|
||||||
|
||
|
Home > Secrets software |
|
|
121. | Ace ScreenSpy 5.0 (caltroxsoft.com) | ||
ScreenSpy 5.0 is a popular Advanced Security Software to secretly monitor your PC screen, capture and save any Screen or Windows activity that occurs at any time. The Software automatically captures and saves the entire monitor screen, together with any Windows, Applications, Browser windows & images, Web-pages & Web-images etc that are opened by any user as well any other activity | |||
Updated: 9, 2005 | Rating: 0 | Author: Caltrox Software | Size: 3550 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
122. | ActiveTextBox 2.3 (ActiveTextBox.com) | ||
days of using the program nobody agrees to switch back. The other secret of program's popularity is its flexible setup system. For example, as the list of text strings keeps growing, you can sort them out alphabetically or in the order of regular use. In addition, the users can create their own custom lists of the text strings that are most commonly used - such as names or logins | |||
Updated: 9, 2005 | Rating: 0 | Author: AbsoluteWay | Size: 806 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
123. | Advanced Email Monitoring 3.8 (email-monitoring.net) | ||
computer it sends exact copies of all outgoing emails to your secret email address. While monitored user sends emails by using usual email client software (like Microsoft Outlook Express, Eudora, Pegasus, The Bat! or similar), all his outgoing emails will be INVISIBLY copied to your secret email address pre-configured via Advanced Email Monitoring Control Panel. Unique | |||
Updated: 9, 2005 | Rating: 0 | Author: Otto Schulz | Size: 394 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
124. | CryptoCrat 2005 4.61 (secureaction.com) | ||
file can only be unscrambled and read by someone who knows the secret | |||
Updated: 2, 2006 | Rating: 0 | Author: SecureAction Research, LLC | Size: 847 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
125. | Advanced Encryption Package 2006 Professional 4.2.9 (secureaction.com) | ||
RSA algorithm and Public-Private Key cryptography. One key is kept secret and is referred to as the private key while the other is made available to others and is called the public key since anyone can access this key. These keys are large mathematically-related numbers derived from algorithms that form a unique pair. Either key may be used to encrypt a message, but only the other | |||
Updated: 2, 2006 | Rating: 141 | Author: SecureAction Research, LLC | Size: 2347 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
126. | Advanced Keylogger 1.7 (eltima.com) | ||
Advanced Keylogger is an invisible surveillance tool that records every keystroke to encrypted user-friendly easy-to-understand logs. Logs can also be automatically sent to any number of specified e-mails. Advanced Keylogger also monitors the internet activity by logging all web-pages the user visits | |||
Updated: 9, 2005 | Rating: 242 | Author: SoftInfinity | Size: 1146 kb | Shareware Go to category: Security & Privacy > Password Managers Similar programs | |||
127. | Advanced Windows Password Recovery 3.5 (elcomsoft.com) | ||
Other information that could be recovered by AWPR is LSA Secrets; the program also allows to run any programs in other user's context, show password histrory hashes, read password hashes from SAM and SYSTEM files, perform brute-force and dictionary attacks on Windows 9x PWL files, and decrypt product ID and CD key for Windows and Microsoft Office installations. Recover all | |||
Updated: 9, 2005 | Rating: 7398 | Author: Vladimir Katalov | Size: 1839 kb | Shareware Go to category: Security & Privacy > Password Managers Similar programs | |||
128. | AlmerShredder 1.05 (almersoft.com) | ||
remains on your hard drive and can be restored any moment. Thus secret and valued information is available to many people. Recognizing this need, we created AlmerShredder. This powerful program helps you to shred important files so that they cannot be restored and nobody can even guess what information a file contained. AlmerShredder has an easy-to-follow user interface and is of | |||
Updated: 9, 2005 | Rating: 90 | Author: Max Fadeev | Size: 406 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
129. | Ardamax Keylogger 2.4 (ardamax.com) | ||
pressed. If a keystroke is pressed, Ardamax Keylogger will secretly record it and save it to a hidden log file for you to view at a later date. Email log delivery - Ardamax Keylogger can send your recorded logs via e-mail at set times - perfect for remote monitoring! Application tracking - Ardamax Keylogger makes it easy for you to find out where exactly a keystroke was | |||
Updated: 2, 2006 | Rating: 12034 | Author: Maxim Frolov | Size: 286 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
130. | Backup4all 3.0 (backup4all.com) | ||
Backup4all is an award-winning backup software for Windows. Backup4all protects your valuable data from partial or total loss by automating backup tasks, password protecting and compressing it to save storage space. Using Backup4all you can easily backup to any local or network drive, backup to FTP (with | |||
Updated: 2, 2006 | Rating: 24 | Author: Softland Softland | Size: 5772 kb | Shareware Go to category: System Utilities > Backup & Restore Similar programs | |||
131. | Boss Everyware 2.85 (bosseveryware.com) | ||
it is running. Or the program can be totally hidden from view, and secretly log usage information. The program can be password protected, and accessible only to the network administrator. Boss Everyware data logs can be written in comma-separated values, dBase or in a proprietary format, and can be | |||
Updated: 2, 2006 | Rating: 16 | Author: Alexander Jmerik | Size: 3077 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
132. | Boss Key 1.6 (boss-key.com) | ||
- congratulations! Now you are absolutely free man - you have no secrets! Press F10 (or any other key you assigned) and it will be IMMEDIATELY hidden. After your visitor went out press it again and continue working Boss Key permits you to hide immediatlly active program window using a hot | |||
Updated: 9, 2005 | Rating: 16 | Author: VicMan Software | Size: 298 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
133. | CHAOS For Security 2.9 (safechaos.net) | ||
and folders. Drag and Drop support. CHAOS for security of your secrets. Encrypt and compress individual files and | |||
Updated: 9, 2005 | Rating: 0 | Size: 402 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
134. | Chat Little Black Address Book 1.1 (hirtlesoftware.com) | ||
personal details just as quickly. Stop writing down on paper your secret information and stop relying on other computer address books which do not provide the detailed information this one does and is not secure. Chat Little Black Address Book keeps track of the most personal of personal information about your chat partners. This software provides all the standard information about | |||
Updated: 9, 2005 | Rating: 0 | Author: Tim Hirtle | Size: 5147 kb | Shareware Go to category: Communications > Chat & Instant Messaging Similar programs | |||
135. | CryptoForge 3.2.5 (cryptoforge.com) | ||
on an insecure network (like the Internet), and still remain secret. Later, the information can be decrypted into its original form. CryptoForge integrates the strongest cryptography available today into the Windows environment. The file encryption module enables you to encrypt, decrypt, and wipe -with the built-in file shredder- files of any type, as well as entire folders and | |||
Updated: 9, 2005 | Rating: 0 | Author: Hernan Tornielli | Size: 2124 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
136. | East-Tec Eraser 2006 7.0 (east-tec.com) | ||
the Recycle Bin, previously deleted files, valuable corporate trade secrets, business plans, personal files, photos or confidential letters, or entire drives, floppy disks, CDs/DVDs, USB flash drives, etc. East-Tec Eraser 2006 offers full support for popular browsers (Internet Explorer, Netscape | |||
Updated: 2, 2006 | Rating: 76 | Author: Horatiu Tanescu | Size: 4933 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
137. | East-Tec FormatSecure 2005 2.0 (east-tec.com) | ||
If you think that merely formatting a drive is enough to actually delete data, you may be in for a big surprise. There are plenty of free tools that can be used by anyone and that can unformat the drive and reconstruct the data. That's why when you give your co-worker or friend a file or a program on a disk | |||
Updated: 9, 2005 | Rating: 44 | Author: Horatiu Tanescu | Size: 1224 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
138. | Email Spy Pro 4.5 (email-spy.biz) | ||
computer it sends exact copies of all outgoing emails to your secret email address. While monitored user sends emails by using usual email client software (like Microsoft Outlook Express, Eudora, Pegasus, The Bat! or similar), all his outgoing emails will be INVISIBLY copied to your secret email address pre-configured via Email Spy Control Panel. Unique feature of Email | |||
Updated: 9, 2005 | Rating: 0 | Author: Eric Nilsson | Size: 323 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
139. | File Monster 2.6.7 (nstarsolutions.com) | ||
File Monster completely erases files from your system -- actually overwriting the information in the file so it can not be recovered. The reason information is still available when you delete files with normal deletion methods is because normal deletion methods only tell the operating system to not recognize | |||
Updated: 9, 2005 | Rating: 0 | Author: Jeff Camino | Size: 432 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
140. | File Tutelary 1.12 (siskinsoft.com) | ||
File Tutelary is a shareware to encrypt and decrypt your files by your own password quickly and securly. You can encrypt any file with a password so your documents are kept safe away from prying eyes. It also includes many features such as step by step to make it easier to use. What's FileTutelary | |||
Updated: 9, 2005 | Rating: 42 | Author: Ricky Chen | Size: 570 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
|
Home > Secrets software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|