|
||||||
|
||
|
Home > Mute software |
Related keywords: mute sound card |
|
|
91. | #Remove Access Security 3.0 (e-tech.ca) | ||
'Remove Access Security 3.0' is the ultimate tool concerning security for Access databases. 'Remove Access Security' can reveal passwords, reset passwords and remove user-level security for secured and non-secured database (.MDB) files. This software is simple to use, and can be a real life-saver in a variety | |||
Updated: 9, 2005 | Rating: 1996 | Author: Neil Britto | Size: 350 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
92. | Secur-e-mail for Windows 1.20 (acmetoolz.com) | ||
Secur-e-mail will encrypt the communication between your e-mail client (e.g. Outlook) and the POP3 server using an SSH connection. No server-side installation is needed. The software runs on a Windows system tray. It will enable a local POP3 server on your computer, which will allow you to setup your e-mail | |||
Updated: 9, 2005 | Rating: 0 | Author: Sandra Anderson | Size: 510 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
93. | Panda Antivirus platinum 7 7.06 (pandasoftware.com) | ||
Panda Antivirus Platinum 7.0, an innovative security solution that adapts perfectly to the needs of today's small businesses and professionals , protecting information from viruses and hackers with a single product. With a series of additional security features, including a firewall and script blocker , this | |||
Updated: 9, 2005 | Rating: 410 | Author: Panda Software | Size: 25470 kb | Shareware Go to category: Security & Privacy > Anti-Virus Tools Similar programs | |||
94. | Panda Security Demo 3.0.2.0 (pandasecurity.com) | ||
Helps you keep hackers or unauthorized or inexperienced users away from your files, and helps you keep them from configuring your systems. It helps you prevent data from being removed from your company or personal computer. You can limit, depending on who accesses a computer, the use of certain files or | |||
Updated: 9, 2005 | Rating: 0 | Author: Armando Bernal | Size: 6010 kb | Demo Go to category: System Utilities > Other Similar programs | |||
95. | ProBot SE 2.3.0 (nethunter.cc) | ||
ProBot SE is a full-featured workstation monitoring tool. It allows administrators to keep track of all activity occurring on a computer. In addition to keystrokes and mouse clicks, it detects access to applications, folders and files on connected drives. It also watches over keylogging in NT console windows | |||
Updated: 9, 2005 | Rating: 48 | Author: Andrei Birjukov | Size: 2236 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
96. | MMHotkeys 1.1 (librarysmith.co.uk) | ||
or home users who need instant control of sound settings. (Instant mute when the phone rings!) User definable hotkeys enable you to select only the features of the utility that you require and define your own hotkeys simply by pressing them. Runs silently in the background and is configured using | |||
Updated: 9, 2005 | Rating: 16 | Author: Matthew Smith | Size: 775 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
97. | Mutilate File Wiper 2.92 (mutilatefilewiper.com) | ||
Normal File Deletion is NOT secure. Deleting files merely removes the file system's pointer to the file, ALL THE DATA REMAINS ON YOUR HARD DRIVE. The remaining data can be easily recovered with data recovery or forensic software. Your sensitive files may also be vulnerable to advanced recovery techniques | |||
Updated: 9, 2005 | Rating: 82 | Author: Craig Christensen | Size: 823 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
98. | My Firewall Plus 5.0 (webroot.com) | ||
Whether you connect to the Internet occasionally with a dial-up connection, or you are constantly connected via DSL, Cable, Satellite or via a Network, your personal data is at risk now more than ever. It used to be that hacking attacks came from the outside world (the Internet) and simple, low-cost firewalls | |||
Updated: 9, 2005 | Rating: 0 | Author: Steve Thomas | Size: 6006 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
99. | NookNak 2004 V1.0.0 (nakware.com) | ||
more with your mouse - easily. You can use it to quickly mute music when you want to talk to someone or hide confidential information quickly and easily. You can also use NookNak to disable and re-enable screen saving easily and start your favorite program with the same ease. With NookNak you can now | |||
Updated: 9, 2005 | Rating: 0 | Author: Andy Erceg | Size: 567 kb | Shareware Go to category: System Utilities > Shell Tools Similar programs | |||
100. | Geek Superhero 1.3 (geeksuperhero.com) | ||
Geek Superhero watches your computer for changes, immediately notifying you when a setting is altered to confirm you want to keep or reject the change. This catches many of the modifications made by a virus, trojan or worm; protecting your computer from harm. (A "Computer Setting Firewall" is an excellent | |||
Updated: 9, 2005 | Rating: 16 | Author: Michael Burford | Size: 2548 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
101. | IntraMail 2003.01.20 (dplanet.ch) | ||
Secure exchange of messages in a local network Intranet (Windows 95, 98, Me, NT, 2000, XP). The mail (or Email) can be written or read from any PC easily. Every mail-account can be protected by a password. The personal messages are always strongly encrypted (with 3 adaptive codes). These short mails are Every mail-account can be protected by a password. Personal messages are strongly encrypted | |||
Updated: 9, 2005 | Rating: 42 | Author: Jean-Maurice Tellenbach | Size: 2918 kb | Shareware Go to category: Communications > E-Mail Clients Similar programs | |||
102. | Lock Folder 5.0 (realclicks.com) | ||
Lock Folder is a new security tool that lets you lock your files and folders with your personal password. Now nobody but you can access your most sensitive information. Locking folders and files also effectively protects you from malicious programs, such as viruses, worms and trojans. Here is how Lock Folder | |||
Updated: 9, 2005 | Rating: 146 | Author: Leo van Opstal | Size: 1400 kb | Freeware Go to category: System Utilities > Other Similar programs | |||
103. | LockTheFile 1.8 (okosoft.com) | ||
LockTheFile is a tool that encrypts files with strong encryption alghorytm. You may protect any information - text files, pictures, video and audio files from other eyes and ears, as many files as you need, without any limites. The core functions of this program are: Strong encryption alghorytm; Handy | |||
Updated: 9, 2005 | Rating: 0 | Author: Andrew Maltsev | Size: 1808 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
104. | EzCrypt+ 2.01 (kmgi.com) | ||
EzCrypt+ by KMGI makes protection of sensitive data as simple as a mouse click. KMGI is a leading Internet technologies company whose innovations have been acclaimed as "The cutting edge" (CNN) and "The Future of the Internet" (Forbes). EzCypt+ adds Encrypt option to your mouse’s right button menu. Just | |||
Updated: 9, 2005 | Rating: 0 | Author: Alex Konanykhin | Size: 616 kb | Shareware Go to category: Communications > E-Mail Clients Similar programs | |||
105. | F-Secure Internet Security 2003 2003 (f-secure.com) | ||
Download now a highly advanced service against viruses and break-in attempts when you are connected to the Internet! F-Secure Internet Security 2003 includes an award winning antivirus software and an easy-to-use personal firewall product that protects your system against break-in attempts when you are when you are connected to the Internet. F-Secure Internet Security 2003 is easy to install and use. Updates automatically over Internet. You can safely read your e-mail and surf the Internet | |||
Updated: 9, 2005 | Rating: 45 | Author: F-Secure Corporation | Size: 6416 kb | Commercial Go to category: Security & Privacy > Anti-Virus Tools Similar programs | |||
106. | File Monster 2.6.7 (nstarsolutions.com) | ||
File Monster completely erases files from your system -- actually overwriting the information in the file so it can not be recovered. The reason information is still available when you delete files with normal deletion methods is because normal deletion methods only tell the operating system to not recognize | |||
Updated: 9, 2005 | Rating: 0 | Author: Jeff Camino | Size: 432 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
107. | FolderAccess 2.0 (lockfolder.net) | ||
FolderAccess is a new security tool that lets you lock your files and folders with your personal password. Now nobody but you can access your most sensitive information. Locking folders and files also effectively protects you from malicious programs, such as viruses, worms and trojans. Here is how Lock Folder | |||
Updated: 9, 2005 | Rating: 0 | Author: Leo van Opstal | Size: 4313 kb | Freeware Go to category: System Utilities > Other Similar programs | |||
108. | CryptEnCrypt 1.10 (inetprom.com) | ||
CryptEnCrypt is a powerful software application designed for electronic data protection. The files on your hard disk have no protection from unauthorized access. That means anyone who has access to your computer will be able to open these files and read the contents. CryptEnCrypt allows you converting your | |||
Updated: 9, 2005 | Rating: 36 | Author: iNetProm SoftLab | Size: 632 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
109. | DA Password Recovery Pro 2.03 (deskarsenal.com) | ||
Internet security has long become a buzz word. Everywhere you go, you hear about it. Naturally, it is great to feel yourself safe and secure when surfing the Net. When you enter your password on most sites, you see only asterisk signs. This feature is intended to protect your passwords; but sometimes this | |||
Updated: 9, 2005 | Rating: 740 | Author: DeskArsenal.com | Size: 656 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
110. | ATS Warning! The Boss! 1.6 (apituan.com) | ||
hiding windows, applications and the icons in the systray and mute the sound of your PC. You will be able to hide entirely applications and windows, one by one, by class or by title or all very easily. Control the visibility by hotkeys that will give you total control of each window, hiding and showing them according to your needs. You will be able to modify the hotkeys according | |||
Updated: 9, 2005 | Rating: 0 | Author: Jorge Millet | Size: 2001 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
111. | BCWipe 3.07.2 (jetico.com) | ||
BCWipe ensures that another person will not restore files you have deleted from a disk. When you delete sensitive files from a disk on your computer, Windows does not erase the contents of these files from the disk - it only deletes 'references' to these files from filesystem tables. Contents of the deleted | |||
Updated: 9, 2005 | Rating: 24 | Author: Jetico Inc. | Size: 2651 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
112. | BestCrypt 7.20.2 (jetico.com) | ||
BestCrypt is easy-to-use, powerful data encryption software. You allocate a portion (container) of free space of your drive where you keep all your sensitive data in encrypted form. BestCrypt creates a virtual drive in your system which you work with like with any other drive. All data written there are | |||
Updated: 9, 2005 | Rating: 55 | Author: Jetico Inc. | Size: 5004 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
113. | CDSHiELD SE 1.04 (mindestworx.free.fr) | ||
CDSHiELD is a home-made cd-protector application which provide a awesome security against hackers. What's the benefits to using CDSHiELD ?: * Protect against unauthorised copying of the CD with a CD-Recorder using CD copying softwares. * Prevent users coying the contents of your CD-Rom to their | |||
Updated: 9, 2005 | Rating: 1704 | Author: Loki mindestworx | Size: 4390 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
114. | Chameleon 2.0 (members.optushome.com.au) | ||
Chameleon is a secure file encryption application that hides your files from anyone that monitors your emails, personal files even hard disk. More and more SPY software is being used; You need to be sure that files containing sensitive information are kept safe. There is no Electronic Privacy, especially on | |||
Updated: 9, 2005 | Rating: 0 | Author: Chris Dimopoulos | Size: 1437 kb | Adware Go to category: System Utilities > Other Similar programs | |||
115. | Complete CD & DVD Writer 1.5 (audioi.com) | ||
Complete CD & DVD Writer (burner) is an easy-to-use CD and DVD writing software to burn your data, image and audio files to CD or DVD. - Burn data CD or DVD from data files (ZIP, EXE, DOC, etc.) and image files (ISO or CUE/BIN). - Burn audio CD from audio files (WAV) and image files (CUE/BIN). - Build ISO | |||
Updated: 9, 2005 | Rating: 363 | Author: Audio i | Size: 984 kb | Shareware Go to category: Audio & Multimedia > CD Burners Similar programs | |||
116. | A Speeder 2004.12 (go.6to23.com) | ||
A Speeder is a magical software. You can use it to change the speed of windows system and change the speed of all applications (such as games) under windows.A Speeder makes your games funnier. The speed range is from 1/32 times speed to 32 times speed (system speed) or from 1/256 to 256 times speed (Windows | |||
Updated: 9, 2005 | Rating: 430 | Author: Duan JiFei | Size: 685 kb | Shareware Go to category: System Utilities > Shell Tools Similar programs | |||
117. | AAA HTMLEncryptor 1.21 (share2.com) | ||
AAA HTML Encryptor can encrypt html web pages and make them unreadable. As a result, the source code of the website was protected from being analysed by hackers or competitors. AAA HTML Encryptor can encrypt html web pages and make them unreadable. As a result, the source code of the website was protected from being analysed by hackers or competitors. | |||
Updated: 9, 2005 | Rating: 124 | Author: JiaFu Li | Size: 479 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
118. | Access Denied 3.40 (johnru.com) | ||
Security program requests username and password or simple password upon boot-up and locks desktop by one mouse click. It can't be bypassed on Windows 95/98/ME. All unwanted people are kept out to your PC. Very flexible use: multi-user support(up to 450 users), password encryption, integration with your | |||
Updated: 9, 2005 | Rating: 58 | Author: Ivan Mayrakov | Size: 536 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
119. | Advanced Password Manager 2.33 (rayslab.com) | ||
If you've been using the Internet actively for over a year, you probably have at least a dozen of different logins and passwords to remember - one for your e-mail, couple for your credit cards and bank accounts, a few more for online newspapers and magazines, and one for each online shop or auction where you | |||
Updated: 9, 2005 | Rating: 0 | Author: Rayslab Inc. | Size: 1086 kb | Shareware Go to category: Security & Privacy > Password Managers Similar programs | |||
120. | Spring Wildflowers 2.0 (imagedancer.com) | ||
picture changes; showing pictures full-screen or at original size; muting the audio; using more than 50 transition effects. Images in the screen saver include: Dogtooth Violet, Pholx, Palmer Beard Tongue, and many other beautiful spring wildflowers. Using the Wallpaper Feature Right-click the Screen Saver Icon on the Windows Task Bar and select "Configure Screen Saver". In the | |||
Updated: 9, 2005 | Rating: 0 | Author: Marv Poulson | Size: 3071 kb | Shareware Go to category: Desktop > Similar programs | |||
|
Home > Mute software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|