/XP with Easy File & Folder Protector at Windows kernel level. Your can deny access to certain files and folders, or to hide them securely from viewing and searching. Easy File & Folder Protector has an easy-to-use user interface | |||
Updated: 2, 2006 | Rating: 46 | Author: IM Soft | Size: 736 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
97. | AmiPic ShareMaster 6.16 (altomsoft.com) | ||
Send, share and download confidential data securely by storing it in images and other files. It lets you find even hidden web sites! Automated and fully customizable Internet search bot, Web and Usenet mass downloader with image viewer and useful tools, such as text finder, file splitter and duplicate files | |||
Updated: 2, 2006 | Rating: 113 | Author: Alexandre Tolmatchev | Size: 1441 kb | Shareware Go to category: Network & Internet > Download Managers Similar programs | |||
98. | Screen Calendar 7.0 (screencalendar.com) | ||
Screen Calendar really allows you to put the calendar on your desktop wallpaper choosing the calendar size and transparency. Double-click a calendar to schedule your business day. To read your records fully, just move your mouse over the date cell. Also, your records and calendar can be printed. So, your PIM | |||
Updated: 2, 2006 | Rating: 31 | Author: Oleg Grabets | Size: 2807 kb | Shareware Go to category: Business > PIMS & Calendars Similar programs | |||
99. | Shih Tao 1.00.0013 (ionly.com) | ||
Shih Tao is the Windows software adaptation of an old Asian board game. It's all about placing stones on the board following the rules of Shih Tao. Each stones has two characteristics, a symbol and a color. In the beginning we place six stones for you and hide the remaining stones in the pouch. Now it is | |||
Updated: 2, 2006 | Rating: 0 | Author: Markus Kreisel | Size: 2280 kb | Shareware Go to category: Games & Entertainment > Board Similar programs | |||
100. | Hidden Swap Buttons 1.1 (sanapesoft.com) | ||
Hidden Swap Buttons is a logic game. The purpose of the game is to gain as many points as possible. Points are added at the removal of the buttons. The buttons are removed at making a vertical or horizontal combination of three or more buttons of the same color. In order to create a combination like that you | |||
Updated: 2, 2006 | Rating: 24 | Author: Alexander Moshkov | Size: 327 kb | Freeware Go to category: Games & Entertainment > Other Similar programs | |||
|
Home > Bay software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|