|
||||||
|
||
|
Home > Secrets software |
|
|
121. | Harry Potter 2 Screen Saver 1.0 (krstdesign.com) | ||
Potter and the Chamber of Secrets Screen Saver with images from the new movie. Harry Potter begins his second year at Hogwarts School of Wizardry, but is warned by a mysterious creature that danger awaits him at the school. Harry Potter and the Chamber of Secrets Screen Saver with images from the new movie. Harry Potter begins his second year at Hogwarts School of Wizardry | |||
Updated: 9, 2005 | Rating: 0 | Size: 1583 kb | Freeware Go to category: Desktop > Similar programs | |||
122. | SS Silent Lagoon - Animated Desktop Screensaver 3.1 (elefun-desktops.com) | ||
to the day. Such a fairy nook can't stay without some mystery or secret. And there is a secret there. Sometimes you can notice the head and the neck of the Diplodocus - one of the most ancient creatures on earth - appearring from the water. If you don't know what it is - just remember the Loch Ness monster and everything will become clear for you. The Diplodocus lives in the | |||
Updated: 9, 2005 | Rating: 0 | Author: Elefun Multimedia | Size: 2466 kb | Shareware Go to category: Desktop > Similar programs | |||
123. | 007 Spy Software 3.01 (e-spy-software.com) | ||
Spy Software is a stealthy monitoring spyware which allows you to secretly track all activities of computer users and automatically deliver logs to you via Email or FTP, including all areas of the system such as email sent, Web sites visited, files operations, every keystroke, username and password, online conversation (ICQ, MSN, AIM), and take screen snapshots at set intervals just | |||
Updated: 3, 2005 | Rating: 1455 | Author: Demi He | Size: 2176 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
124. | StrongDisk Pro 2.9 (strongdisk.de) | ||
password and/or a key nobody, including developers, can access the secret data on the protected disk, even if intruders possess the physical media. After the password is entered, the disk is mounted, and you can write any data to and read from the disk in so-called "transparent" mode. You don't need to | |||
Updated: 9, 2005 | Rating: 0 | Size: 1096 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
125. | 4UOnly 1.2.7 (dillobits.com) | ||
good is a password list manager that secures your secret passwords using a master password and then forces you to enter it each time you want to access your password list? 4UOnly is a password manager for Microsoft Windows 98, Me, NT, 2000 and XP with a unique feature that saves you time while | |||
Updated: 2, 2006 | Rating: 36 | Author: Dillobits Software Dillobits | Size: 640 kb | Freeware Go to category: Security & Privacy > Password Managers Similar programs | |||
126. | A1Click Ultra PC Cleaner 1.01.36 (superwin.com) | ||
utilizes 25 processes of the latest technology to find Windows' secret records of your activity and remove them. This prevents others from spying on you. Some of these processes have yet to be discovered by other software. 3. Do-It-Yourself - A1Click Ultra PC Cleaner allows you to build your | |||
Updated: 2, 2006 | Rating: 851 | Author: Ray Geide | Size: 1175 kb | Shareware Go to category: System Utilities > System Maintenance Similar programs | |||
127. | AbsoluteSystemBackup 1.1 (asbackup.com) | ||
AbsoluteSystemBackup - is the best professional backup program. AbsoluteSystemBackup presents a high-quality program to keep your data at your PC. There are a lot of reasons of information loss: software problems, system errors in the operating system, etc. Sometimes it is impossible to restore the AbsoluteSystemBackup presents a backup utility for Windows 9Z/Me/Xp/2000. AbsoluteSystemBackup presents a high-quality program to keep your data at your PC | |||
Updated: 3, 2005 | Rating: 0 | Author: Dmitry Lapkin | Size: 6398 kb | Shareware Go to category: System Utilities > Backup & Restore Similar programs | |||
128. | Ace ScreenSpy 5.0 (caltroxsoft.com) | ||
ScreenSpy 5.0 is a popular Advanced Security Software to secretly monitor your PC screen, capture and save any Screen or Windows activity that occurs at any time. The Software automatically captures and saves the entire monitor screen, together with any Windows, Applications, Browser windows & images, Web-pages & Web-images etc that are opened by any user as well any other activity | |||
Updated: 9, 2005 | Rating: 0 | Author: Caltrox Software | Size: 3550 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
129. | ActiveTextBox 2.3 (ActiveTextBox.com) | ||
days of using the program nobody agrees to switch back. The other secret of program's popularity is its flexible setup system. For example, as the list of text strings keeps growing, you can sort them out alphabetically or in the order of regular use. In addition, the users can create their own custom lists of the text strings that are most commonly used - such as names or logins | |||
Updated: 9, 2005 | Rating: 0 | Author: AbsoluteWay | Size: 806 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
130. | Advanced Email Monitoring 3.8 (email-monitoring.net) | ||
computer it sends exact copies of all outgoing emails to your secret email address. While monitored user sends emails by using usual email client software (like Microsoft Outlook Express, Eudora, Pegasus, The Bat! or similar), all his outgoing emails will be INVISIBLY copied to your secret email address pre-configured via Advanced Email Monitoring Control Panel. Unique | |||
Updated: 9, 2005 | Rating: 0 | Author: Otto Schulz | Size: 394 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
131. | CryptoCrat 2005 4.61 (secureaction.com) | ||
file can only be unscrambled and read by someone who knows the secret | |||
Updated: 2, 2006 | Rating: 0 | Author: SecureAction Research, LLC | Size: 847 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
132. | Advanced Encryption Package 2006 Professional 4.2.9 (secureaction.com) | ||
RSA algorithm and Public-Private Key cryptography. One key is kept secret and is referred to as the private key while the other is made available to others and is called the public key since anyone can access this key. These keys are large mathematically-related numbers derived from algorithms that form a unique pair. Either key may be used to encrypt a message, but only the other | |||
Updated: 2, 2006 | Rating: 141 | Author: SecureAction Research, LLC | Size: 2347 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
133. | Advanced Keylogger 1.7 (eltima.com) | ||
Advanced Keylogger is an invisible surveillance tool that records every keystroke to encrypted user-friendly easy-to-understand logs. Logs can also be automatically sent to any number of specified e-mails. Advanced Keylogger also monitors the internet activity by logging all web-pages the user visits | |||
Updated: 9, 2005 | Rating: 242 | Author: SoftInfinity | Size: 1146 kb | Shareware Go to category: Security & Privacy > Password Managers Similar programs | |||
134. | Advanced Windows Password Recovery 3.5 (elcomsoft.com) | ||
Other information that could be recovered by AWPR is LSA Secrets; the program also allows to run any programs in other user's context, show password histrory hashes, read password hashes from SAM and SYSTEM files, perform brute-force and dictionary attacks on Windows 9x PWL files, and decrypt product ID and CD key for Windows and Microsoft Office installations. Recover all | |||
Updated: 9, 2005 | Rating: 7398 | Author: Vladimir Katalov | Size: 1839 kb | Shareware Go to category: Security & Privacy > Password Managers Similar programs | |||
135. | AlmerShredder 1.05 (almersoft.com) | ||
remains on your hard drive and can be restored any moment. Thus secret and valued information is available to many people. Recognizing this need, we created AlmerShredder. This powerful program helps you to shred important files so that they cannot be restored and nobody can even guess what information a file contained. AlmerShredder has an easy-to-follow user interface and is of | |||
Updated: 9, 2005 | Rating: 90 | Author: Max Fadeev | Size: 406 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
136. | Ardamax Keylogger 2.4 (ardamax.com) | ||
pressed. If a keystroke is pressed, Ardamax Keylogger will secretly record it and save it to a hidden log file for you to view at a later date. Email log delivery - Ardamax Keylogger can send your recorded logs via e-mail at set times - perfect for remote monitoring! Application tracking - Ardamax Keylogger makes it easy for you to find out where exactly a keystroke was | |||
Updated: 2, 2006 | Rating: 12034 | Author: Maxim Frolov | Size: 286 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
137. | Ardamax Keylogger Lite 1.2 (ardamax.com) | ||
pressed. If a keystroke is pressed, Ardamax Keylogger Lite will secretly record it and save it to a hidden log file for you to view at a later date. Application tracking - Ardamax Keylogger Lite makes it easy for you to find out where exactly a keystroke was pressed. Whenever a keystroke is typed, Ardamax Keylogger Lite will record the application that was in use that received the | |||
Updated: 9, 2005 | Rating: 3708 | Author: Maxim Frolov | Size: 366 kb | Freeware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
138. | Backup4all 3.0 (backup4all.com) | ||
Backup4all is an award-winning backup software for Windows. Backup4all protects your valuable data from partial or total loss by automating backup tasks, password protecting and compressing it to save storage space. Using Backup4all you can easily backup to any local or network drive, backup to FTP (with | |||
Updated: 2, 2006 | Rating: 24 | Author: Softland Softland | Size: 5772 kb | Shareware Go to category: System Utilities > Backup & Restore Similar programs | |||
139. | BestCrypt Corporate 1.12 (jetico.com) | ||
to create containers to keep data inside in encrypted form. Secret data kept on client computers can be always accessed by Administrator, even if employee is away or gone. Central Administrating Database can be also scheduled for automatic backup. BestCrypt Corporate is important tool to keep corporate networks secure and at the same time, it provides easy yet powerful way to | |||
Updated: 9, 2005 | Rating: 0 | Author: Jetico Inc. | Size: 5828 kb | Shareware Go to category: Network & Internet > Network Monitoring Similar programs | |||
140. | Boss Everyware 2.85 (bosseveryware.com) | ||
it is running. Or the program can be totally hidden from view, and secretly log usage information. The program can be password protected, and accessible only to the network administrator. Boss Everyware data logs can be written in comma-separated values, dBase or in a proprietary format, and can be | |||
Updated: 2, 2006 | Rating: 16 | Author: Alexander Jmerik | Size: 3077 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
|
Home > Secrets software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|