|
||||||
|
||
|
Home > Secret software |
Related keywords: secret chamber, secret passwords, Surf Secret, secret key encryption, secret allies, The Secret Garden, invisible secret, secret pictures, secret diary, secret hotkey |
|
|
1. | Hangman Pro for Macintosh 2.0.7 (winograd.com) | ||
words, hints, timed games, photo fun, and much more. Hangman Pro is secretly-educational. It's played for fun, but you can't help learning. Included in Hangman Pro is a new Knowledge Area. This area will include information associated with the guessed word or phrase. If the word chosen is from the | |||
Updated: 3, 2006 | Rating: 0 | Author: Ken Winograd | Size: 1471 kb | Shareware Go to category: Games & Entertainment > Puzzle & Word Games Similar programs | |||
2. | MessLess Inventory 4.6 (messless.com) | ||
- household, small mom-and-pop store or factory. What's the secret of this software? Simple. The program comes with five built-in editors: Form Editor, Report Style Editor, HTML/TXT Output Editor, Formula Editor and ToolBar Editor. These editors make program adjustments a quick and easy process. There are also 16 various types of data entry fields which you can modify as desired | |||
Updated: 3, 2006 | Rating: 0 | Author: Mikhail Lishin | Size: 5992 kb | Shareware Go to category: Home & Hobby > Cataloging Similar programs | |||
3. | 007 Spy Software 3.86 (e-spy-software.com) | ||
Spy Software is a stealthy monitoring spyware which allows you to secretly track all activities of computer users and automatically deliver logs to you via Email or FTP, including all areas of the system such as email sent, Web sites visited, files operations, every keystroke, username and password, online conversation (ICQ, MSN, AIM), and take screen snapshots at set intervals just | |||
Updated: 3, 2006 | Rating: 1113 | Author: Jason H | Size: 1200 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
4. | ABC Amber QuattroPro Converter 2.02 (thebeatlesforever.com) | ||
ABC Amber QuattroPro Converter is an advanced utility which helps you convert your WQ1 (Corel QuattroPro) files to any format you wish (XLS, DBF, CSV, XML, PDF, HTML, CHM, RTF, HLP, DOC, and many more) easily and quickly. The software supports a batch conversion, a run from command line, more than 50 | |||
Updated: 3, 2006 | Rating: 0 | Author: ProcessText Group | Size: 1180 kb | Shareware Go to category: Business > Office Suites & Tools Similar programs | |||
5. | ABC Amber Lotus 1-2-3 Converter 2.04 (thebeatlesforever.com) | ||
ABC Amber Lotus 1-2-3 Converter is an advanced utility which helps you convert your WK1 (Lotus 1-2-3) files to any format you wish (XLS, DBF, CSV, XML, PDF, HTML, CHM, RTF, HLP, DOC, and many more) easily and quickly. The software supports a batch conversion, a run from command line, more than 50 languages | |||
Updated: 3, 2006 | Rating: 321 | Author: ProcessText Group | Size: 1181 kb | Shareware Go to category: Business > Office Suites & Tools Similar programs | |||
6. | ABC Amber PowerPoint Converter 2.02 (thebeatlesforever.com) | ||
ABC Amber PowerPoint Converter is an advanced tool which converts your PowerPoint presentations to any document format (PDF, CHM, HTML, RTF, HLP, DOC, MCW, WPS, SAM, RFT, WS4, WS7, WRI, etc.) easily and quickly. The software supports a batch conversion, a command line and more than 50 languages. Important Supports a batch conversion, a command line and more than 50 languages | |||
Updated: 3, 2006 | Rating: 253 | Author: ProcessText Group | Size: 1233 kb | Shareware Go to category: Business > Office Suites & Tools Similar programs | |||
7. | Masker 7.0.6 (softpuls.com) | ||
Hide files and have them automatically encrypted! MASKER is able to hide your sensitive files within another file (carrier file), which is absolute discrete and looks like regular file without changing the exterior impression. MASKER encrypts files using strong encryption algorithms. (CAST 128-bit, MASKER is able to hide your sensitive files within other files (carrier files), which are absolute discrete and look like regular files without changing the exterior impression | |||
Updated: 3, 2006 | Rating: 16 | Author: Evgeny Zaretskiy | Size: 2399 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
8. | Attachments Zip Compressor 1.4.5 (mapilab.com) | ||
Attachments Zip Compressor will help you to forget all the troubles with attached files in Microsoft Outlook 2000, 2002/XP and 2003: - You've sent a huge document and forgot to pack it? AZC will do that for you automatically! - You've received an executable file, and Microsoft Outlook blocked access to it | |||
Updated: 3, 2006 | Rating: 74 | Author: Andrey Manchuk | Size: 4 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
9. | EmailObserver 5.2.2 (softsecurity.com) | ||
invisibly copy all outgoing emails and accurately send them to your secret email address pre-configured by the program Control Panel, no matter which email client software a monitored user might use (either Microsoft Outlook Express, Eudora, Pegasus, The Bat! or similar). Full control over outgoing | |||
Updated: 2, 2006 | Rating: 0 | Author: Raytown Corporation LLC | Size: 739 kb | Shareware Go to category: Network & Internet > Network Monitoring Similar programs | |||
10. | Invisible Secrets Encryption Software 4.4 (neobytesolutions.com) | ||
Secrets Encryption Software 4 not only encrypts your data and files for safe keeping or for secure transfer across the net, it also hides them in places that on the surface appear totally innocent, such as picture or sound files, or web pages. These types of files are a perfect disguise for sensitive information. Nobody, not even your wife, boss, or a hacker would realize that | |||
Updated: 2, 2006 | Rating: 0 | Author: NeoByte Solutions | Size: 2740 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
11. | EmailObserver 5.2.2 (softsecurity.com) | ||
invisibly copy all outgoing emails and accurately send them to your secret email address pre-configured by the program Control Panel, no matter which email client software a monitored user might use (either Microsoft Outlook Express, Eudora, Pegasus, The Bat! or similar). Full control over outgoing | |||
Updated: 2, 2006 | Rating: 0 | Author: Raytown Corporation LLC | Size: 739 kb | Shareware Go to category: Network & Internet > Network Monitoring Similar programs | |||
12. | ABC Amber Excel Converter 2.04 (thebeatlesforever.com) | ||
ABC Amber Excel Converter was developed to help you convert your XLS (MS Excel) files to any format you wish (DBF, CSV, XML, PDF, HTML, CHM, RTF, HLP, DOC, and many more) easily and quickly. The software supports a batch conversion, a run from command line, more than 50 languages. Batch conversion ability Supports a batch conversion, a run from command line and more than 50 languages | |||
Updated: 2, 2006 | Rating: 84 | Author: ProcessText Group | Size: 1173 kb | Shareware Go to category: Business > Office Suites & Tools Similar programs | |||
13. | Print Censor Professional 4.5 beta 2 (usefulsoft.com) | ||
Each time your employee prints a document, it costs your business anywhere between 1 and 5 cents, depending on paper format, type of printer, number and "amount" of colors used and so on. Color "photographic quality" copies can cost several times more. Even if you are running a midsize | |||
Updated: 2, 2006 | Rating: 42 | Author: Alexander Egorov | Size: 2212 kb | Shareware Go to category: System Utilities > Printer Similar programs | |||
14. | Advanced Encryption Package 2006 Professional 4.2.9 (secureaction.com) | ||
RSA algorithm and Public-Private Key cryptography. One key is kept secret and is referred to as the private key while the other is made available to others and is called the public key since anyone can access this key. These keys are large mathematically-related numbers derived from algorithms that form a unique pair. Either key may be used to encrypt a message, but only the other | |||
Updated: 2, 2006 | Rating: 141 | Author: SecureAction Research, LLC | Size: 2347 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
15. | Natural Biorhythms 2.91 (whitestranger.com) | ||
Natural Biorhythms is a powerful, easy-to-use application ideal for making personal forecasts. This program is based on the western scientific theory of biorhythms, and contains additional features based upon oriental philosophy. Knowing your biorhythms, you can be sure about what to expect from each day in from each day in order to succeed at sports, dating, business, negotiations, exams, or job interviews. Be a winner in any situation | |||
Updated: 2, 2006 | Rating: 231 | Author: Dmitry Konovalov | Size: 1539 kb | Shareware Go to category: Home & Hobby > Health & Nutrition Similar programs | |||
16. | Secret Explorer 6.6.1471 (unhsolutions.com) | ||
passwords), and much more with this new system inspection tool. Secret Explorer is designed to browse, analyze and edit hidden data which is stored in undocumented Windows Protected Storage. With Secret Explorer import/export feature you can also move all your personalized information from one computer to another, basically familiarizing a new system with you. This system | |||
Updated: 2, 2006 | Rating: 0 | Author: Vitas Ramanchauskas | Size: 504 kb | Shareware Similar programs | |||
17. | Secret Explorer 6.6.1471 (unhsolutions.com) | ||
passwords), and much more with this new system inspection tool. Secret Explorer is designed to browse, analyze and edit hidden data which is stored in undocumented Windows Protected Storage. With Secret Explorer import/export feature you can also move all your personalized information from one computer to another, basically familiarizing a new system with you. This system | |||
Updated: 2, 2006 | Rating: 0 | Author: Vitas Ramanchauskas | Size: 504 kb | Shareware Similar programs | |||
18. | Steganography 1.7.1.1 (securekit.com) | ||
on the contents of the file within another file! Make your secrets invisible in just 3 quick steps! Steganography enables you to use digital data hiding techniques (steganography) to hide files and messages within other files (carriers) such as picture or sound files. This allows you to encrypt sensitive information, while at the same time hiding it in a file that will not | |||
Updated: 2, 2006 | Rating: 1019 | Author: Rachel White | Size: 1106 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
19. | Steganography 1.7.1.1 (pipisoft.com) | ||
on the contents of the file within another file! Make your secrets invisible in just 3 quick steps! Steganography enables you to use digital data hiding techniques (steganography) to hide files and messages within other files (carriers) such as picture or sound files. This allows you to encrypt sensitive information, while at the same time hiding it in a file that will not | |||
Updated: 2, 2006 | Rating: 0 | Author: Rachel White | Size: 1106 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
20. | Secret Explorer 6.6.1471 (unhsolutions.net) | ||
passwords), and much more with this new system inspection tool. Secret Explorer is designed to browse, analyze and edit hidden data which is stored in undocumented Windows Protected Storage. With Secret Explorer import/export feature you can also move all your personalized information from one computer to another, basically familiarizing a new system with you. This system | |||
Updated: 2, 2006 | Rating: 0 | Author: Vitas Ramanchauskas | Size: 504 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
|
Home > Secret software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|