|
||||||
|
||
|
Home > Mute software |
Related keywords: mute sound card |
|
|
261. | AAA HTMLEncryptor 1.21 (share2.com) | ||
AAA HTML Encryptor can encrypt html web pages and make them unreadable. As a result, the source code of the website was protected from being analysed by hackers or competitors. AAA HTML Encryptor can encrypt html web pages and make them unreadable. As a result, the source code of the website was protected from being analysed by hackers or competitors. | |||
Updated: 9, 2005 | Rating: 124 | Author: JiaFu Li | Size: 479 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
262. | ABF Password Recovery 1.71 (abf-soft.com) | ||
ABF Password Recovery is a program to retrieve lost or forgotten passwords for many well known programs and popular file formats. All passwords are recovered instantly. Passwords for programs can be recovered for current installation of Windows only. There are some useful tools inside the program, such as | |||
Updated: 2, 2006 | Rating: 196 | Author: Dmitry Golovenko | Size: 1384 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
263. | Accent OFFICE Password Recovery 2.40 (passwordrecoverytools.com) | ||
Ever thought: "If I were a hacker...?" No, I don't mean you'd rob banks via the Internet. Being a hacker, though, you'd never have to re-write an annual report just because of a lost password for an Office document. You'd never have to wait if your colleague forgot to send you the info needed to open an Excel | |||
Updated: 2, 2006 | Rating: 1940 | Author: Denis Gladysh | Size: 734 kb | Shareware Go to category: Security & Privacy > Password Managers Similar programs | |||
264. | Access Denied 3.40 (johnru.com) | ||
Security program requests username and password or simple password upon boot-up and locks desktop by one mouse click. It can't be bypassed on Windows 95/98/ME. All unwanted people are kept out to your PC. Very flexible use: multi-user support(up to 450 users), password encryption, integration with your | |||
Updated: 9, 2005 | Rating: 58 | Author: Ivan Mayrakov | Size: 536 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
265. | Active Keyboard 3.1 (drive-software.com) | ||
your CD-ROM - Lock and Unlock your CD-ROM - Change the volume, mute - Logon and Power management - Open dialup connections - Empty recycle bin - Create New Folder - Lock/Unlock Desktop - Show/Hide Windows - Show/Hide Icons from Desktop - Restart Explorer - Lock/Unlock Mouse - Assign text phrases, date and time stamps to hot keys - Multilingual interface | |||
Updated: 2, 2006 | Rating: 144 | Author: Dmitri Drive | Size: 914 kb | Shareware Go to category: Desktop > Other Similar programs | |||
266. | Active System Locker 3.0 (sowsoft.com) | ||
System Locker is a handy utility that allows you to protect your personal computer from unauthorized access. You can use System Locker to restrict access to your PC. It is attractive, secure, and very easy to use. It starts automatically with Windows and optionally locks your desktop upon loading. It hides | |||
Updated: 9, 2005 | Rating: 138 | Author: Vladimir Sinitsyn | Size: 611 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
267. | Advanced Anti Keylogger 3.7 (anti-keylogger.net) | ||
Advanced Anti Keylogger is powerful but easy to use anti-spy software to prohibit operation of any keyloggers currently in use or presently being developed anywhere. Once installed our anti-spy software will protect your privacy immediately and constantly. One particularly scary and dangerous feature of all | |||
Updated: 2, 2006 | Rating: 132 | Author: Eric Nilsson | Size: 783 kb | Shareware Go to category: Security & Privacy > Anti-Spam & Anti-Spy Tools Similar programs | |||
268. | Advanced Anti Spy 4.3 (anti-spy.biz) | ||
Advanced Anti Spy is powerful but easy to use anti-spy software to prohibit operation of any keyloggers currently in use or presently being developed anywhere. Once installed our anti-spy software will protect your privacy immediately and constantly. It does not rely on a spyware database or requires updates | |||
Updated: 9, 2005 | Rating: 0 | Author: Otto Schulz | Size: 483 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
269. | Advanced Password Manager 2.33 (rayslab.com) | ||
If you've been using the Internet actively for over a year, you probably have at least a dozen of different logins and passwords to remember - one for your e-mail, couple for your credit cards and bank accounts, a few more for online newspapers and magazines, and one for each online shop or auction where you | |||
Updated: 9, 2005 | Rating: 0 | Author: Rayslab Inc. | Size: 1086 kb | Shareware Go to category: Security & Privacy > Password Managers Similar programs | |||
270. | Agent Password 1.8 (agentpassword.com) | ||
Agent Password is your trusted password informer. The program is intended for automatic saving of all logins and passwords entered. It can be used not only as password keeping software but as a password spy, too. The manufacturer is not responsible for any inappropriate use of the program. We simply | |||
Updated: 8, 2004 | Rating: 251 | Author: Pavel Mikhailov | Size: 902 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
271. | Anti-keylogger 6.1 (anti-keyloggers.com) | ||
Anti-keylogger for Windows 2000/XP provides every computer with strong protection against most types of the keylogging software, both known and unknown. Anti-keylogger blocks keylogging programs activity without using of signature bases. Anti-keylogger is capable to buck various types of keylogging programs | |||
Updated: 9, 2005 | Rating: 16 | Author: Raytown Corporation LLC | Size: 2659 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
272. | ATS Warning! The Boss! 1.6 (apituan.com) | ||
hiding windows, applications and the icons in the systray and mute the sound of your PC. You will be able to hide entirely applications and windows, one by one, by class or by title or all very easily. Control the visibility by hotkeys that will give you total control of each window, hiding and showing them according to your needs. You will be able to modify the hotkeys according | |||
Updated: 9, 2005 | Rating: 0 | Author: Jorge Millet | Size: 2001 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
273. | Axessh Windows SSH Client 3.2 (labf.com) | ||
Axessh is a Windows SSH client. It is a superb terminal emulator/telnet client for Windows. It provides SSH capabilities to Axessh without sacrificing any of existing functionality. Furthermore, Axessh has been developed entirely outside of the USA, and can be sold anywhere in the world (apart from places | |||
Updated: 2, 2006 | Rating: 16 | Author: LabF LabF | Size: 3059 kb | Shareware Go to category: Network & Internet > Terminal & Telnet Clients Similar programs | |||
274. | BCWipe 3.07.2 (jetico.com) | ||
BCWipe ensures that another person will not restore files you have deleted from a disk. When you delete sensitive files from a disk on your computer, Windows does not erase the contents of these files from the disk - it only deletes 'references' to these files from filesystem tables. Contents of the deleted | |||
Updated: 9, 2005 | Rating: 24 | Author: Jetico Inc. | Size: 2651 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
275. | BestCrypt 7.20.2 (jetico.com) | ||
BestCrypt is easy-to-use, powerful data encryption software. You allocate a portion (container) of free space of your drive where you keep all your sensitive data in encrypted form. BestCrypt creates a virtual drive in your system which you work with like with any other drive. All data written there are | |||
Updated: 9, 2005 | Rating: 55 | Author: Jetico Inc. | Size: 5004 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
276. | BestCrypt Corporate 1.12 (jetico.com) | ||
BestCrypt Corporate provides protection of data in corporate networks using strong encryption algorithms. BestCrypt Corporate includes standard BestCrypt software that performs encryption/decryption operations creating virtual drives acting as regular drives. The core of BestCrypt Corporate is BestCrypt | |||
Updated: 9, 2005 | Rating: 0 | Author: Jetico Inc. | Size: 5828 kb | Shareware Go to category: Network & Internet > Network Monitoring Similar programs | |||
277. | Captain Mnemo Pro 1.4 (captainmnemo.com) | ||
Computers play significant role in our everyday life. We rely on tireless machines in almost every aspect of our business and private life. Everything from important corporate budget planning to vacation photos comes digital. And as we enjoy this new electronic world we sometimes seem to forget how many | |||
Updated: 8, 2004 | Rating: 116 | Author: ReFog Software | Size: 898 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
278. | CDSHiELD SE 1.04 (mindestworx.free.fr) | ||
CDSHiELD is a home-made cd-protector application which provide a awesome security against hackers. What's the benefits to using CDSHiELD ?: * Protect against unauthorised copying of the CD with a CD-Recorder using CD copying softwares. * Prevent users coying the contents of your CD-Rom to their | |||
Updated: 9, 2005 | Rating: 1704 | Author: Loki mindestworx | Size: 4390 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
279. | Chameleon 2.0 (members.optushome.com.au) | ||
Chameleon is a secure file encryption application that hides your files from anyone that monitors your emails, personal files even hard disk. More and more SPY software is being used; You need to be sure that files containing sensitive information are kept safe. There is no Electronic Privacy, especially on | |||
Updated: 9, 2005 | Rating: 0 | Author: Chris Dimopoulos | Size: 1437 kb | Adware Go to category: System Utilities > Other Similar programs | |||
280. | CHAOS Shredder 3.0 (safechaos.net) | ||
Windows does not physically remove deleted files from your hard disk. Emptying your Recycle Bin does NOT protect you at all. Your sensitive files can be recovered, even after you format your hard disk! When you delete a file from Windows, Windows just mark the file as deleted in file allocation table, but the | |||
Updated: 3, 2006 | Rating: 16 | Size: 195 kb | Freeware Go to category: System Utilities > File & Disk Management Similar programs | |||
|
Home > Mute software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|