|
||||||
|
||
|
Home > Secret software |
Related keywords: secret chamber, secret passwords, Surf Secret, secret key encryption, secret allies, The Secret Garden, invisible secret, secret pictures, secret diary, secret hotkey |
|
|
221. | Password Officer DeLuxe 5.0 (compelson.com) | ||
strongest possible encryption, secure database of your most valued secrets, automatic logon to applications, servers, information systems, terminals and web pages, quick search, smart-card support. Now you can be more productive and secure. -universal Single Sign-on solution -fully handles logon to web-pages -fills in the URL, forms, clicks to buttons -detects and fills in any | |||
Updated: 9, 2005 | Rating: 0 | Author: COMPELSON Laboratories | Size: 934 kb | Commercial Go to category: System Utilities > Other Similar programs | |||
222. | Password Safe and Sound 1.2.0 (northcardinal.com) | ||
Password Safe and Sound allows you to store all your passwords and related information securely, in an encrypted file that only you can view using your defined password. It also allows you to launch websites, programs, or files associated with your passwords with a simple click of the mouse. Features: • | |||
Updated: 9, 2005 | Rating: 0 | Author: North Cardinal Software | Size: 4819 kb | Shareware Go to category: Security & Privacy > Password Managers Similar programs | |||
223. | PC Activity Monitor Net 6.3 (spy-soft.biz) | ||
you can launch or delete PC Activity Monitor Net™. This lets you secretly monitor anything viewed on your computer while you are away. This process goes on undetected and logs a considerable amount of data. Simply install the agent to the PCs and within seconds, you'll be monitoring your networked computers. Log file can be optionally sent via e-mail to a specified address (or saved | |||
Updated: 8, 2004 | Rating: 0 | Author: Raytown Corp. | Size: 981 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
224. | PCWash 3.2 (pcwash.com) | ||
safely and securely erase the secrets your computer is keeping about you, eliminate evidence of your online surfing activities, delete sensitive data, cover your tracks and regain your personal privacy with PCWash. PCWash erases/deletes index.dat, internet history, cookies, auto complete, recent files lists, browser cache, browser history logs, site addresses, Windows | |||
Updated: 9, 2005 | Rating: 0 | Author: Andrew Wroblewski | Size: 3134 kb | Commercial Go to category: System Utilities > Other Similar programs | |||
225. | PowerKey 2.0 (gals1.chat.ru) | ||
that prevents your passwords to be read from '*****' secretly. Program also has secure deletion bookmark where you may choose what files/folders you want to wipe. PowerKey's low level Wipe is the best choice for performing 100% unrecoverable deletion. If you'd like to change the password for already created .pkey file this is provided by Change Password utility | |||
Updated: 9, 2005 | Rating: 0 | Author: Nick Nifontov | Size: 1062 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
226. | Quicky Password Generator 1.2 (quickysoftware.com) | ||
The Quicky Password Generator is fast, efficient, small and it is free!. It generates up to 100,000 passwords at a time of 4 to 20 characters. The passwords are displayed and can be copied to your clipboard easily. There are options for alphanumeric, uppercase only, variable length, and special characters | |||
Updated: 9, 2005 | Rating: 0 | Author: David
Willink | Size: 338 kb | Freeware Go to category: System Utilities > Other Similar programs | |||
227. | Quicky Password Generator - Shareware 2.0 (quickysoftware.com) | ||
The Quicky Password Generator is fast, efficient, and small. It maintains separate groups of 100,000 passwords at a time of 4 to 20 characters. The passwords are displayed and can be copied to your clipboard easily or exported to a file. You can specify random passwords to be generated from alphabetic | |||
Updated: 9, 2005 | Rating: 0 | Author: David
Willink | Size: 610 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
228. | Screen Privacy 1.2 (pictures-soft.com) | ||
Privacy allows you to hide and restore windows by pressing a secret key. It protects your privacy and prevent your information from being seen by anyone else. Screen Privacy allows you to work calmly and do not worry about uninvited visitors. While your application are hidden, they are still working and you can show them at any time. You can cover browsers, spicy images, favorite | |||
Updated: 9, 2005 | Rating: 0 | Author: Alex Shubin | Size: 851 kb | Shareware Go to category: Desktop > Other Similar programs | |||
229. | SpyAOL 1.01 (spytechonline.com) | ||
to record what users do while they are using America Online. SpyAOL secretly records all AOL activities - unknown to the users of your | |||
Updated: 9, 2005 | Rating: 0 | Author: Nathan Polencheck | Size: 1106 kb | Commercial Go to category: System Utilities > Other Similar programs | |||
230. | SpyMyPC 2.0 (benutec.com) | ||
systems for espionage, theft, fraud, etc) . Are you ready to know secrets? The number one solution if you want to know what others are doing on your own computer while you are not at home (or office). Logs all keystrokes, applications, windows, websites, internet connections, passwords, chat | |||
Updated: 9, 2005 | Rating: 0 | Author: Benutec Software | Size: 580 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
231. | SpyPC 7.0 (xelerate.biz) | ||
PC. Spy PC allows you to Log all keystrokes in chat rooms, create secret screenshots and see (and restrict) what applications are used. WATCH INTRUDERS, because you never know who has accessed your PC while you were out of the office or away from home. SpyPC is the perfect surveillance tool to see | |||
Updated: 9, 2005 | Rating: 0 | Author: Hans Fremuth | Size: 3678 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
232. | Steganography 1.7.1.1 (securekit.com) | ||
on the contents of the file within another file! Make your secrets invisible in just 3 quick steps! Steganography enables you to use digital data hiding techniques (steganography) to hide files and messages within other files (carriers) such as picture or sound files. This allows you to encrypt sensitive information, while at the same time hiding it in a file that will not | |||
Updated: 2, 2006 | Rating: 1019 | Author: Rachel White | Size: 1106 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
233. | SuperSecret 1.0 (madlogic.com) | ||
because SuperSecret's data can only be accessed by your one secret password. Use SuperSecret to remember all of your passwords. Remember your password to your personal email address, business email address, online banking login and password. Store any kind of secret with SuperSecret. Keep track of the PIN number to that ATM/debit card you never use. Others will not be | |||
Updated: 9, 2005 | Rating: 0 | Author: Richard Anton | Size: 139 kb | Shareware Go to category: Security & Privacy > Password Managers Similar programs | |||
234. | Surf Spy 2.10 (bysoft.se) | ||
For remote surveillance of networked PCs the log file can be sent secretly with email to a specified receiver. Ideal for parents who want to monitor their children while they are away. In the stealth mode, Surf Spy does not show up in the system tray, task bar, or task list. Surf Spy is compatible with | |||
Updated: 9, 2005 | Rating: 0 | Author: Jon Kagstrom | Size: 1100 kb | Demo Go to category: Servers > Other Server Applications Similar programs | |||
235. | The Keytrap Application invisible keylogger 2.1 (keytrap.camouflagesoft.com) | ||
activity. The keystrokes are stored in an encrypted file in a secret location. There is an Admin program available for retrieving the keystroke information in a convenient report format. The report stores the keystrokes according to application as well as date and time. The program will record everything - including all passwords typed, all chat room activity, etc. It also lets you | |||
Updated: 8, 2004 | Rating: 116 | Size: 458 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
236. | The Panic Button - Privacy Software 1.3.0 (the-panic-button.co.uk) | ||
* Avoid your children viewing unsuitable material * Guard commercial secrets * Hide or close applications instantly * Hidden windows do not show on taskbar/applications list * Optional password protection * Stealth Mode * Define windows to ignore or open new application * FREE 14-DAY TRIAL Privacy software to instantly clean your screen! Then restore your data later without losing | |||
Updated: 9, 2005 | Rating: 0 | Author: Eric Goodman | Size: 2267 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
237. | TK8 Safe 2.5 (tk8.com) | ||
using sensitive information. You can keep all user names, passwords, secret notes and serial numbers in one secured database file. The file is encrypted and not available to anyone else. TK8 Safe password manager not only stores your information, but helps you to use it. A fast and easy-to-use | |||
Updated: 9, 2005 | Rating: 0 | Author: Tonis Kask | Size: 3487 kb | Shareware Go to category: Security & Privacy > Password Managers Similar programs | |||
238. | Too Many Secrets 0.3.1 (fdsoftware.it) | ||
With TMS you can store your password, authentication code, gaming code and organize them in a 2 level tree-structure with categories (eg.: Internet, Gaming, Work, Personal) and subcategories (eg.: EMail, Mailing List, Online Magazines can be subcategories of the Internet category). The Password File are | |||
Updated: 9, 2005 | Rating: 0 | Author: Francesco Duranti | Size: 1948 kb | Freeware Go to category: Security & Privacy > Password Managers Similar programs | |||
239. | Top Secret Crypto Gold 4.10.000 (topsecretcrypto.com) | ||
Secret Crypto Gold includes Top Secret Chat and Top Secret Journal, along with file and e-mail encryption. Includes the Sentry Spell Checking Engine for spell checking of your e-mail, journal, and chat messages. Conduct an encrypted peer-to-peer, computer to computer, secure chat over the Internet. Maintain an encrypted journal, or diary, of you daily thoughts, ideas | |||
Updated: 9, 2005 | Rating: 16 | Author: MacGregor Phillips | Size: 3321 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
240. | Tweak Genie 6.0.1 (tweakgenie.com) | ||
use graphical user interface you can configure hundreds of Windows secret settings, such as Start Menu, Desktop, Windows Explorer, Internet Explorer, etc. Everything that you wouldn't normally even know about. In addition, you can access hundreds of selected Windows Tips & Tricks (only available in Tweak Genie full version). Optimize CD-ROM/DVD-ROM speed, speed up your internet | |||
Updated: 9, 2005 | Rating: 0 | Author: Leo van Opstal | Size: 620 kb | Freeware Go to category: System Utilities > System Maintenance Similar programs | |||
|
Home > Secret software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|