|
||||||
|
||
|
Home > Secret software |
Related keywords: secret chamber, secret passwords, Surf Secret, secret key encryption, secret allies, The Secret Garden, invisible secret, secret pictures, secret diary, secret hotkey |
|
|
101. | ipPulse 1.65 (ippulse.com) | ||
ipPulse is a Remote Status Monitoring Tool. Use ipPulse to monitor the up/down status of IP connected devices (nodes) on any IP connected network. ipPulse uses a variety of methods, including ping, tcp connects, and SNMP to poll and check the network connectivity of a list of user-defined nodes. ipPulse | |||
Updated: 2, 2006 | Rating: 137 | Author: NWPS Inc NWPS Inc | Size: 1393 kb | Shareware Go to category: Network & Internet > Network Monitoring Similar programs | |||
102. | Keyboard Collector 2.07b (softdd.com) | ||
Secretly log and view all keys typed, including emails, instant messages, passwords, and more. You simply choose to have it run all the time, or to start at a specific time of the day, and it runs undetected while capturing all keyboard and data entry. Even if the computer is restarted, Keyboard | |||
Updated: 2, 2006 | Rating: 113 | Author: SoftDD Software | Size: 715 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
103. | KnockKnock 3.10 (knockmail.com) | ||
the Anti Spam Intelligence works. Unique Accept Once feature. Secret words and subject filtering options included. Optional configurable courtesy notice to all new uncategorized senders, trying to send you an Email, letting them know your system has received their email and you will evaluate them | |||
Updated: 9, 2005 | Rating: 0 | Author: Kelsey Gray | Size: 8747 kb | Shareware Go to category: Security & Privacy > Anti-Spam & Anti-Spy Tools Similar programs | |||
104. | Norton Personal Firewall 2004 (nct.symantecstore.com) | ||
to the Internet, preventing spyware programs and Trojan horses from secretly transmitting data. To guard against emerging threats, Symantec’s exclusive LiveUpdate technology automatically downloads new protection updates via the Internet. Small Office Packs for 5 or 10 users are also available | |||
Updated: 9, 2005 | Rating: 0 | Author: Jennifer Leonard | Size: 20608 kb | Shareware Go to category: Network & Internet > Browsers Similar programs | |||
105. | AntiSpy 4.4.2 (omniquad.com) | ||
programs from your computer. Spywares snooping on your system, secretly monitoring and broadcasting your computer activities pose serious security and privacy issues. Most of these spywares are installed without your permission on your computer. AntiSpy scans system memory, registry, hard, and removable drives for a variety of spywares like annoying ad-wares, data-mining | |||
Updated: 2, 2006 | Rating: 39 | Author: Daniel Sobstel | Size: 10164 kb | Shareware Go to category: Network & Internet > Other Similar programs | |||
106. | PageGate 4 (notepager.com) | ||
Pagegate is a sophisticated wireless messaging server application. It can send SMS and text messages to pagers, mobile phones, PIMs and other wireless devices. PageGate can accept messages from many different sources: networked computers running the PageGate Windows Client program, email messages that are | |||
Updated: 9, 2005 | Rating: 0 | Author: NotePage, Inc. NotePage, Inc. | Size: 6996 kb | Shareware Go to category: Communications > Chat & Instant Messaging Similar programs | |||
107. | PAL PC SPY 1.01 (palsol.com) | ||
a completely invisible KEY RECORDER and SCREEN CAPTURE utility that secretly captures anything the user sees or types on the keyboard. PAL PC Spy operates in stealth mode. Users are unaware of its existence. Special hotkey and login is necessary to invoke the program. Users are unable to terminate the program. Users are unable to uninstall the program. PAL PC Spy comes with a Screen | |||
Updated: 9, 2005 | Rating: 0 | Author: Christian Champion | Size: 1250 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
108. | PC Spy 2.44 (softdd.com) | ||
Secretly monitor what is being viewed on your computer while you are away. This software allows you to capture and save screen images while you are away from your computer, showing you exactly what was being viewed on your computer at specific intervals which you can set. All screens can be captured | |||
Updated: 2, 2006 | Rating: 0 | Author: SoftDD Software | Size: 805 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
109. | Porno Crawler 4.1 (iloveu.free.fr) | ||
the files it will download. Just try it and you will see ! The secret of Porno Crawler is that this program downloads porn files from external web sites that are refreshed daily or weekly by their owners. Porno Crawler has the ability to search into Internet Sex Directories, and to recognize millions of pictures and movies galleries within billions of advertisements. Of course you | |||
Updated: 3, 2005 | Rating: 25663 | Author: JAMAN JAMAN | Size: 4368 kb | Shareware Go to category: Network & Internet > Search/Lookup Tools Similar programs | |||
110. | Secret Explorer 6.6.1471 (unhsolutions.com) | ||
passwords), and much more with this new system inspection tool. Secret Explorer is designed to browse, analyze and edit hidden data which is stored in undocumented Windows Protected Storage. With Secret Explorer import/export feature you can also move all your personalized information from one computer to another, basically familiarizing a new system with you. This system | |||
Updated: 2, 2006 | Rating: 0 | Author: Vitas Ramanchauskas | Size: 504 kb | Shareware Similar programs | |||
111. | Site Content Analyzer 2.2.15 (SiteContentAnalyzer.com) | ||
tags and keyword location. While most search engine algorithms are secret, it is generally accepted that keywords in tags, headers and the top part of the page yield better results. Conveniently, Site Content Analyzer can analyze the entire website or selected pages, generating easy to comprehend | |||
Updated: 9, 2005 | Rating: 0 | Author: Dmitry Pivovarov | Size: 1861 kb | Shareware Go to category: Web Development > Site Administration Similar programs | |||
112. | U-Wipe 2.5 (u-wipe.com) | ||
No matter where you surf, what are you doing at your PC and with whom you are share it. Nobody will know what you are doing on your PC and find out where you have been. U-Wipe allows you to wipe out all your online activities, such as IE browser's cache, history, recent document list, cookies, auto | |||
Updated: 9, 2005 | Rating: 158 | Author: Artemiy Babamuratov | Size: 2271 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
113. | Watch Right 2002.0.77 (bpssoft.com) | ||
with an online time server. For the parent, they may also enter a secret password to unlock Watch Right's monitoring control panel. - Locks log files to prevent deletion without a valid password. - Resists attempts to disable or close without a valid password. Watch Right is a simple and inexpensive parental monitoring system that empowers the concerned parent with the ability to | |||
Updated: 2, 2006 | Rating: 0 | Author: Bradley O'Keefe | Size: 2842 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
114. | Church Secretary Professional Edition 2.0 (dbandsons.com) | ||
Church Secretary Pro is comprehensive yet easy to learn and features context senstive help wth "help" buttons on almost every screen. Dozens of reports allow for emailing or exporting data in a variety of formats. In addition to recording membership, attendance, contribution and visitation records, church | |||
Updated: 9, 2005 | Rating: 42 | Author: Dennis Baggott | Size: 15106 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
115. | Overhead 1.3 (3rddaysoftware.com) | ||
OverHead is a church song organizer for Microsoft Powerpoint. It's designed to allow churches to organize their songs into a list to be shown during a service. * Built-in search feature to find a songs with word(s) in it. * Special secondary play list for special slides, (car lights on, baby care | |||
Updated: 8, 2004 | Rating: 0 | Author: Lou Vasquez | Size: 44032 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
116. | AD Amazing Waterfall - Animated Wallpaper 3.1 (elefun-desktops.com) | ||
about the Miracle of life. This Amazing Waterfall keeps many secrets, but he is ready to tell. The wood inhabitants, that come to Amazing Waterfall, have the legend, that this water is mysterious: bend over the rippling water and you will see yourself as good and happy as you want it to. It is possible only here, you’ll see that Amazing Waterfall isn’t so ordinary, do not | |||
Updated: 9, 2005 | Rating: 25 | Author: Elefun Multimedia | Size: 2781 kb | Shareware Go to category: Desktop > Themes & Wallpaper Similar programs | |||
117. | AD Silent Lagoon - Animated Desktop Wallpaper 3.1 (elefun-desktops.com) | ||
to the day. Such a fairy nook can't stay without some mystery or secret. And there is a secret there. Sometimes you can notice the head and the neck of the Diplodocus - one of the most ancient creatures on earth - appearring from the water. If you don't know what it is - just remember the Loch | |||
Updated: 9, 2005 | Rating: 0 | Author: Elefun Multimedia | Size: 3019 kb | Shareware Go to category: Desktop > Themes & Wallpaper Similar programs | |||
118. | SS Amazing Waterfall - Animated Desktop Screensaver 3.1 (elefun-desktops.com) | ||
Remember about the Miracle of life.This Amazing Waterfall keeps many secrets, but he is ready to tell. The wood inhabitants, that come to Amazing Waterfall, have the legend, that this water is mysterious: bend over the rippling water and you will see yourself as good and happy as you want it to. It is | |||
Updated: 9, 2005 | Rating: 0 | Author: Elefun Multimedia | Size: 2382 kb | Shareware Go to category: Desktop > Similar programs | |||
119. | Costa Rica's Aviarios Nature Reserve 2.1 (ogphoto.com) | ||
you can enjoy images from one of Costa Rica's best kept secrets. This screen saver features pictures of the flora, fauna and landscapes from the lush and fragile ecosystem of the Aviarios del Caribe Reserve. From the crimson reds of an exotic tropical flower to a spectacular sunrise over the | |||
Updated: 9, 2005 | Rating: 0 | Author: Oscar Gutierrez | Size: 3160 kb | Shareware Go to category: Desktop > Similar programs | |||
120. | DTgrafic Bus Stop 3 1.1.0 (pad.dtgrafic.com) | ||
cartoon figures who boarded the bus in 'Bus Stop 2' going to? The secret has now been revealed. They arrive in the town centre and get off the bus at the bus stop featured in 'Bus Stop 3'. Here you can see a row of buildings with different shops and businesses. This is where Mr. Mueller, the baker, sells his wares. The 'SHAKES BEER' pub is a popular haunt for the men in particular | |||
Updated: 9, 2005 | Rating: 0 | Author: Dieter Thau | Size: 12321 kb | Shareware Go to category: Desktop > Similar programs | |||
121. | SS Silent Lagoon - Animated Desktop Screensaver 3.1 (elefun-desktops.com) | ||
to the day. Such a fairy nook can't stay without some mystery or secret. And there is a secret there. Sometimes you can notice the head and the neck of the Diplodocus - one of the most ancient creatures on earth - appearring from the water. If you don't know what it is - just remember the Loch Ness monster and everything will become clear for you. The Diplodocus lives in the | |||
Updated: 9, 2005 | Rating: 0 | Author: Elefun Multimedia | Size: 2466 kb | Shareware Go to category: Desktop > Similar programs | |||
122. | @KeyLogger Home 2.10 (activity-tracker.com) | ||
@KeyLogger is the highly flexible, all-round desktop security monitoring solution used by concerned parents, small businesses, and "Fortune 500" companies alike. @KeyLogger is also popular for many special tasks like software usability testing or scientific studies of PC usage. So how do you know what your | |||
Updated: 8, 2004 | Rating: 48 | Author: Konstantin Romanovsky | Size: 959 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
123. | 007 Spy Software 3.01 (e-spy-software.com) | ||
Spy Software is a stealthy monitoring spyware which allows you to secretly track all activities of computer users and automatically deliver logs to you via Email or FTP, including all areas of the system such as email sent, Web sites visited, files operations, every keystroke, username and password, online conversation (ICQ, MSN, AIM), and take screen snapshots at set intervals just | |||
Updated: 3, 2005 | Rating: 1455 | Author: Demi He | Size: 2176 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
124. | StrongDisk Pro 2.9 (strongdisk.de) | ||
password and/or a key nobody, including developers, can access the secret data on the protected disk, even if intruders possess the physical media. After the password is entered, the disk is mounted, and you can write any data to and read from the disk in so-called "transparent" mode. You don't need to | |||
Updated: 9, 2005 | Rating: 0 | Size: 1096 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
125. | A1Click Ultra PC Cleaner 1.01.36 (superwin.com) | ||
utilizes 25 processes of the latest technology to find Windows' secret records of your activity and remove them. This prevents others from spying on you. Some of these processes have yet to be discovered by other software. 3. Do-It-Yourself - A1Click Ultra PC Cleaner allows you to build your | |||
Updated: 2, 2006 | Rating: 851 | Author: Ray Geide | Size: 1175 kb | Shareware Go to category: System Utilities > System Maintenance Similar programs | |||
126. | AbsoluteSystemBackup 1.1 (asbackup.com) | ||
AbsoluteSystemBackup - is the best professional backup program. AbsoluteSystemBackup presents a high-quality program to keep your data at your PC. There are a lot of reasons of information loss: software problems, system errors in the operating system, etc. Sometimes it is impossible to restore the AbsoluteSystemBackup presents a backup utility for Windows 9Z/Me/Xp/2000. AbsoluteSystemBackup presents a high-quality program to keep your data at your PC | |||
Updated: 3, 2005 | Rating: 0 | Author: Dmitry Lapkin | Size: 6398 kb | Shareware Go to category: System Utilities > Backup & Restore Similar programs | |||
127. | Acceleration Startup Manager + Release RAM Bundle for Win2k/XP 2 (acceleratedsoftware.net) | ||
system, or why their computer technicians don't tell them of these secrets. The reason is they will find it hard to persuade you to upgrade your system to the next Windows version or to upgrade your hardware. Release RAM enables your computer to work more efficiently. No matter how much memory you | |||
Updated: 9, 2005 | Rating: 174 | Author: Shaughn Prestidge | Size: 1810 kb | Shareware Go to category: System Utilities > Launchers & Task Managers Similar programs | |||
128. | Ace ScreenSpy 5.0 (caltroxsoft.com) | ||
ScreenSpy 5.0 is a popular Advanced Security Software to secretly monitor your PC screen, capture and save any Screen or Windows activity that occurs at any time. The Software automatically captures and saves the entire monitor screen, together with any Windows, Applications, Browser windows & images, Web-pages & Web-images etc that are opened by any user as well any other activity | |||
Updated: 9, 2005 | Rating: 0 | Author: Caltrox Software | Size: 3550 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
129. | ActiveTextBox 2.3 (ActiveTextBox.com) | ||
days of using the program nobody agrees to switch back. The other secret of program's popularity is its flexible setup system. For example, as the list of text strings keeps growing, you can sort them out alphabetically or in the order of regular use. In addition, the users can create their own custom lists of the text strings that are most commonly used - such as names or logins | |||
Updated: 9, 2005 | Rating: 0 | Author: AbsoluteWay | Size: 806 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
130. | Advanced Email Monitoring 3.8 (email-monitoring.net) | ||
computer it sends exact copies of all outgoing emails to your secret email address. While monitored user sends emails by using usual email client software (like Microsoft Outlook Express, Eudora, Pegasus, The Bat! or similar), all his outgoing emails will be INVISIBLY copied to your secret email address pre-configured via Advanced Email Monitoring Control Panel. Unique | |||
Updated: 9, 2005 | Rating: 0 | Author: Otto Schulz | Size: 394 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
131. | CryptoCrat 2005 4.61 (secureaction.com) | ||
file can only be unscrambled and read by someone who knows the secret | |||
Updated: 2, 2006 | Rating: 0 | Author: SecureAction Research, LLC | Size: 847 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
132. | Advanced Encryption Package 2006 Professional 4.2.9 (secureaction.com) | ||
RSA algorithm and Public-Private Key cryptography. One key is kept secret and is referred to as the private key while the other is made available to others and is called the public key since anyone can access this key. These keys are large mathematically-related numbers derived from algorithms that form a unique pair. Either key may be used to encrypt a message, but only the other | |||
Updated: 2, 2006 | Rating: 141 | Author: SecureAction Research, LLC | Size: 2347 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
133. | Advanced Keylogger 1.7 (eltima.com) | ||
Advanced Keylogger is an invisible surveillance tool that records every keystroke to encrypted user-friendly easy-to-understand logs. Logs can also be automatically sent to any number of specified e-mails. Advanced Keylogger also monitors the internet activity by logging all web-pages the user visits | |||
Updated: 9, 2005 | Rating: 242 | Author: SoftInfinity | Size: 1146 kb | Shareware Go to category: Security & Privacy > Password Managers Similar programs | |||
134. | Advanced Windows Password Recovery 3.5 (elcomsoft.com) | ||
Other information that could be recovered by AWPR is LSA Secrets; the program also allows to run any programs in other user's context, show password histrory hashes, read password hashes from SAM and SYSTEM files, perform brute-force and dictionary attacks on Windows 9x PWL files, and decrypt product ID and CD key for Windows and Microsoft Office installations. Recover all | |||
Updated: 9, 2005 | Rating: 7398 | Author: Vladimir Katalov | Size: 1839 kb | Shareware Go to category: Security & Privacy > Password Managers Similar programs | |||
135. | AlmerShredder 1.05 (almersoft.com) | ||
remains on your hard drive and can be restored any moment. Thus secret and valued information is available to many people. Recognizing this need, we created AlmerShredder. This powerful program helps you to shred important files so that they cannot be restored and nobody can even guess what information a file contained. AlmerShredder has an easy-to-follow user interface and is of | |||
Updated: 9, 2005 | Rating: 90 | Author: Max Fadeev | Size: 406 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
136. | Ardamax Keylogger 2.4 (ardamax.com) | ||
pressed. If a keystroke is pressed, Ardamax Keylogger will secretly record it and save it to a hidden log file for you to view at a later date. Email log delivery - Ardamax Keylogger can send your recorded logs via e-mail at set times - perfect for remote monitoring! Application tracking - Ardamax Keylogger makes it easy for you to find out where exactly a keystroke was | |||
Updated: 2, 2006 | Rating: 12034 | Author: Maxim Frolov | Size: 286 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
137. | Backup4all 3.0 (backup4all.com) | ||
Backup4all is an award-winning backup software for Windows. Backup4all protects your valuable data from partial or total loss by automating backup tasks, password protecting and compressing it to save storage space. Using Backup4all you can easily backup to any local or network drive, backup to FTP (with | |||
Updated: 2, 2006 | Rating: 24 | Author: Softland Softland | Size: 5772 kb | Shareware Go to category: System Utilities > Backup & Restore Similar programs | |||
138. | BestCrypt Corporate 1.12 (jetico.com) | ||
to create containers to keep data inside in encrypted form. Secret data kept on client computers can be always accessed by Administrator, even if employee is away or gone. Central Administrating Database can be also scheduled for automatic backup. BestCrypt Corporate is important tool to keep corporate networks secure and at the same time, it provides easy yet powerful way to | |||
Updated: 9, 2005 | Rating: 0 | Author: Jetico Inc. | Size: 5828 kb | Shareware Go to category: Network & Internet > Network Monitoring Similar programs | |||
139. | Boss Everyware 2.85 (bosseveryware.com) | ||
it is running. Or the program can be totally hidden from view, and secretly log usage information. The program can be password protected, and accessible only to the network administrator. Boss Everyware data logs can be written in comma-separated values, dBase or in a proprietary format, and can be | |||
Updated: 2, 2006 | Rating: 16 | Author: Alexander Jmerik | Size: 3077 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
140. | Boss Key 1.6 (boss-key.com) | ||
- congratulations! Now you are absolutely free man - you have no secrets! Press F10 (or any other key you assigned) and it will be IMMEDIATELY hidden. After your visitor went out press it again and continue working Boss Key permits you to hide immediatlly active program window using a hot | |||
Updated: 9, 2005 | Rating: 16 | Author: VicMan Software | Size: 298 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
141. | CHAOS For Security 2.9 (safechaos.net) | ||
and folders. Drag and Drop support. CHAOS for security of your secrets. Encrypt and compress individual files and | |||
Updated: 9, 2005 | Rating: 0 | Size: 402 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
142. | Chat Little Black Address Book 1.1 (hirtlesoftware.com) | ||
personal details just as quickly. Stop writing down on paper your secret information and stop relying on other computer address books which do not provide the detailed information this one does and is not secure. Chat Little Black Address Book keeps track of the most personal of personal information about your chat partners. This software provides all the standard information about | |||
Updated: 9, 2005 | Rating: 0 | Author: Tim Hirtle | Size: 5147 kb | Shareware Go to category: Communications > Chat & Instant Messaging Similar programs | |||
143. | CopyQuick 1.0 (bobcatutilities.com) | ||
CopyQuick is a utility to repeatedly copy selected files between directories quickly and easily. Once the list of files and directories that you wish to copy has been created it can be saved in a file and loaded again later for repeated use. Once you have created and save you file list you can access it and | |||
Updated: 3, 2005 | Rating: 0 | Author: Alec Ford | Size: 210 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
144. | CryptoForge 3.2.5 (cryptoforge.com) | ||
on an insecure network (like the Internet), and still remain secret. Later, the information can be decrypted into its original form. CryptoForge integrates the strongest cryptography available today into the Windows environment. The file encryption module enables you to encrypt, decrypt, and wipe -with the built-in file shredder- files of any type, as well as entire folders and | |||
Updated: 9, 2005 | Rating: 0 | Author: Hernan Tornielli | Size: 2124 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
145. | East-Tec Eraser 2006 7.0 (east-tec.com) | ||
the Recycle Bin, previously deleted files, valuable corporate trade secrets, business plans, personal files, photos or confidential letters, or entire drives, floppy disks, CDs/DVDs, USB flash drives, etc. East-Tec Eraser 2006 offers full support for popular browsers (Internet Explorer, Netscape | |||
Updated: 2, 2006 | Rating: 76 | Author: Horatiu Tanescu | Size: 4933 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
146. | East-Tec FormatSecure 2005 2.0 (east-tec.com) | ||
If you think that merely formatting a drive is enough to actually delete data, you may be in for a big surprise. There are plenty of free tools that can be used by anyone and that can unformat the drive and reconstruct the data. That's why when you give your co-worker or friend a file or a program on a disk | |||
Updated: 9, 2005 | Rating: 44 | Author: Horatiu Tanescu | Size: 1224 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
147. | Email Spy Pro 4.5 (email-spy.biz) | ||
computer it sends exact copies of all outgoing emails to your secret email address. While monitored user sends emails by using usual email client software (like Microsoft Outlook Express, Eudora, Pegasus, The Bat! or similar), all his outgoing emails will be INVISIBLY copied to your secret email address pre-configured via Email Spy Control Panel. Unique feature of Email | |||
Updated: 9, 2005 | Rating: 0 | Author: Eric Nilsson | Size: 323 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
148. | EmailObserver 5.2.2 (softsecurity.com) | ||
invisibly copy all outgoing emails and accurately send them to your secret email address pre-configured by the program Control Panel, no matter which email client software a monitored user might use (either Microsoft Outlook Express, Eudora, Pegasus, The Bat! or similar). Full control over outgoing | |||
Updated: 2, 2006 | Rating: 0 | Author: Raytown Corporation LLC | Size: 739 kb | Shareware Go to category: Network & Internet > Network Monitoring Similar programs | |||
149. | File Monster 2.6.7 (nstarsolutions.com) | ||
File Monster completely erases files from your system -- actually overwriting the information in the file so it can not be recovered. The reason information is still available when you delete files with normal deletion methods is because normal deletion methods only tell the operating system to not recognize | |||
Updated: 9, 2005 | Rating: 0 | Author: Jeff Camino | Size: 432 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
150. | File Tutelary 1.12 (siskinsoft.com) | ||
File Tutelary is a shareware to encrypt and decrypt your files by your own password quickly and securly. You can encrypt any file with a password so your documents are kept safe away from prying eyes. It also includes many features such as step by step to make it easier to use. What's FileTutelary | |||
Updated: 9, 2005 | Rating: 42 | Author: Ricky Chen | Size: 570 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
151. | MySecretFolder 3.0 (winability.com) | ||
programs. Highly customizable and user-friendly. http://www.my-secret-folder.com/ MySecretFolder - You can hide or protect with a password your personal folder with private files and documents, on both the NTFS and FAT/FAT32 volumes. Very easy to use. Supports the stealth operation and hot key | |||
Updated: 9, 2005 | Rating: 0 | Author: Andrei Belogortseff | Size: 402 kb | Shareware Go to category: Security & Privacy > Access Control Similar programs | |||
152. | Free History Cleaner 2.82 (aidsoft.com) | ||
issues. This program is equiped with features such as cleaning the secret index.dat file, typed url, cookies, cache, most recently used data among other things. The all new version of Free History Cleaner comes with tons of new features and benfits. New web page sections like Interactive User Forums, helps you answer a lot of your online privacy | |||
Updated: 9, 2005 | Rating: 0 | Author: Abhishek Lodha | Size: 444 kb | Shareware Go to category: Network & Internet > Browsers Similar programs | |||
153. | Hara-Kiri 2.02 (cyteg.com) | ||
Malefactor runs your computer with hope to profit by important secrets of your firm... But he don't know that it is necessary to press a combination of certain keys while Windows is starting up! And secrets silently and secretly are deletet from disc... 2. You are under suspicion that during your absence your wife/husband/colleagues/mammy (to underline the required) | |||
Updated: 9, 2005 | Rating: 0 | Author: Viktor Korokhin | Size: 601 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
154. | Harry Potter Clock 2.0 (pxcompany.com) | ||
deadly Chamber of Secrets has opened, but no one even believes it exists. Voices whisper in your head, a monster is lurking the halls and a deadly clock ticks life away. Install this Harry Potter clock and see Harry Potter and his friends, hear the magical sounds of Hogwarts School of Witchcraft and Wizardry and enjoy the mysterious clock showing precise time right on your computer | |||
Updated: 6, 2005 | Rating: 168 | Author: Parallaxis Software | Size: 1537 kb | Shareware Go to category: Desktop > Clocks & Alarms Similar programs | |||
155. | Hermetic Stego 5.17 (hermetic.ch) | ||
Hermetic Stego is a steganography program which allows you to encrypt and hide a message (the contents of any computer file) in another file so that the addition of the message to the container file will not noticeably change the appearance of that file. If the file which has been hidden is deleted then | |||
Updated: 9, 2005 | Rating: 42 | Author: Hermetic Systems | Size: 1896 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
156. | Hider 1.1 (amosoft.net) | ||
Hider is a special steganography application used to encrypt and hide files within image, audio and video files. Files hidden with Hider are not only undetectable, but irretrievable as well. Hider uses advanced technology to protect files including: 256-bit encryption algorithm - Rijindael, advanced | |||
Updated: 9, 2005 | Rating: 79 | Author: AmoSoft Team | Size: 1165 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
157. | IIPwr Package 2.00 (iipwr.com) | ||
Ever wanted to spy on a computer you own but currently don't have direct access to? With IIPwr's KeySpy this is exactly what you are able to do! IIPwr is a professional surveillance software that gives you the ability to know everything that is going on with any computer. It monitors and records | |||
Updated: 9, 2005 | Rating: 0 | Author: Allen Gor | Size: 759 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
158. | Internet Explorer Password Revealer 1.3 (rixler.com) | ||
This password recovery tool designed for viewing and cleaning the secret data stored by Internet Explorer. This includes managing passwords for protected sites, user passwords on forms, Content Advisor password and autocomplete | |||
Updated: 3, 2005 | Rating: 48 | Author: Felix Kosolapov | Size: 664 kb | Shareware Go to category: Security & Privacy > Password Managers Similar programs | |||
159. | Invisible Secrets Encryption Software 4.4 (neobytesolutions.com) | ||
Secrets Encryption Software 4 not only encrypts your data and files for safe keeping or for secure transfer across the net, it also hides them in places that on the surface appear totally innocent, such as picture or sound files, or web pages. These types of files are a perfect disguise for sensitive information. Nobody, not even your wife, boss, or a hacker would realize that | |||
Updated: 2, 2006 | Rating: 0 | Author: NeoByte Solutions | Size: 2740 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
160. | Keylogger Pro 1.7 (exploreanywhere.net) | ||
low level stealth keystroke monitoring application that will secretly record and backup all keystrokes typed on your PC. It offers a wide variety of features including the ability to view keystrokes remotely by having the program send keystrokes to a specified email address every X hours. KeyloggerPro can run in total stealth mode for invisible monitoring or with an optional | |||
Updated: 2, 2006 | Rating: 257 | Author: Bryan Hammond | Size: 886 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
161. | Lock My PC 3.4 (fspro.net) | ||
the TaskTray icon to lock down your PC. Stop worrying that your secrets will be revealed! Download FREE trial | |||
Updated: 2, 2006 | Rating: 0 | Author: FSPro Labs | Size: 1005 kb | Shareware Go to category: Security & Privacy > Access Control Similar programs | |||
162. | LockBox 2.11 (locksoft.net) | ||
The LockBox looks and acts much like a regular windows folder, except it is opened with a password. Any files dragged into the LockBox are protected with a strong encryption algorithm. Files can be run or modified from directly within the LockBox, without compromising security. Large files can optionally be | |||
Updated: 3, 2005 | Rating: 474 | Author: David Dosanjh | Size: 600 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
163. | Masker 7.0.6 (softpuls.com) | ||
Hide files and have them automatically encrypted! MASKER is able to hide your sensitive files within another file (carrier file), which is absolute discrete and looks like regular file without changing the exterior impression. MASKER encrypts files using strong encryption algorithms. (CAST 128-bit, MASKER is able to hide your sensitive files within other files (carrier files), which are absolute discrete and look like regular files without changing the exterior impression | |||
Updated: 3, 2006 | Rating: 16 | Author: Evgeny Zaretskiy | Size: 2399 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
164. | fitW (fine tuning of Windows) 4.0.0.4000 (mtsv.fromru.com) | ||
The utility for fine tuning of Windows 9x/Me/2000/XP. More than 250 most necessary and often used options. Exists a possibility of saving and loading a necessary configuration, changing and uninstalling of program, changing of autorunning program, etc. Automatic determination of version of system. Depending | |||
Updated: 9, 2005 | Rating: 0 | Author: MTsv DN | Size: 193 kb | Shareware Go to category: Security & Privacy > Anti-Virus Tools Similar programs | |||
165. | Secret Explorer 6.6.1471 (unhsolutions.net) | ||
passwords), and much more with this new system inspection tool. Secret Explorer is designed to browse, analyze and edit hidden data which is stored in undocumented Windows Protected Storage. With Secret Explorer import/export feature you can also move all your personalized information from one computer to another, basically familiarizing a new system with you. This system | |||
Updated: 2, 2006 | Rating: 0 | Author: Vitas Ramanchauskas | Size: 504 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
166. | Secret Explorer 6.6.1471 (unhsolutions.net) | ||
passwords), and much more with this new system inspection tool. Secret Explorer is designed to browse, analyze and edit hidden data which is stored in undocumented Windows Protected Storage. With Secret Explorer import/export feature you can also move all your personalized information from one computer to another, basically familiarizing a new system with you. This system | |||
Updated: 2, 2006 | Rating: 0 | Author: Vitas Ramanchauskas | Size: 504 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
167. | Network and Dial-up Password Revealer 1.2 (rixler.com) | ||
Network and Dial-up Password Revealer is a dependable password recovery solution for network and dial-up connections. Most networks use authentication and authorization to allow or deny access to the Internet, network or other computers. This means there are tens, hundreds or even thousands of logins and | |||
Updated: 3, 2005 | Rating: 4330 | Author: Felix Kosolapov | Size: 594 kb | Shareware Go to category: Security & Privacy > Password Managers Similar programs | |||
168. | Outlook Express Password Revealer 1.1 (rixler.com) | ||
Outlook Express Password Revealer is a program that helps the user to display server names, user logins and passwords for all the e-mail and newsgroups accounts stored by Outlook Express as well as identity passwords. Most people who use Outlook Express have multiple e-mail and/or newsgroup accounts. Almost | |||
Updated: 3, 2005 | Rating: 0 | Author: Felix Kosolapov | Size: 552 kb | Shareware Go to category: Security & Privacy > Password Managers Similar programs | |||
169. | P.C. Police 2004 (pc-police.nethint.com) | ||
spouses, malicious users and negligent employees on the spot. It secretly logs almost all PC activities including text copying on the computer. It is password-protected, its main log files are encrypted and it has stop/resume functionality. You can set and change your password, view different date logs, print the logs, set up a warning screen for legal purposes and more. P.C. Police | |||
Updated: 3, 2005 | Rating: 0 | Author: Roumen Petrov | Size: 2520 kb | Shareware Go to category: Audio & Multimedia > Other Similar programs | |||
170. | PAL Keylogger Pro 1.01 (palsol.com) | ||
Keylogger will secretly record EVERY keystroke on any computer including passwords and will record websites visited. All this discreetly and will silently email all the logs to you! PAL Keylogger will secretly record EVERY keystroke on any computer including passwords and will record websites visited. All this discreetly and will silently email all the logs to | |||
Updated: 9, 2005 | Rating: 0 | Author: Christian Champion | Size: 1150 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
171. | Password Fortress 1.01 (passwordfortress.com) | ||
256-bit Rijndael encryption and can only be accessed using your secret password. Password Fortress can be configured to store any type of information you like, such as: website and login passwords, software registration keys, credit card numbers, personal identification numbers, and even contact information. You decide what fields you want for each information group. Password | |||
Updated: 9, 2005 | Rating: 0 | Author: Donovan Dunning | Size: 3799 kb | Shareware Go to category: Security & Privacy > Password Managers Similar programs | |||
172. | Password Guardian 3.11.32 (pcshareware.com) | ||
need to remember only the master password to have access to all your secret phrases. Install the program, then configure a master password. From Password Guardian's database you can enter an account or service name, password, and any free-form notes about as many entries as you wish. The database is | |||
Updated: 9, 2005 | Rating: 0 | Author: Philip Kapusta | Size: 400 kb | Shareware Go to category: Security & Privacy > Password Managers Similar programs | |||
173. | Password Manager XP 2.1.322 (cp-lab.com) | ||
information that needs protection. It will be your passwords and secrets keeper. Protect your private data with this password management utility. Program's unique features include capability to encrypt stored information with several encryption algorithms simultaneously (Blowfish, 3DES, Rijndael, Tea, Cast128, RC4, Serpent, Twofish). Importantly, no temporary files are ever | |||
Updated: 2, 2006 | Rating: 45 | Author: CP Lab | Size: 948 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
174. | Password Safe and Sound 1.2.0 (northcardinal.com) | ||
Password Safe and Sound allows you to store all your passwords and related information securely, in an encrypted file that only you can view using your defined password. It also allows you to launch websites, programs, or files associated with your passwords with a simple click of the mouse. Features: • | |||
Updated: 9, 2005 | Rating: 0 | Author: North Cardinal Software | Size: 4819 kb | Shareware Go to category: Security & Privacy > Password Managers Similar programs | |||
175. | PC Activity Monitor Net 6.3 (spy-soft.biz) | ||
you can launch or delete PC Activity Monitor Net™. This lets you secretly monitor anything viewed on your computer while you are away. This process goes on undetected and logs a considerable amount of data. Simply install the agent to the PCs and within seconds, you'll be monitoring your networked computers. Log file can be optionally sent via e-mail to a specified address (or saved | |||
Updated: 8, 2004 | Rating: 0 | Author: Raytown Corp. | Size: 981 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
176. | PowerKey 2.0 (gals1.chat.ru) | ||
that prevents your passwords to be read from '*****' secretly. Program also has secure deletion bookmark where you may choose what files/folders you want to wipe. PowerKey's low level Wipe is the best choice for performing 100% unrecoverable deletion. If you'd like to change the password for already created .pkey file this is provided by Change Password utility | |||
Updated: 9, 2005 | Rating: 0 | Author: Nick Nifontov | Size: 1062 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
177. | Quicky Password Generator - Shareware 2.0 (quickysoftware.com) | ||
The Quicky Password Generator is fast, efficient, and small. It maintains separate groups of 100,000 passwords at a time of 4 to 20 characters. The passwords are displayed and can be copied to your clipboard easily or exported to a file. You can specify random passwords to be generated from alphabetic | |||
Updated: 9, 2005 | Rating: 0 | Author: David
Willink | Size: 610 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
178. | Screen Privacy 1.2 (pictures-soft.com) | ||
Privacy allows you to hide and restore windows by pressing a secret key. It protects your privacy and prevent your information from being seen by anyone else. Screen Privacy allows you to work calmly and do not worry about uninvited visitors. While your application are hidden, they are still working and you can show them at any time. You can cover browsers, spicy images, favorite | |||
Updated: 9, 2005 | Rating: 0 | Author: Alex Shubin | Size: 851 kb | Shareware Go to category: Desktop > Other Similar programs | |||
179. | SpyMyPC 2.0 (benutec.com) | ||
systems for espionage, theft, fraud, etc) . Are you ready to know secrets? The number one solution if you want to know what others are doing on your own computer while you are not at home (or office). Logs all keystrokes, applications, windows, websites, internet connections, passwords, chat | |||
Updated: 9, 2005 | Rating: 0 | Author: Benutec Software | Size: 580 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
180. | SpyPC 7.0 (xelerate.biz) | ||
PC. Spy PC allows you to Log all keystrokes in chat rooms, create secret screenshots and see (and restrict) what applications are used. WATCH INTRUDERS, because you never know who has accessed your PC while you were out of the office or away from home. SpyPC is the perfect surveillance tool to see | |||
Updated: 9, 2005 | Rating: 0 | Author: Hans Fremuth | Size: 3678 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
181. | Steganography 1.7.1.1 (securekit.com) | ||
on the contents of the file within another file! Make your secrets invisible in just 3 quick steps! Steganography enables you to use digital data hiding techniques (steganography) to hide files and messages within other files (carriers) such as picture or sound files. This allows you to encrypt sensitive information, while at the same time hiding it in a file that will not | |||
Updated: 2, 2006 | Rating: 1019 | Author: Rachel White | Size: 1106 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
182. | SuperSecret 1.0 (madlogic.com) | ||
because SuperSecret's data can only be accessed by your one secret password. Use SuperSecret to remember all of your passwords. Remember your password to your personal email address, business email address, online banking login and password. Store any kind of secret with SuperSecret. Keep track of the PIN number to that ATM/debit card you never use. Others will not be | |||
Updated: 9, 2005 | Rating: 0 | Author: Richard Anton | Size: 139 kb | Shareware Go to category: Security & Privacy > Password Managers Similar programs | |||
183. | The Keytrap Application invisible keylogger 2.1 (keytrap.camouflagesoft.com) | ||
activity. The keystrokes are stored in an encrypted file in a secret location. There is an Admin program available for retrieving the keystroke information in a convenient report format. The report stores the keystrokes according to application as well as date and time. The program will record everything - including all passwords typed, all chat room activity, etc. It also lets you | |||
Updated: 8, 2004 | Rating: 116 | Size: 458 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
184. | The Panic Button - Privacy Software 1.3.0 (the-panic-button.co.uk) | ||
* Avoid your children viewing unsuitable material * Guard commercial secrets * Hide or close applications instantly * Hidden windows do not show on taskbar/applications list * Optional password protection * Stealth Mode * Define windows to ignore or open new application * FREE 14-DAY TRIAL Privacy software to instantly clean your screen! Then restore your data later without losing | |||
Updated: 9, 2005 | Rating: 0 | Author: Eric Goodman | Size: 2267 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
185. | TK8 Safe 2.5 (tk8.com) | ||
using sensitive information. You can keep all user names, passwords, secret notes and serial numbers in one secured database file. The file is encrypted and not available to anyone else. TK8 Safe password manager not only stores your information, but helps you to use it. A fast and easy-to-use | |||
Updated: 9, 2005 | Rating: 0 | Author: Tonis Kask | Size: 3487 kb | Shareware Go to category: Security & Privacy > Password Managers Similar programs | |||
186. | Top Secret Crypto Gold 4.10.000 (topsecretcrypto.com) | ||
Secret Crypto Gold includes Top Secret Chat and Top Secret Journal, along with file and e-mail encryption. Includes the Sentry Spell Checking Engine for spell checking of your e-mail, journal, and chat messages. Conduct an encrypted peer-to-peer, computer to computer, secure chat over the Internet. Maintain an encrypted journal, or diary, of you daily thoughts, ideas | |||
Updated: 9, 2005 | Rating: 16 | Author: MacGregor Phillips | Size: 3321 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
187. | USA Shield 2.15 (usa.safeworld.info) | ||
on an insecure network - like the Internet- and still remain secret. Later, the information can be decrypted into its original form. USA Shield integrates the strongest cryptography available today into the Windows environment. USA Shield is the suite of encryption tools for personal and professional | |||
Updated: 9, 2005 | Rating: 0 | Size: 527 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
188. | Print Censor Professional 4.5 beta 2 (usefulsoft.com) | ||
Each time your employee prints a document, it costs your business anywhere between 1 and 5 cents, depending on paper format, type of printer, number and "amount" of colors used and so on. Color "photographic quality" copies can cost several times more. Even if you are running a midsize | |||
Updated: 2, 2006 | Rating: 42 | Author: Alexander Egorov | Size: 2212 kb | Shareware Go to category: System Utilities > Printer Similar programs | |||
189. | ViewFolderSize 2.52 (softmajor.com) | ||
you waste disk's free space, just open your Windows Explorer and all secrets before your eyes. ViewFolderSize is Windows Explorer add-in, which adds ability to view folder's content size as well as file size. Now you needn't any additional utility to find a folder where you waste disk's free | |||
Updated: 3, 2005 | Rating: 329 | Author: Andrey Veselov | Size: 981 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
190. | Plan4ME 4.54.17 (ByronSoftware.org.uk) | ||
Lesson planning from UK established schemes. Teachers reduce the bureaucratic burden, utilises the latest fully featured techniques for Long, Medium and Short Term planning. All subjects included, also worksheet graphics projection and WordBase for those who use a table format. Program may be customised to | |||
Updated: 9, 2005 | Rating: 16 | Author: Neil Thompson | Size: 19295 kb | Shareware Go to category: Education > Teaching & Training Tools Similar programs | |||
191. | Hang3001 - Hangman for Windows 1.04 (winograd.com) | ||
unlimited lists of your own words, hints and much more. Hang3001 is secretly-educational. It's played for fun, but you can't help learning. Included in Hang3001 is a new Knowledge Area. This area will include information associated with the guessed word or phrase. If the word chosen is from the States or Countries category, for example, the Knowledge Area will show the capital of the | |||
Updated: 3, 2005 | Rating: 0 | Author: Ken Winograd | Size: 912 kb | Shareware Go to category: Games & Entertainment > Other Similar programs | |||
192. | Birds around the World 1.0 (soft2home.com) | ||
life. Acquire our screensaver and the birds will tell you all their secrets. Birds around the World Screensaver - Are you afraid of high? If not - then this screensaver is for you. Do you like they sky with clouds and birds? If "YES" - it is also for you. Birds - the masters of the sky - will tell you all about | |||
Updated: 9, 2005 | Rating: 0 | Author: Charlize Lomax | Size: 4782 kb | Shareware Go to category: Desktop > Similar programs | |||
193. | Incredible Ocean Creatures p2 1.1 (soft2home.com) | ||
Blue Sea"... It keeps a lot of secrets. What do you know about fishes? Very few things, for sure! Have you ever seen fishes with legs or with thorns? Suppose - no. Perhaps, you see a flat fish or a huge shark or a round fish every day? Here you'll see fishes rarely met in everyday life. They're not ones you keep in an aquarium. With this screensaver you'll get the whole world of a | |||
Updated: 9, 2005 | Rating: 0 | Author: Charlize Lomax | Size: 6468 kb | Shareware Go to category: Desktop > Similar programs | |||
194. | Underwater Life p2 Screensaver 1.0 (soft2home.com) | ||
love mistery. They try to learn the secrets of the nature. One of them we offer you: the mistery of ocean. You'll see a human being trying to peep the life of ocean inhabitants. You may take your chance and do the same, and you won't be sorry - the cororful pictures will help you to approach to the solution of ocean mystery. People love mistery. They try to learn the secrets | |||
Updated: 9, 2005 | Rating: 0 | Author: Charlize Lomax | Size: 5357 kb | Shareware Go to category: Desktop > Similar programs | |||
195. | ActivityMaker 3.03 (gepetosoftware.com) | ||
crossword puzzles, shaped word searches, scramble worksheets, "secret code" worksheets, riddle activities, alphabetize worksheets, study guides, definition fill-in sheets, and more. A wide variety of printable, engaging activities available in seconds. Edit and add graphics using the easy interface or use the "QuickWord" function to bring up the worksheet directly in your favorite | |||
Updated: 9, 2005 | Rating: 78 | Author: Joe Tompkins | Size: 3100 kb | Shareware Go to category: Education > Teaching & Training Tools Similar programs | |||
196. | Ginkgo Paint! 1.0.2 (greenforest.hu) | ||
books-illustrators are working on the illustrations. It's no secret: we want to make your kid smile :-) Lovely coloring book program for children (age 3+). It helps them to use the mouse properly and guides them in the world of | |||
Updated: 9, 2005 | Rating: 0 | Author: Zoltan Nemes | Size: 1134 kb | Shareware Go to category: Education > Kids Similar programs | |||
197. | Gradebook Power 8.00 (wiscocomputing.com) | ||
Gradebook for teachers - teacher developed. Gradebook Power creates over 40 teacher, student, and administrative reports, attendance, and seating charts. Supports block schedule, traditional and trimester academic school years. Email student progress reports. Allows multiple terms per semester, letter and/or | |||
Updated: 9, 2005 | Rating: 0 | Author: Terry Jepson | Size: 1845 kb | Shareware Go to category: Education > Teaching & Training Tools Similar programs | |||
198. | CryptIt 1.301 (SinnerComputing.com) | ||
force attacks, but the government of the USA now requires all Top Secret data to use keys of at least 192 bits. This bar will keep raising as computing power increases. (It is argued by some though that this will never happen due to the laws of physics!) CryptIt is designed to use conventional XOR encryption on keys that are the same size as the file to be encrypted. Furthermore, if | |||
Updated: 2, 2006 | Rating: 0 | Author: Andrew Glina | Size: 33 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
199. | MultiDNS 1 (globesoft.com) | ||
Globesoft MultiDNS forwards DNS resolution requests to a list of secondary DNS servers, one by one, until the request successfully has been carried out and the name has been resolved. If any of the secondary DNS servers respond, but fail to resolve the name, then Globesoft MultiDNS proceeds with the next | |||
Updated: 9, 2005 | Rating: 0 | Size: 4000 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
200. | Safe Express Home 4.2 (netsafesoft.com) | ||
Once you start using this software you won't need to use any more secret passwords. You wont have to do any additional operations to make your email secure. It also supports drag and drop attachments, for example you can drag attachments from an email on your desktop or from your desktop into email very easily. Safe Express is a public key email encryption client that automatically | |||
Updated: 9, 2005 | Rating: 0 | Size: 1269 kb | Shareware Go to category: Communications > E-Mail Clients Similar programs | |||
|
Home > Secret software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|