|
||||||
|
||
|
Home > Secret software |
Related keywords: secret chamber, secret passwords, Surf Secret, secret key encryption, secret allies, The Secret Garden, invisible secret, secret pictures, secret diary, secret hotkey |
|
|
161. | Ardamax Keylogger 2.4 (ardamax.com) | ||
pressed. If a keystroke is pressed, Ardamax Keylogger will secretly record it and save it to a hidden log file for you to view at a later date. Email log delivery - Ardamax Keylogger can send your recorded logs via e-mail at set times - perfect for remote monitoring! Application tracking - Ardamax Keylogger makes it easy for you to find out where exactly a keystroke was | |||
Updated: 2, 2006 | Rating: 12034 | Author: Maxim Frolov | Size: 286 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
162. | Ardamax Keylogger Lite 1.2 (ardamax.com) | ||
pressed. If a keystroke is pressed, Ardamax Keylogger Lite will secretly record it and save it to a hidden log file for you to view at a later date. Application tracking - Ardamax Keylogger Lite makes it easy for you to find out where exactly a keystroke was pressed. Whenever a keystroke is typed, Ardamax Keylogger Lite will record the application that was in use that received the | |||
Updated: 9, 2005 | Rating: 3708 | Author: Maxim Frolov | Size: 366 kb | Freeware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
163. | Backup4all 3.0 (backup4all.com) | ||
Backup4all is an award-winning backup software for Windows. Backup4all protects your valuable data from partial or total loss by automating backup tasks, password protecting and compressing it to save storage space. Using Backup4all you can easily backup to any local or network drive, backup to FTP (with | |||
Updated: 2, 2006 | Rating: 24 | Author: Softland Softland | Size: 5772 kb | Shareware Go to category: System Utilities > Backup & Restore Similar programs | |||
164. | Boss Everyware 2.85 (bosseveryware.com) | ||
it is running. Or the program can be totally hidden from view, and secretly log usage information. The program can be password protected, and accessible only to the network administrator. Boss Everyware data logs can be written in comma-separated values, dBase or in a proprietary format, and can be | |||
Updated: 2, 2006 | Rating: 16 | Author: Alexander Jmerik | Size: 3077 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
165. | Boss Key 1.6 (boss-key.com) | ||
- congratulations! Now you are absolutely free man - you have no secrets! Press F10 (or any other key you assigned) and it will be IMMEDIATELY hidden. After your visitor went out press it again and continue working Boss Key permits you to hide immediatlly active program window using a hot | |||
Updated: 9, 2005 | Rating: 16 | Author: VicMan Software | Size: 298 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
166. | Chameleon 2.0 (members.optushome.com.au) | ||
you like without your attached files being revealed! Hide your most secret files with Chameleon, download or upload your hide files on a Server at the Internet. Chameleon is so strong not even a Server can find if your file hides something else inside. Chameleon allows you to hide files (all types of files), directory files by compressing (WinZip v1.0), encrypting (Double 128 bit | |||
Updated: 9, 2005 | Rating: 0 | Author: Chris Dimopoulos | Size: 1437 kb | Adware Go to category: System Utilities > Other Similar programs | |||
167. | CHAOS For Security 2.9 (safechaos.net) | ||
and folders. Drag and Drop support. CHAOS for security of your secrets. Encrypt and compress individual files and | |||
Updated: 9, 2005 | Rating: 0 | Size: 402 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
168. | Chat Little Black Address Book 1.1 (hirtlesoftware.com) | ||
personal details just as quickly. Stop writing down on paper your secret information and stop relying on other computer address books which do not provide the detailed information this one does and is not secure. Chat Little Black Address Book keeps track of the most personal of personal information about your chat partners. This software provides all the standard information about | |||
Updated: 9, 2005 | Rating: 0 | Author: Tim Hirtle | Size: 5147 kb | Shareware Go to category: Communications > Chat & Instant Messaging Similar programs | |||
169. | CryptoForge 3.2.5 (cryptoforge.com) | ||
on an insecure network (like the Internet), and still remain secret. Later, the information can be decrypted into its original form. CryptoForge integrates the strongest cryptography available today into the Windows environment. The file encryption module enables you to encrypt, decrypt, and wipe -with the built-in file shredder- files of any type, as well as entire folders and | |||
Updated: 9, 2005 | Rating: 0 | Author: Hernan Tornielli | Size: 2124 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
170. | East-Tec Eraser 2006 7.0 (east-tec.com) | ||
the Recycle Bin, previously deleted files, valuable corporate trade secrets, business plans, personal files, photos or confidential letters, or entire drives, floppy disks, CDs/DVDs, USB flash drives, etc. East-Tec Eraser 2006 offers full support for popular browsers (Internet Explorer, Netscape | |||
Updated: 2, 2006 | Rating: 76 | Author: Horatiu Tanescu | Size: 4933 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
171. | East-Tec File Shredder 1.0 (east-tec.com) | ||
and nobody will be able to recover your valuable corporate trade secrets, business plans, personal files, photos or confidential letters. East-Tec File Shredder overwrites and verifies the destruction of every bit of the file, making recovery impossible. Deleting a file with Windows or with other programs will leave the file contents on your hard disk, easy to be recovered by anyone | |||
Updated: 3, 2005 | Rating: 79 | Author: Horatiu Tanescu | Size: 709 kb | Freeware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
172. | East-Tec FormatSecure 2005 2.0 (east-tec.com) | ||
If you think that merely formatting a drive is enough to actually delete data, you may be in for a big surprise. There are plenty of free tools that can be used by anyone and that can unformat the drive and reconstruct the data. That's why when you give your co-worker or friend a file or a program on a disk | |||
Updated: 9, 2005 | Rating: 44 | Author: Horatiu Tanescu | Size: 1224 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
173. | Email Spy Pro 4.5 (email-spy.biz) | ||
computer it sends exact copies of all outgoing emails to your secret email address. While monitored user sends emails by using usual email client software (like Microsoft Outlook Express, Eudora, Pegasus, The Bat! or similar), all his outgoing emails will be INVISIBLY copied to your secret email address pre-configured via Email Spy Control Panel. Unique feature of Email | |||
Updated: 9, 2005 | Rating: 0 | Author: Eric Nilsson | Size: 323 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
174. | FastFolder by BB 3.3.0 (dogkennels.net) | ||
is a FREE full working version. There are NO registry changes nor secret files made. FastFolder by BB contains no Spyware or AdWare, and is totally non-intrusive. FastFolder by BB allows quick access to twelve selectable folders from a tray icon. It uses minimum system resources, and is a FREE full working version. FastFolder by BB contains no Spyware or AdWare and makes NO registry | |||
Updated: 9, 2005 | Rating: 0 | Author: Bernie Madigan | Size: 94 kb | Freeware Go to category: System Utilities > File & Disk Management Similar programs | |||
175. | File Monster 2.6.7 (nstarsolutions.com) | ||
File Monster completely erases files from your system -- actually overwriting the information in the file so it can not be recovered. The reason information is still available when you delete files with normal deletion methods is because normal deletion methods only tell the operating system to not recognize | |||
Updated: 9, 2005 | Rating: 0 | Author: Jeff Camino | Size: 432 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
176. | File Tutelary 1.12 (siskinsoft.com) | ||
File Tutelary is a shareware to encrypt and decrypt your files by your own password quickly and securly. You can encrypt any file with a password so your documents are kept safe away from prying eyes. It also includes many features such as step by step to make it easier to use. What's FileTutelary | |||
Updated: 9, 2005 | Rating: 42 | Author: Ricky Chen | Size: 570 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
177. | FileMap by BB 4.0.4 (dogkennels.net) | ||
be times when your firewall is out-smarted allowing files to be secretly installed to hard disk through no fault of your own. For other reasons, files in the windows and system directories will mysteriously grow over time. If you had a record of files before and after, it would be easy to determine which files do not belong. FileMap by BB lets you take control of the growing | |||
Updated: 9, 2005 | Rating: 30 | Author: Bernie Madigan | Size: 144 kb | Freeware Go to category: Security & Privacy > Other Similar programs | |||
178. | MySecretFolder 3.0 (winability.com) | ||
programs. Highly customizable and user-friendly. http://www.my-secret-folder.com/ MySecretFolder - You can hide or protect with a password your personal folder with private files and documents, on both the NTFS and FAT/FAT32 volumes. Very easy to use. Supports the stealth operation and hot key | |||
Updated: 9, 2005 | Rating: 0 | Author: Andrei Belogortseff | Size: 402 kb | Shareware Go to category: Security & Privacy > Access Control Similar programs | |||
179. | Free History Cleaner 2.82 (aidsoft.com) | ||
issues. This program is equiped with features such as cleaning the secret index.dat file, typed url, cookies, cache, most recently used data among other things. The all new version of Free History Cleaner comes with tons of new features and benfits. New web page sections like Interactive User Forums, helps you answer a lot of your online privacy | |||
Updated: 9, 2005 | Rating: 0 | Author: Abhishek Lodha | Size: 444 kb | Shareware Go to category: Network & Internet > Browsers Similar programs | |||
180. | Ghost Keylogger 3.80 (keylogger.net) | ||
every keystroke to an encrypted log file. The log file can be sent secretly with email to a specified receiver. Ghost Keylogger also monitors the Internet activity by logging the addresses of visited homepages. It monitors time and title of the active application; even text in editboxes and message | |||
Updated: 8, 2004 | Rating: 298 | Author: Jon Kagstrom | Size: 600 kb | Demo Go to category: System Utilities > Other Similar programs | |||
|
Home > Secret software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|