|
||||||
|
||
|
Home > Bay software |
|
|
1. | Calendarscope 3.0 beta 2 (calendarscope.com) | ||
Calendarscope is a full-featured calendar program for planning, managing, and scheduling appointments, meetings, birthdays, vacations, important dates, special events, and tasks. It allows you to view all your events in standard calendar views and supports to-do lists. Reminder windows have customizable | |||
Updated: 3, 2006 | Rating: 486 | Author: Vladimir Kulemin | Size: 2220 kb | Shareware Go to category: Business > PIMS & Calendars Similar programs | |||
2. | Database Tour Pro 5.0.7.655 (vlsoftware.net) | ||
Universal database tool with report builder. Tested on Paradox, dBase, FoxPro, ASCII, Lotus, HTML, InterBase, Oracle, SQL Server, MS Access, MS Excel. Main features are: -Viewing, editing and printing data. -Automatically created reports and convenient report builder (with templates, expressions, preview | |||
Updated: 3, 2006 | Rating: 0 | Author: Vitaliy Levchenko | Size: 1758 kb | Shareware Go to category: Business > Databases & Tools Similar programs | |||
3. | Super Utilities 6.25 (superlogix.net) | ||
Super Utilities offers 26 tools for fixing, speeding up, maintaining, and protecting your PC. It encompasses four suites of utilities: System Cleaner, Privacy Protector, System Maintenance, and Special Utilities. 1.System Cleaner features a spyware-removal component as well as tools for cleaning your disk and | |||
Updated: 3, 2006 | Rating: 16 | Author: li jiangnan | Size: 3328 kb | Shareware Go to category: System Utilities > System Maintenance Similar programs | |||
4. | Masker 7.0.6 (softpuls.com) | ||
Hide files and have them automatically encrypted! MASKER is able to hide your sensitive files within another file (carrier file), which is absolute discrete and looks like regular file without changing the exterior impression. MASKER encrypts files using strong encryption algorithms. (CAST 128-bit, MASKER is able to hide your sensitive files within other files (carrier files), which are absolute discrete and look like regular files without changing the exterior impression | |||
Updated: 3, 2006 | Rating: 16 | Author: Evgeny Zaretskiy | Size: 2399 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
5. | Invisible Secrets Encryption Software 4.4 (neobytesolutions.com) | ||
Invisible Secrets Encryption Software 4 not only encrypts your data and files for safe keeping or for secure transfer across the net, it also hides them in places that on the surface appear totally innocent, such as picture or sound files, or web pages. These types of files are a perfect disguise for | |||
Updated: 2, 2006 | Rating: 0 | Author: NeoByte Solutions | Size: 2740 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
6. | Dekart Private Disk 2.07 (dekart.com) | ||
Powerful, reliable and flexible disk encryption program that lets you create encrypted disk partitions (drive letters) to protect your confidential information. Private Disk hides your programs and data, and restricts access to them. Dekart Private Disk includes innovative Disk Firewall mechanism - a unique | |||
Updated: 2, 2006 | Rating: 0 | Author: Dekart Contact | Size: 1159 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
7. | Starfish Family Mail 1.51 (lincolnbeach.com) | ||
Starfish Family Mail is a Windows email program that lets you communicate via email with all your friends and family! Parents or teachers can set up friend lists for each person so that you can rest assured that they are only communicating with their friends! Each person logs in as themselves and using | |||
Updated: 2, 2006 | Rating: 0 | Author: Lincoln Beach Software | Size: 2409 kb | Shareware Go to category: Network & Internet > Other Similar programs | |||
8. | Image Broadway 5.1 (filestream.com) | ||
Easy-to-Use Graphic Tools at Your Fingertips Image Broadway lets you create and edit graphic images with special effects like a pro in just minutes. From simple tasks to advanced image editing capabilities, Image Broadway does it all and does it very well. It offers state-of-the-art digital image | |||
Updated: 2, 2006 | Rating: 0 | Author: Yao Chu | Size: 10414 kb | Shareware Go to category: Graphic Apps > Editors Similar programs | |||
9. | Folder Lock 5.3.9 (newsoftwares.net) | ||
Folder Lock is a fast file-security program that can password-protect, lock, hide and encrypt any number of files, folders, drives, pictures and documents in seconds. Protected files are hidden, undeletable, inaccessible and highly secure. It hides files from kids, friends and co-workers, safeguards them from | |||
Updated: 2, 2006 | Rating: 6296 | Author: Salman Ashraf | Size: 1941 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
10. | Hide Window Hotkey 2.5 (elongsoft.com) | ||
Hide Window Hotkey is a utility which allows you to hide the windows, and programs which are running on your screen.It will instantly hide or close all (or some) programs on your screen through Mouse Hotkey or Keyboard Hotkey in order to prevent uninvited persons from seeing them.It will serve you well at | |||
Updated: 2, 2006 | Rating: 0 | Author: Helen Lin | Size: 885 kb | Shareware Go to category: System Utilities > Shell Tools Similar programs | |||
11. | Steganography 1.7.1.1 (securekit.com) | ||
Steganography: an excellent method of embedding information on the contents of the file within another file! Make your secrets invisible in just 3 quick steps! Steganography enables you to use digital data hiding techniques (steganography) to hide files and messages within other files (carriers) such as | |||
Updated: 2, 2006 | Rating: 1019 | Author: Rachel White | Size: 1106 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
12. | Steganography 1.7.1.1 (pipisoft.com) | ||
Steganography: an excellent method of embedding information on the contents of the file within another file! Make your secrets invisible in just 3 quick steps! Steganography enables you to use digital data hiding techniques (steganography) to hide files and messages within other files (carriers) such as | |||
Updated: 2, 2006 | Rating: 0 | Author: Rachel White | Size: 1106 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
13. | FileBox eXtender 1.91.01 (hyperionics.com) | ||
Navigate easily through Windows folder maze with FileBox eXtender buttons placed on standard Windows file boxes. Access your favorite and recently visited folders and documents with one mouse click or hot key. Make the file boxes bigger to see more folders and files. Optionally FileBX buttons can be also | |||
Updated: 2, 2006 | Rating: 0 | Author: Greg Kochaniak | Size: 631 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
14. | 1st Privacy Tool for Windows 4.9.2.2 (privacywindows.com) | ||
1st Privacy Tool is a powerful security utility that allows you to restrict access to Windows important resources. This easy-to-use utility helps you to keep your computer in order. It enables you to impose a variety of access restrictions to protect your privacy. You can deny access to each individual | |||
Updated: 2, 2006 | Rating: 0 | Author: Eugene Mihailov | Size: 1500 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
15. | RFC Browser Standard Edition 3.0 (rfcbrowser.com) | ||
Large RFC required to read? Lots of RFCs required to read? RFC Browser is the tool you need. RFC Browser is a viewer tailored to RFC browsing. It is the most powerful utility to view RFCs that renders RFCs into HyperRFCs: intra-RFC and inter-RFC hyperlinking, Colorful, Visual, Scalable. Hyper: RFC | |||
Updated: 2, 2006 | Rating: 39 | Author: RFCBrowser.com RFCBrowser.com | Size: 1111 kb | Shareware Similar programs | |||
16. | 2Flyer Screensaver Builder Pro 7.4.1 (2flyer.com) | ||
2Flyer Screensaver Builder is a powerful tool which lets you create high-quality screensavers and share them with others. 2Flyer's ease of use and robust features make it perfect for both beginning and expert computer users. The program supports photographs taken from your digital camera as well as | |||
Updated: 2, 2006 | Rating: 341 | Author: Seany Mercier | Size: 2933 kb | Shareware Go to category: Desktop > Similar programs | |||
17. | Modem Spy 1.8 (softcab.com) | ||
Modem spy is handy utility for phone calls recording. Features: 1) records phone conversations. 2) records from microphone. 3) plays back recorded mesages via phone line. 4) Plays back recorded mesages via sound card. 5) Can record ALL incomming phone calls. 6) Has built-in software automatic gain control. 7) | |||
Updated: 2, 2006 | Rating: 90 | Author: Sergei Polishchuk | Size: 78 kb | Shareware Go to category: Audio & Multimedia > Rippers & Converters Similar programs | |||
18. | Wipe Expert 1.60 (bodrag.com) | ||
Wipe Expert is an award winning privacy protection tool that helps remove all traces of online and offline activity. Did you know that a consequence of internet browsing is the recording of many confidential data on your computer: visited pages, credit card info, passwords? Did you know that by simply | |||
Updated: 2, 2006 | Rating: 16 | Author: Dragos Diaconescu | Size: 2984 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
19. | Tracks Eraser Pro 5.61 (acesoft.net) | ||
Your computer is spying on you now! It stores all the evidence of your activities into your hard disk. Anyone using your computer can see where you have been on Internet, what images and movies you have seen, and even anything you have done on your computer could be seen by others. The Windows built-in | |||
Updated: 2, 2006 | Rating: 90 | Author: Acesoft | Size: 1624 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
20. | WiseTerm Telnet/Serial (32-bit) 3.1.2 (johnnypops.demon.co.uk) | ||
Win32 emulation of WY50, WY50+ and WY60 terminals. Part of the WiseTerm suite of telnet/serial emulators. Features: programmable keyboard; protect/write-protect modes; 24/25/42/43 line by 80/132 column display including Econ-80; char, line, page attributes; multiple, sizeable page modes; full split-screen | |||
Updated: 2, 2006 | Rating: 48 | Author: John Popplewell | Size: 415 kb | Shareware Go to category: Network & Internet > Other Similar programs | |||
21. | Windows Security Officer 6.8.1.1 (1securitycenter.com) | ||
Windows Security Officer is an autonomous provider of log-on and resource restriction security application integrated with, yet independent of, the Windows operating system. It has the capability of providing extremely strong, secure control of who can access a personal computer resources, and exactly what | |||
Updated: 2, 2006 | Rating: 0 | Author: Eugene Mihailov | Size: 1578 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
22. | NCrypt TX 1.8 (littlelite.net) | ||
This text based encryption tool allows easy message hiding, to be used in e-mail, messenger and other communications. NCrypt TX also has hashing capabilities to verify message integrity. It supports DES, Rijndael-AES, SHA, and MD5 algorithms, as well as historical algorithms such as ROT13 and Vigenere. With | |||
Updated: 2, 2006 | Rating: 0 | Author: Alessio Saltarin | Size: 511 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
23. | Maverick Launch Centre 2.1.004 (skaro.net) | ||
If you're tired of trudging through endless menus from the start button, this may be the answer to your prayers. Maverick is a powerful and flexible launcher that can be configured to provide quick access to your documents, applications and games, etc. It combines ease of use with a myriad of features and | |||
Updated: 2, 2006 | Rating: 0 | Author: James Turner | Size: 1569 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
24. | SocksChain 3.11.151 (ufasoft.com) | ||
A program that allows to connect to any Internet service through a chain of SOCKS or HTTP proxies to hide the actual IP address. It also possible to work with a programs that are not designed to support SOCKS protocol directly. A program that allows to connect to any Internet service through a chain of SOCKS | |||
Updated: 2, 2006 | Rating: 1079 | Author: Ufasoft company | Size: 683 kb | Shareware Go to category: Servers > Firewall & Proxy Servers Similar programs | |||
25. | EGuest PRO 4.1 (esoftpro.com) | ||
EGuest PRO is a comprehensive guestbook system based on the popular guestbook system EGuest. New features including Image Verification Code, Admin Interfaces, Theme, 250+ Emoticons, Advanced Search with Highlight, Auto Web/Email Links, IP/Word Banning, Blank Line Protection and much more. It excels other | |||
Updated: 2, 2006 | Rating: 0 | Author: Eric Leung | Size: 313 kb | Shareware Go to category: Network & Internet > Other Similar programs | |||
26. | ZoneTick 2.7.0 (products.wrconsulting.com) | ||
ZoneTick World Time Zone Clock is a download for Windows that replaces the regular system clock with several time zones of your choosing. Knowing the time around the world has never been simpler. Whether you travel from timezone to timezone or have international friends, ZoneTick is the clock for you | |||
Updated: 2, 2006 | Rating: 1410 | Author: Sales Rep | Size: 1072 kb | Shareware Go to category: Desktop > Clocks & Alarms Similar programs | |||
27. | WinLock Professional 4.32 (crystaloffice.com) | ||
WinLock is a comprehensive security solution for personal or publicly accessible computers. It is a program that ensures that only authorized people can access sensitive information on your computer. With WinLock you can control how long others can use your computer. It runs from the system tray and requires | |||
Updated: 2, 2006 | Rating: 0 | Author: Denis Zolotov | Size: 1628 kb | Shareware Go to category: Security & Privacy > Access Control Similar programs | |||
28. | WinLock 4.32 (crystaloffice.com) | ||
WinLock is a comprehensive security solution for personal or publicly accessible computers. It is a program that ensures that only authorized people can access sensitive information on your computer. With WinLock you can control how long others can use your computer. It runs from the system tray and requires | |||
Updated: 2, 2006 | Rating: 280 | Author: Denis Zolotov | Size: 1550 kb | Shareware Go to category: Security & Privacy > Access Control Similar programs | |||
29. | Windows Security Officer 6.8.1.1 (mybestsoft.com) | ||
Windows Security Officer is an autonomous provider of log-on and resource restriction security application integrated with, yet independent of, the Windows operating system. It has the capability of providing extremely strong, secure control of who can access a personal computer resources, and exactly what | |||
Updated: 2, 2006 | Rating: 0 | Author: Eugene Mihailov | Size: 1578 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
30. | Win Spy Software Pro 8.6 (win-spy.com) | ||
Monitor your PC or multiple remote PCs with Win-Spy. Win-Spy operates in stealth mode, so users will not be aware of its existence or be able to terminate or uninstall it. Win-Spy comes with a screen-capture tool, a key recorder, a key-recorder e-mailer, e-mail alerting by keyword, a folder hider, the ability | |||
Updated: 2, 2006 | Rating: 346 | Author: Ben Nelson | Size: 2246 kb | Shareware Go to category: Desktop > Other Similar programs | |||
|
Home > Bay software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|