|
||||||
|
||
|
Home > Secrets software |
|
|
1. | MessLess Inventory 4.6 (messless.com) | ||
- household, small mom-and-pop store or factory. What's the secret of this software? Simple. The program comes with five built-in editors: Form Editor, Report Style Editor, HTML/TXT Output Editor, Formula Editor and ToolBar Editor. These editors make program adjustments a quick and easy process. There are also 16 various types of data entry fields which you can modify as desired | |||
Updated: 3, 2006 | Rating: 0 | Author: Mikhail Lishin | Size: 5992 kb | Shareware Go to category: Home & Hobby > Cataloging Similar programs | |||
2. | 007 Spy Software 3.86 (e-spy-software.com) | ||
Spy Software is a stealthy monitoring spyware which allows you to secretly track all activities of computer users and automatically deliver logs to you via Email or FTP, including all areas of the system such as email sent, Web sites visited, files operations, every keystroke, username and password, online conversation (ICQ, MSN, AIM), and take screen snapshots at set intervals just | |||
Updated: 3, 2006 | Rating: 1113 | Author: Jason H | Size: 1200 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
3. | ABC Amber QuattroPro Converter 2.02 (thebeatlesforever.com) | ||
ABC Amber QuattroPro Converter is an advanced utility which helps you convert your WQ1 (Corel QuattroPro) files to any format you wish (XLS, DBF, CSV, XML, PDF, HTML, CHM, RTF, HLP, DOC, and many more) easily and quickly. The software supports a batch conversion, a run from command line, more than 50 | |||
Updated: 3, 2006 | Rating: 0 | Author: ProcessText Group | Size: 1180 kb | Shareware Go to category: Business > Office Suites & Tools Similar programs | |||
4. | ABC Amber Lotus 1-2-3 Converter 2.04 (thebeatlesforever.com) | ||
ABC Amber Lotus 1-2-3 Converter is an advanced utility which helps you convert your WK1 (Lotus 1-2-3) files to any format you wish (XLS, DBF, CSV, XML, PDF, HTML, CHM, RTF, HLP, DOC, and many more) easily and quickly. The software supports a batch conversion, a run from command line, more than 50 languages | |||
Updated: 3, 2006 | Rating: 321 | Author: ProcessText Group | Size: 1181 kb | Shareware Go to category: Business > Office Suites & Tools Similar programs | |||
5. | ABC Amber PowerPoint Converter 2.02 (thebeatlesforever.com) | ||
ABC Amber PowerPoint Converter is an advanced tool which converts your PowerPoint presentations to any document format (PDF, CHM, HTML, RTF, HLP, DOC, MCW, WPS, SAM, RFT, WS4, WS7, WRI, etc.) easily and quickly. The software supports a batch conversion, a command line and more than 50 languages. Important Supports a batch conversion, a command line and more than 50 languages | |||
Updated: 3, 2006 | Rating: 253 | Author: ProcessText Group | Size: 1233 kb | Shareware Go to category: Business > Office Suites & Tools Similar programs | |||
6. | Masker 7.0.6 (softpuls.com) | ||
Hide files and have them automatically encrypted! MASKER is able to hide your sensitive files within another file (carrier file), which is absolute discrete and looks like regular file without changing the exterior impression. MASKER encrypts files using strong encryption algorithms. (CAST 128-bit, MASKER is able to hide your sensitive files within other files (carrier files), which are absolute discrete and look like regular files without changing the exterior impression | |||
Updated: 3, 2006 | Rating: 16 | Author: Evgeny Zaretskiy | Size: 2399 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
7. | Attachments Zip Compressor 1.4.5 (mapilab.com) | ||
Attachments Zip Compressor will help you to forget all the troubles with attached files in Microsoft Outlook 2000, 2002/XP and 2003: - You've sent a huge document and forgot to pack it? AZC will do that for you automatically! - You've received an executable file, and Microsoft Outlook blocked access to it | |||
Updated: 3, 2006 | Rating: 74 | Author: Andrey Manchuk | Size: 4 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
8. | Invisible Secrets Encryption Software 4.4 (neobytesolutions.com) | ||
Secrets Encryption Software 4 not only encrypts your data and files for safe keeping or for secure transfer across the net, it also hides them in places that on the surface appear totally innocent, such as picture or sound files, or web pages. These types of files are a perfect disguise for sensitive information. Nobody, not even your wife, boss, or a hacker would realize that | |||
Updated: 2, 2006 | Rating: 0 | Author: NeoByte Solutions | Size: 2740 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
9. | ABC Amber Excel Converter 2.04 (thebeatlesforever.com) | ||
ABC Amber Excel Converter was developed to help you convert your XLS (MS Excel) files to any format you wish (DBF, CSV, XML, PDF, HTML, CHM, RTF, HLP, DOC, and many more) easily and quickly. The software supports a batch conversion, a run from command line, more than 50 languages. Batch conversion ability Supports a batch conversion, a run from command line and more than 50 languages | |||
Updated: 2, 2006 | Rating: 84 | Author: ProcessText Group | Size: 1173 kb | Shareware Go to category: Business > Office Suites & Tools Similar programs | |||
10. | Advanced Encryption Package 2006 Professional 4.2.9 (secureaction.com) | ||
RSA algorithm and Public-Private Key cryptography. One key is kept secret and is referred to as the private key while the other is made available to others and is called the public key since anyone can access this key. These keys are large mathematically-related numbers derived from algorithms that form a unique pair. Either key may be used to encrypt a message, but only the other | |||
Updated: 2, 2006 | Rating: 141 | Author: SecureAction Research, LLC | Size: 2347 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
11. | Natural Biorhythms 2.91 (whitestranger.com) | ||
Natural Biorhythms is a powerful, easy-to-use application ideal for making personal forecasts. This program is based on the western scientific theory of biorhythms, and contains additional features based upon oriental philosophy. Knowing your biorhythms, you can be sure about what to expect from each day in from each day in order to succeed at sports, dating, business, negotiations, exams, or job interviews. Be a winner in any situation | |||
Updated: 2, 2006 | Rating: 231 | Author: Dmitry Konovalov | Size: 1539 kb | Shareware Go to category: Home & Hobby > Health & Nutrition Similar programs | |||
12. | Secret Explorer 6.6.1471 (unhsolutions.com) | ||
passwords), and much more with this new system inspection tool. Secret Explorer is designed to browse, analyze and edit hidden data which is stored in undocumented Windows Protected Storage. With Secret Explorer import/export feature you can also move all your personalized information from one computer to another, basically familiarizing a new system with you. This system | |||
Updated: 2, 2006 | Rating: 0 | Author: Vitas Ramanchauskas | Size: 504 kb | Shareware Similar programs | |||
13. | Secret Explorer 6.6.1471 (unhsolutions.com) | ||
passwords), and much more with this new system inspection tool. Secret Explorer is designed to browse, analyze and edit hidden data which is stored in undocumented Windows Protected Storage. With Secret Explorer import/export feature you can also move all your personalized information from one computer to another, basically familiarizing a new system with you. This system | |||
Updated: 2, 2006 | Rating: 0 | Author: Vitas Ramanchauskas | Size: 504 kb | Shareware Similar programs | |||
14. | Steganography 1.7.1.1 (securekit.com) | ||
on the contents of the file within another file! Make your secrets invisible in just 3 quick steps! Steganography enables you to use digital data hiding techniques (steganography) to hide files and messages within other files (carriers) such as picture or sound files. This allows you to encrypt sensitive information, while at the same time hiding it in a file that will not | |||
Updated: 2, 2006 | Rating: 1019 | Author: Rachel White | Size: 1106 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
15. | Steganography 1.7.1.1 (pipisoft.com) | ||
on the contents of the file within another file! Make your secrets invisible in just 3 quick steps! Steganography enables you to use digital data hiding techniques (steganography) to hide files and messages within other files (carriers) such as picture or sound files. This allows you to encrypt sensitive information, while at the same time hiding it in a file that will not | |||
Updated: 2, 2006 | Rating: 0 | Author: Rachel White | Size: 1106 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
16. | Secret Explorer 6.6.1471 (unhsolutions.net) | ||
passwords), and much more with this new system inspection tool. Secret Explorer is designed to browse, analyze and edit hidden data which is stored in undocumented Windows Protected Storage. With Secret Explorer import/export feature you can also move all your personalized information from one computer to another, basically familiarizing a new system with you. This system | |||
Updated: 2, 2006 | Rating: 0 | Author: Vitas Ramanchauskas | Size: 504 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
17. | Secret Explorer 6.6.1471 (unhsolutions.net) | ||
passwords), and much more with this new system inspection tool. Secret Explorer is designed to browse, analyze and edit hidden data which is stored in undocumented Windows Protected Storage. With Secret Explorer import/export feature you can also move all your personalized information from one computer to another, basically familiarizing a new system with you. This system | |||
Updated: 2, 2006 | Rating: 0 | Author: Vitas Ramanchauskas | Size: 504 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
18. | Boss Everyware 2.85 (bosseveryware.com) | ||
it is running. Or the program can be totally hidden from view, and secretly log usage information. The program can be password protected, and accessible only to the network administrator. Boss Everyware data logs can be written in comma-separated values, dBase or in a proprietary format, and can be | |||
Updated: 2, 2006 | Rating: 16 | Author: Alexander Jmerik | Size: 3077 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
19. | Password Manager XP 2.1.322 (cp-lab.com) | ||
information that needs protection. It will be your passwords and secrets keeper. Protect your private data with this password management utility. Program's unique features include capability to encrypt stored information with several encryption algorithms simultaneously (Blowfish, 3DES, Rijndael, Tea, Cast128, RC4, Serpent, Twofish). Importantly, no temporary files are ever | |||
Updated: 2, 2006 | Rating: 45 | Author: CP Lab | Size: 948 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
20. | BB EAP 5.38 (bbsys.com) | ||
Client management/Case management - Document, track, follow-up and record actions taken in Employee Assistance Programs. Easier to use than paper case management, with additional reporting and analysis capabilities. Record client demographics, Unlimited notes, Initial and Final assessments (Primary and | |||
Updated: 2, 2006 | Rating: 0 | Author: Bob Bolda | Size: 11718 kb | Shareware Go to category: Business > Other Similar programs | |||
|
Home > Secrets software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|