|
||||||
|
||
|
Home > Secret software |
Related keywords: secret chamber, secret passwords, Surf Secret, secret key encryption, secret allies, The Secret Garden, invisible secret, secret pictures, secret diary, secret hotkey |
|
|
201. | Sports Bet Calculator 4.2 (users.tpg.com.au) | ||
bet on sporting events given the starting prices. One of the leading secrets of successful betting is to consider and evaluate all the odds. This application will provide the user optimal amounts to bet on a series of bets in a sports event. i.e. Cricket, Tennis, Races. It will calculate for a given | |||
Updated: 3, 2005 | Rating: 16 | Size: 672 kb | Shareware Go to category: Business > Other Similar programs | |||
202. | SpyAnytime PC Spy 2.4 (waresight.com) | ||
is a powerful spy software to secretly track all activities of computer users with just a single click, and it does NOT require you to have advanced computer skills at all. It allows you to monitor and record all areas of computer usage, e.g. keystroke, e-mail, online chat, passwords, Web sites, and take screen snapshots every few seconds like a surveillance camera. Features include | |||
Updated: 9, 2005 | Rating: 520 | Author: Jason H | Size: 1400 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
203. | SpyAnytime PC Spy 2.4 (waresight.com) | ||
is a powerful spy software to secretly track all activities of computer users with just a single click, and it does NOT require you to have advanced computer skills at all. It allows you to monitor and record all areas of computer usage, e.g. keystroke, e-mail, online chat, passwords, Web sites, and take screen snapshots every few seconds like a surveillance camera. Features include | |||
Updated: 9, 2005 | Rating: 0 | Author: Jason H | Size: 1400 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
204. | SpyAOL 1.01 (spytechonline.com) | ||
to record what users do while they are using America Online. SpyAOL secretly records all AOL activities - unknown to the users of your | |||
Updated: 9, 2005 | Rating: 0 | Author: Nathan Polencheck | Size: 1106 kb | Commercial Go to category: System Utilities > Other Similar programs | |||
205. | SpyMyPC 2.0 (benutec.com) | ||
systems for espionage, theft, fraud, etc) . Are you ready to know secrets? The number one solution if you want to know what others are doing on your own computer while you are not at home (or office). Logs all keystrokes, applications, windows, websites, internet connections, passwords, chat | |||
Updated: 9, 2005 | Rating: 0 | Author: Benutec Software | Size: 580 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
206. | SpyMyPC PRO 1.9 (benutec.com) | ||
systems for espionage, theft, fraud, etc) . Are you ready to know secrets? The number one solution if you want to know what others are doing on your own computer while you are not at home (or office). Logs all keystrokes, applications, windows, websites, internet connections, passwords, chat | |||
Updated: 9, 2005 | Rating: 0 | Author: Benutec Software | Size: 666 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
207. | SS Amazing Waterfall - Animated Desktop Screensaver 3.1 (elefun-desktops.com) | ||
Remember about the Miracle of life.This Amazing Waterfall keeps many secrets, but he is ready to tell. The wood inhabitants, that come to Amazing Waterfall, have the legend, that this water is mysterious: bend over the rippling water and you will see yourself as good and happy as you want it to. It is | |||
Updated: 9, 2005 | Rating: 0 | Author: Elefun Multimedia | Size: 2382 kb | Shareware Go to category: Desktop > Similar programs | |||
208. | SS Silent Lagoon - Animated Desktop Screensaver 3.1 (elefun-desktops.com) | ||
to the day. Such a fairy nook can't stay without some mystery or secret. And there is a secret there. Sometimes you can notice the head and the neck of the Diplodocus - one of the most ancient creatures on earth - appearring from the water. If you don't know what it is - just remember the Loch Ness monster and everything will become clear for you. The Diplodocus lives in the | |||
Updated: 9, 2005 | Rating: 0 | Author: Elefun Multimedia | Size: 2466 kb | Shareware Go to category: Desktop > Similar programs | |||
209. | Stauri Orataur 1.1 (victauri.com) | ||
Stauri Orataur is a simple but effective knowledge bot. Ask it a question and it will supply a straightforward answer. No long lists of web addresses and no tedious secondary search through hundreds of web pages returned by your initial question. Orataur uses Victauri's Stauri(tm) technology to filter | |||
Updated: 9, 2005 | Rating: 0 | Author: Tom Triggs | Size: 926 kb | Freeware Go to category: Network & Internet > Search/Lookup Tools Similar programs | |||
210. | Steganography 1.7.1.1 (securekit.com) | ||
on the contents of the file within another file! Make your secrets invisible in just 3 quick steps! Steganography enables you to use digital data hiding techniques (steganography) to hide files and messages within other files (carriers) such as picture or sound files. This allows you to encrypt sensitive information, while at the same time hiding it in a file that will not | |||
Updated: 2, 2006 | Rating: 1019 | Author: Rachel White | Size: 1106 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
211. | Steganography 1.7.1.1 (pipisoft.com) | ||
on the contents of the file within another file! Make your secrets invisible in just 3 quick steps! Steganography enables you to use digital data hiding techniques (steganography) to hide files and messages within other files (carriers) such as picture or sound files. This allows you to encrypt sensitive information, while at the same time hiding it in a file that will not | |||
Updated: 2, 2006 | Rating: 0 | Author: Rachel White | Size: 1106 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
212. | StrongDisk Pro 2.9 (strongdisk.de) | ||
password and/or a key nobody, including developers, can access the secret data on the protected disk, even if intruders possess the physical media. After the password is entered, the disk is mounted, and you can write any data to and read from the disk in so-called "transparent" mode. You don't need to | |||
Updated: 9, 2005 | Rating: 0 | Size: 1096 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
213. | Sub Hunter 1.0 (tornspace.com) | ||
before they sink you. Along the way, grab the various power-ups for secret powers and big scores! The goal in Sub Hunter is simple: sink wave after wave of the enemy subs before they sink you. Along the way, grab the various power-ups for secret powers and big | |||
Updated: 9, 2005 | Rating: 39 | Author: Michael Black | Size: 1708 kb | Shareware Go to category: Games & Entertainment > Arcade Similar programs | |||
214. | SuperSecret 1.0 (madlogic.com) | ||
because SuperSecret's data can only be accessed by your one secret password. Use SuperSecret to remember all of your passwords. Remember your password to your personal email address, business email address, online banking login and password. Store any kind of secret with SuperSecret. Keep track of the PIN number to that ATM/debit card you never use. Others will not be | |||
Updated: 9, 2005 | Rating: 0 | Author: Richard Anton | Size: 139 kb | Shareware Go to category: Security & Privacy > Password Managers Similar programs | |||
215. | Surf Spy 2.10 (bysoft.se) | ||
For remote surveillance of networked PCs the log file can be sent secretly with email to a specified receiver. Ideal for parents who want to monitor their children while they are away. In the stealth mode, Surf Spy does not show up in the system tray, task bar, or task list. Surf Spy is compatible with | |||
Updated: 9, 2005 | Rating: 0 | Author: Jon Kagstrom | Size: 1100 kb | Demo Go to category: Servers > Other Server Applications Similar programs | |||
216. | SurfSecret Privacy Protector 5.02 (surfsecret.com) | ||
SurfSecret Privacy Protector protects your privacy from employers, family, and friends. As you surf the web, pictures and text get stored on your hard disk, creating a mirror image of your surfing experience. SurfSecret Privacy Protector periodically destroys this trail. Privacy Protector allows you to | |||
Updated: 9, 2005 | Rating: 16 | Author: Jon Oringer | Size: 800 kb | Shareware Go to category: Network & Internet > Other Similar programs | |||
217. | System Analyser 2000 3.7.1 (geocities.com) | ||
your system's speed and stability. It can even terminate "secret" background processes that consume precious memory and CPU time. A new cleaning feature enables you to terminate more than one process at the same time. You can also enhance your computer's performance by viewing and tweaking each process' priority according to your specific needs. The utility displays | |||
Updated: 8, 2004 | Rating: 42 | Author: Yoav Zobel | Size: 554 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
218. | Talking Secretary 2.04 (softdd.com) | ||
Create reminders based on any dates, days or events, and never forget again. This will say the day and time out loud for you, read messages to you, play MP3 files, play video reminders, and display customized messages based on days of the week, weekends, specific dates, or even monthly dates. Never forget | |||
Updated: 2, 2006 | Rating: 715 | Author: SoftDD Software | Size: 705 kb | Shareware Go to category: Desktop > Clocks & Alarms Similar programs | |||
219. | The Iron Heel 1.0 (southernoceansoftware.com) | ||
of the Iron Heel conspire to eliminate democracy and, with their secret police and military, terrorize the citizenry. They instigate a German attack on Hawaii on Dec. 4, 1912; as socialist revolutions topple capitalist governments around the world, the Iron Heel has 52 socialist members of the U.S | |||
Updated: 9, 2005 | Rating: 0 | Author: Michael Bryant | Size: 949 kb | Freeware Go to category: Home & Hobby > Other Similar programs | |||
220. | The Keytrap Application invisible keylogger 2.1 (keytrap.camouflagesoft.com) | ||
activity. The keystrokes are stored in an encrypted file in a secret location. There is an Admin program available for retrieving the keystroke information in a convenient report format. The report stores the keystrokes according to application as well as date and time. The program will record everything - including all passwords typed, all chat room activity, etc. It also lets you | |||
Updated: 8, 2004 | Rating: 116 | Size: 458 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
|
Home > Secret software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|