|
||||||
|
||
|
Home > Secret software |
Related keywords: secret chamber, secret passwords, Surf Secret, secret key encryption, secret allies, The Secret Garden, invisible secret, secret pictures, secret diary, secret hotkey |
|
|
1. | Journyx Timesheet 5.6 (pnk.com) | ||
you need, when you need it. Use our Free Web Timesheets to Discover secret profits in your business and ease billing now. Automate Payroll with our New improved setup | |||
Updated: 9, 2005 | Rating: 164 | Author: curt finch | Size: 31250 kb | Freeware Go to category: Desktop > Clocks & Alarms Similar programs | |||
2. | TopMail 2.00 (iipwr.com) | ||
TopMail is an email client that lets you send anonymous emails from any email address to any email address. All you need is to be online, you don't need to have an email account. With TopMail you can instantly send out emails that appear to arrive from any email address or name you want. TopMail can also | |||
Updated: 9, 2005 | Rating: 1146 | Author: Allen Gor | Size: 290 kb | Freeware Go to category: Communications > E-Mail Clients Similar programs | |||
3. | Journyx Timesheets For Linux 7.0 (journyx.com) | ||
your employees. Use our Free Web Employee Timesheets to Discover secret profits in your business and ease billing now. Automate Payroll with our New improved setup | |||
Updated: 2, 2006 | Rating: 0 | Author: Curt Finch | Size: 15625 kb | Freeware Go to category: Business > Other Similar programs | |||
4. | PDF-Analyzer 2.5 (is-soft.de) | ||
contextmenu and "stand alone" as a "PDF Browser", too. No pdf-secrets | |||
Updated: 9, 2005 | Rating: 0 | Author: Ingo Schmoekel | Size: 1076 kb | Freeware Go to category: System Utilities > File & Disk Management Similar programs | |||
5. | GUIPDFTK 0.4 (free.pages.at) | ||
then pdftk is an electronic staple-remover, hole-punch, binder, secret-decoder-ring, and X-Ray-glasses. Pdftk is a useful tool for handling PDF documents. Every PDF user should have one in the top drawer of his/her desktop. Use it to: Merge PDF Documents Split PDF Pages into a New Document Decrypt Input as Necessary (Password Required) Encrypt Output as Desired Burst a PDF | |||
Updated: 3, 2005 | Rating: 5222 | Author: Dirk Paehl | Size: 1122 kb | Freeware Go to category: Development > Other Similar programs | |||
6. | Max 2: Counterattack 1.00 (zwnet.bmj.net.pl) | ||
of banknotes). You need to collect lots of money to get bonuses, secret levels access, and to complete game :). Hey, I didn't tell anything about graphic & music yet. In my personal opinion graphic is great, but I don't need to tell you everything, you should just watch screens in full scale and you will see it on your own. All movable objects are 256 colours sprites with smooth | |||
Updated: 9, 2005 | Rating: 0 | Author: Piotr Chodzinski | Size: 2080 kb | Freeware Go to category: Games & Entertainment > Arcade Similar programs | |||
7. | Smoke Attack 1.0 (aidsoft.com) | ||
them with your oxygen gun. There are a lot of extra ammunitions, secret weapons and keys hidden in the office. Find and use them! Your goal is to reach the next level and fight even more smoke."Smoke Attack" became within a few days in switzerland the same hype as "Catch the Sperm". All graphics by Ingo Mesche (Moorhenn, Catch the Sperm) In this smoking-risk awareness game from the | |||
Updated: 9, 2005 | Rating: 0 | Author: Hajo Michels | Size: 5820 kb | Freeware Go to category: Games & Entertainment > Arcade Similar programs | |||
8. | WinMind 2.10A (winimage.com) | ||
is a single-player game. Your goal is to break the secret code created by the computer. This code is made of 5 slots which can be either empty (expert mode only) or contain a ball randomly chosen among balls from 8 different colors. WinMind offers you three different modes: beginner, intermediate or expert that use different code creation schemes: - Beginner mode: WinMind | |||
Updated: 3, 2005 | Rating: 0 | Author: François Liger | Size: 19 kb | Freeware Go to category: Games & Entertainment > Other Similar programs | |||
9. | 20,000 Leagues Under The Sea 1.5 (southernoceansoftware.com) | ||
the Nautilus. A submarine of considerable modern content (mysterious secret power plants, able to sustain underwater travel for extraordinarily long periods of time, complete living quarters, etc.), the Nautilus is Nemo's chief weapon in the war against Slaver's plying the African nations for | |||
Updated: 9, 2005 | Rating: 83 | Author: Michael Bryant | Size: 942 kb | Freeware Go to category: Home & Hobby > Other Similar programs | |||
10. | AccountUnity 1.0 (silkmoth.net) | ||
With AccountUnity, you NEVER give your details to ANYONE; your secret information remains secret. Your details are stored only on your own PC using multi-level encryption and security. Once you log in to AccountUnity, everything you do and the financial details you see go directly between your PC and the institutions holding your accounts. Your information is never seen by | |||
Updated: 3, 2005 | Rating: 102 | Author: N/A N/A | Size: 777 kb | Freeware Go to category: Business > Accounting & Finance Similar programs | |||
11. | AdvancedBiorhythms:Lite 1.5 (whitestranger.com) | ||
Advanced Biorhythms is a powerful but at the same time easy-to-use application ideal for making the personal forecasts. The program’s got a scientific basis: that is the western theory of biorhythms containing oriental philosophy. Having knowledge about biorhythms you can be sure what to expect at any day | |||
Updated: 3, 2005 | Rating: 124 | Author: Dmitry Konovalov | Size: 1162 kb | Freeware Go to category: Home & Hobby > Health & Nutrition Similar programs | |||
12. | The Iron Heel 1.0 (southernoceansoftware.com) | ||
of the Iron Heel conspire to eliminate democracy and, with their secret police and military, terrorize the citizenry. They instigate a German attack on Hawaii on Dec. 4, 1912; as socialist revolutions topple capitalist governments around the world, the Iron Heel has 52 socialist members of the U.S | |||
Updated: 9, 2005 | Rating: 0 | Author: Michael Bryant | Size: 949 kb | Freeware Go to category: Home & Hobby > Other Similar programs | |||
13. | The Picture of Dorian Grey 1.0 (southernoceansoftware.com) | ||
of this are apparent only in the portrait. Eventually the picture, secreted in his childhood playroom, becomes almost hideous to behold. But Gray still has one pure love - Gladys, daughter of the original painter. The Picture of Dorian Gray, by Oscar Wilde A corrupt young man somehow keeps his youthful beauty, but a special painting gradually reveals his inner ugliness to | |||
Updated: 9, 2005 | Rating: 0 | Author: Michael Bryant | Size: 739 kb | Freeware Go to category: Home & Hobby > Other Similar programs | |||
14. | The Secret Garden 1.0 (southernoceansoftware.com) | ||
Secret Garden by Frances Hodgson Burnett. When Cholera takes the parents of Mary Lennox, she is shipped from India to England to live with her Uncle Craven. Archibald Craven's house is dark, drafty, with over 100 rooms built on the edge of the moors. Mary finds that her Uncle does not wish to see her, which is fine with Mary as she herself is rude and spoiled. While walking the | |||
Updated: 9, 2005 | Rating: 0 | Author: Michael Bryant | Size: 675 kb | Freeware Go to category: Home & Hobby > Other Similar programs | |||
15. | ICQPromoter 1.1 (nanosoftinc.us) | ||
you get access to this database? You see AOL does not want to share secrets. Now you have such way of getting a necessary information! A program's name is ICQPromoter. This is a powerful searching instant messaging marketing software. It allows you to be connected to databases of ICQ servers and to | |||
Updated: 9, 2005 | Rating: 30 | Author: Nanosoft Inc. | Size: 1888 kb | Freeware Go to category: Communications > Chat & Instant Messaging Similar programs | |||
16. | Imaginary Telnet Server 1.0 (whizkidtech.redprince.net) | ||
The server will give him the impression that he has found a top secret military computer. But when he tries to log in, the server will offer humorous rejections. If he uses one of the password cracking programs and tries to log in persistently, the server will feed him a series of completely fake data for a while, making him think that he got in. After a while, the server will | |||
Updated: 3, 2005 | Rating: 97 | Author: G. Adam Stanislav | Size: 38 kb | Freeware Go to category: Network & Internet > Other Similar programs | |||
17. | Harry Potter 2 Screen Saver 1.0 (krstdesign.com) | ||
Potter and the Chamber of Secrets Screen Saver with images from the new movie. Harry Potter begins his second year at Hogwarts School of Wizardry, but is warned by a mysterious creature that danger awaits him at the school. Harry Potter and the Chamber of Secrets Screen Saver with images from the new movie. Harry Potter begins his second year at Hogwarts School of Wizardry | |||
Updated: 9, 2005 | Rating: 0 | Size: 1583 kb | Freeware Go to category: Desktop > Similar programs | |||
18. | 4UOnly 1.2.7 (dillobits.com) | ||
good is a password list manager that secures your secret passwords using a master password and then forces you to enter it each time you want to access your password list? 4UOnly is a password manager for Microsoft Windows 98, Me, NT, 2000 and XP with a unique feature that saves you time while | |||
Updated: 2, 2006 | Rating: 36 | Author: Dillobits Software Dillobits | Size: 640 kb | Freeware Go to category: Security & Privacy > Password Managers Similar programs | |||
19. | Ardamax Keylogger Lite 1.2 (ardamax.com) | ||
pressed. If a keystroke is pressed, Ardamax Keylogger Lite will secretly record it and save it to a hidden log file for you to view at a later date. Application tracking - Ardamax Keylogger Lite makes it easy for you to find out where exactly a keystroke was pressed. Whenever a keystroke is typed, Ardamax Keylogger Lite will record the application that was in use that received the | |||
Updated: 9, 2005 | Rating: 3708 | Author: Maxim Frolov | Size: 366 kb | Freeware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
20. | BGMask Privacy Enhancer 1.22free (geocities.com) | ||
that you have to put a red or blue filter on an image to discover a secret message. BGMask allows you to make the same thing with your applications. Now you can give a secret touch to the information that shows your computer, and only those that uses the Decoder Glasses, will be able to see what is hidden... You have surely seen the games in those that you have to put a red or | |||
Updated: 8, 2004 | Rating: 16 | Author: José Angel Acosta | Size: 352 kb | Freeware Go to category: Security & Privacy > Other Similar programs | |||
21. | East-Tec File Shredder 1.0 (east-tec.com) | ||
and nobody will be able to recover your valuable corporate trade secrets, business plans, personal files, photos or confidential letters. East-Tec File Shredder overwrites and verifies the destruction of every bit of the file, making recovery impossible. Deleting a file with Windows or with other programs will leave the file contents on your hard disk, easy to be recovered by anyone | |||
Updated: 3, 2005 | Rating: 79 | Author: Horatiu Tanescu | Size: 709 kb | Freeware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
22. | FastFolder by BB 3.3.0 (dogkennels.net) | ||
is a FREE full working version. There are NO registry changes nor secret files made. FastFolder by BB contains no Spyware or AdWare, and is totally non-intrusive. FastFolder by BB allows quick access to twelve selectable folders from a tray icon. It uses minimum system resources, and is a FREE full working version. FastFolder by BB contains no Spyware or AdWare and makes NO registry | |||
Updated: 9, 2005 | Rating: 0 | Author: Bernie Madigan | Size: 94 kb | Freeware Go to category: System Utilities > File & Disk Management Similar programs | |||
23. | FileMap by BB 4.0.4 (dogkennels.net) | ||
be times when your firewall is out-smarted allowing files to be secretly installed to hard disk through no fault of your own. For other reasons, files in the windows and system directories will mysteriously grow over time. If you had a record of files before and after, it would be easy to determine which files do not belong. FileMap by BB lets you take control of the growing | |||
Updated: 9, 2005 | Rating: 30 | Author: Bernie Madigan | Size: 144 kb | Freeware Go to category: Security & Privacy > Other Similar programs | |||
24. | GRL RealHidden 1.0 (grltechnology.com) | ||
GRL RealHidden version 1.0 is a software utility that allows you to hide a file physically inside of another file, and then retrieve that hidden file. The resulting 'cloaked' file, that is the file containing hidden file, usually operates exactly like the original file. This product gives you the power to | |||
Updated: 9, 2005 | Rating: 0 | Author: Galen Lande | Size: 1967 kb | Freeware Go to category: System Utilities > Other Similar programs | |||
25. | Jetico Personal Firewall 1.0.1.61 (jetico.com) | ||
attacks from outside as well as from malicious programs "living" secretly inside your computer's memory and hard drive. Three levels of protection are included: low-level network packets filtering, application-level network events filtering and filtering of user-level process activity. Jetico Personal Firewall checks every packet that comes in or out of your computer. Using | |||
Updated: 9, 2005 | Rating: 42 | Author: Jetico Inc. | Size: 2744 kb | Freeware Go to category: System Utilities > Other Similar programs | |||
26. | Keep It (a) Secret! 2002B (amateur-invest.com) | ||
remember one, and all the other will be revealed. Use "Keep It (a) Secret". Keep all your passwords, userid's, codes, etc. safe and secure in just one place. - In todays world there are so many codes, that you have to remembers - now you just have to remember one, and all the other will be revealed. Use "Keep It (a) | |||
Updated: 3, 2005 | Rating: 0 | Author: R. Michael | Size: 390 kb | Freeware Go to category: Home & Hobby > Other Similar programs | |||
27. | Stauri Orataur 1.1 (victauri.com) | ||
Stauri Orataur is a simple but effective knowledge bot. Ask it a question and it will supply a straightforward answer. No long lists of web addresses and no tedious secondary search through hundreds of web pages returned by your initial question. Orataur uses Victauri's Stauri(tm) technology to filter | |||
Updated: 9, 2005 | Rating: 0 | Author: Tom Triggs | Size: 926 kb | Freeware Go to category: Network & Internet > Search/Lookup Tools Similar programs | |||
28. | Password Depot 2.0.8 (hello-engines.com) | ||
Password Depot ist a powerful and user-friendly tool for managing all your passwords. - Best protection of your data due to the encryption algorithm Rijndael 256. - Using the password generator, you generate passwords that cannot be cracked. - User-friendly interface for working intuitively | |||
Updated: 9, 2005 | Rating: 0 | Author: AceBIT GmbH | Size: 5265 kb | Freeware Go to category: Security & Privacy > Password Managers Similar programs | |||
29. | Quicky Password Generator 1.2 (quickysoftware.com) | ||
The Quicky Password Generator is fast, efficient, small and it is free!. It generates up to 100,000 passwords at a time of 4 to 20 characters. The passwords are displayed and can be copied to your clipboard easily. There are options for alphanumeric, uppercase only, variable length, and special characters | |||
Updated: 9, 2005 | Rating: 0 | Author: David
Willink | Size: 338 kb | Freeware Go to category: System Utilities > Other Similar programs | |||
30. | Too Many Secrets 0.3.1 (fdsoftware.it) | ||
With TMS you can store your password, authentication code, gaming code and organize them in a 2 level tree-structure with categories (eg.: Internet, Gaming, Work, Personal) and subcategories (eg.: EMail, Mailing List, Online Magazines can be subcategories of the Internet category). The Password File are | |||
Updated: 9, 2005 | Rating: 0 | Author: Francesco Duranti | Size: 1948 kb | Freeware Go to category: Security & Privacy > Password Managers Similar programs | |||
|
Home > Secret software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|