|
||||||
|
||
|
Home > Secret software |
Related keywords: secret chamber, secret passwords, Surf Secret, secret key encryption, secret allies, The Secret Garden, invisible secret, secret pictures, secret diary, secret hotkey |
|
|
151. | AbsoluteSystemBackup 1.1 (asbackup.com) | ||
AbsoluteSystemBackup - is the best professional backup program. AbsoluteSystemBackup presents a high-quality program to keep your data at your PC. There are a lot of reasons of information loss: software problems, system errors in the operating system, etc. Sometimes it is impossible to restore the AbsoluteSystemBackup presents a backup utility for Windows 9Z/Me/Xp/2000. AbsoluteSystemBackup presents a high-quality program to keep your data at your PC | |||
Updated: 3, 2005 | Rating: 0 | Author: Dmitry Lapkin | Size: 6398 kb | Shareware Go to category: System Utilities > Backup & Restore Similar programs | |||
152. | Acceleration Startup Manager + Release RAM Bundle for Win9x 2 (acceleratedsoftware.net) | ||
system, or why their computer technicians don't tell them of these secrets. The reason is they will find it hard to persuade you to upgrade your system to the next Windows version or to upgrade your hardware. Release RAM enables your computer to work more efficiently. No matter how much memory you | |||
Updated: 9, 2005 | Rating: 0 | Author: Shaughn Prestidge | Size: 1842 kb | Shareware Go to category: System Utilities > Launchers & Task Managers Similar programs | |||
153. | Ace ScreenSpy 5.0 (caltroxsoft.com) | ||
ScreenSpy 5.0 is a popular Advanced Security Software to secretly monitor your PC screen, capture and save any Screen or Windows activity that occurs at any time. The Software automatically captures and saves the entire monitor screen, together with any Windows, Applications, Browser windows & images, Web-pages & Web-images etc that are opened by any user as well any other activity | |||
Updated: 9, 2005 | Rating: 0 | Author: Caltrox Software | Size: 3550 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
154. | ActiveTextBox 2.3 (ActiveTextBox.com) | ||
days of using the program nobody agrees to switch back. The other secret of program's popularity is its flexible setup system. For example, as the list of text strings keeps growing, you can sort them out alphabetically or in the order of regular use. In addition, the users can create their own custom lists of the text strings that are most commonly used - such as names or logins | |||
Updated: 9, 2005 | Rating: 0 | Author: AbsoluteWay | Size: 806 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
155. | Advanced Email Monitoring 3.8 (email-monitoring.net) | ||
computer it sends exact copies of all outgoing emails to your secret email address. While monitored user sends emails by using usual email client software (like Microsoft Outlook Express, Eudora, Pegasus, The Bat! or similar), all his outgoing emails will be INVISIBLY copied to your secret email address pre-configured via Advanced Email Monitoring Control Panel. Unique | |||
Updated: 9, 2005 | Rating: 0 | Author: Otto Schulz | Size: 394 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
156. | CryptoCrat 2005 4.61 (secureaction.com) | ||
file can only be unscrambled and read by someone who knows the secret | |||
Updated: 2, 2006 | Rating: 0 | Author: SecureAction Research, LLC | Size: 847 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
157. | Advanced Encryption Package 2006 Professional 4.2.9 (secureaction.com) | ||
RSA algorithm and Public-Private Key cryptography. One key is kept secret and is referred to as the private key while the other is made available to others and is called the public key since anyone can access this key. These keys are large mathematically-related numbers derived from algorithms that form a unique pair. Either key may be used to encrypt a message, but only the other | |||
Updated: 2, 2006 | Rating: 141 | Author: SecureAction Research, LLC | Size: 2347 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
158. | Advanced Keylogger 1.7 (eltima.com) | ||
Advanced Keylogger is an invisible surveillance tool that records every keystroke to encrypted user-friendly easy-to-understand logs. Logs can also be automatically sent to any number of specified e-mails. Advanced Keylogger also monitors the internet activity by logging all web-pages the user visits | |||
Updated: 9, 2005 | Rating: 242 | Author: SoftInfinity | Size: 1146 kb | Shareware Go to category: Security & Privacy > Password Managers Similar programs | |||
159. | Advanced Windows Password Recovery 3.5 (elcomsoft.com) | ||
Other information that could be recovered by AWPR is LSA Secrets; the program also allows to run any programs in other user's context, show password histrory hashes, read password hashes from SAM and SYSTEM files, perform brute-force and dictionary attacks on Windows 9x PWL files, and decrypt product ID and CD key for Windows and Microsoft Office installations. Recover all | |||
Updated: 9, 2005 | Rating: 7398 | Author: Vladimir Katalov | Size: 1839 kb | Shareware Go to category: Security & Privacy > Password Managers Similar programs | |||
160. | AlmerShredder 1.05 (almersoft.com) | ||
remains on your hard drive and can be restored any moment. Thus secret and valued information is available to many people. Recognizing this need, we created AlmerShredder. This powerful program helps you to shred important files so that they cannot be restored and nobody can even guess what information a file contained. AlmerShredder has an easy-to-follow user interface and is of | |||
Updated: 9, 2005 | Rating: 90 | Author: Max Fadeev | Size: 406 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
161. | Ardamax Keylogger 2.4 (ardamax.com) | ||
pressed. If a keystroke is pressed, Ardamax Keylogger will secretly record it and save it to a hidden log file for you to view at a later date. Email log delivery - Ardamax Keylogger can send your recorded logs via e-mail at set times - perfect for remote monitoring! Application tracking - Ardamax Keylogger makes it easy for you to find out where exactly a keystroke was | |||
Updated: 2, 2006 | Rating: 12034 | Author: Maxim Frolov | Size: 286 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
162. | Ardamax Keylogger Lite 1.2 (ardamax.com) | ||
pressed. If a keystroke is pressed, Ardamax Keylogger Lite will secretly record it and save it to a hidden log file for you to view at a later date. Application tracking - Ardamax Keylogger Lite makes it easy for you to find out where exactly a keystroke was pressed. Whenever a keystroke is typed, Ardamax Keylogger Lite will record the application that was in use that received the | |||
Updated: 9, 2005 | Rating: 3708 | Author: Maxim Frolov | Size: 366 kb | Freeware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
163. | Backup4all 3.0 (backup4all.com) | ||
Backup4all is an award-winning backup software for Windows. Backup4all protects your valuable data from partial or total loss by automating backup tasks, password protecting and compressing it to save storage space. Using Backup4all you can easily backup to any local or network drive, backup to FTP (with | |||
Updated: 2, 2006 | Rating: 24 | Author: Softland Softland | Size: 5772 kb | Shareware Go to category: System Utilities > Backup & Restore Similar programs | |||
164. | Boss Everyware 2.85 (bosseveryware.com) | ||
it is running. Or the program can be totally hidden from view, and secretly log usage information. The program can be password protected, and accessible only to the network administrator. Boss Everyware data logs can be written in comma-separated values, dBase or in a proprietary format, and can be | |||
Updated: 2, 2006 | Rating: 16 | Author: Alexander Jmerik | Size: 3077 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
165. | Boss Key 1.6 (boss-key.com) | ||
- congratulations! Now you are absolutely free man - you have no secrets! Press F10 (or any other key you assigned) and it will be IMMEDIATELY hidden. After your visitor went out press it again and continue working Boss Key permits you to hide immediatlly active program window using a hot | |||
Updated: 9, 2005 | Rating: 16 | Author: VicMan Software | Size: 298 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
166. | Chameleon 2.0 (members.optushome.com.au) | ||
you like without your attached files being revealed! Hide your most secret files with Chameleon, download or upload your hide files on a Server at the Internet. Chameleon is so strong not even a Server can find if your file hides something else inside. Chameleon allows you to hide files (all types of files), directory files by compressing (WinZip v1.0), encrypting (Double 128 bit | |||
Updated: 9, 2005 | Rating: 0 | Author: Chris Dimopoulos | Size: 1437 kb | Adware Go to category: System Utilities > Other Similar programs | |||
167. | CHAOS For Security 2.9 (safechaos.net) | ||
and folders. Drag and Drop support. CHAOS for security of your secrets. Encrypt and compress individual files and | |||
Updated: 9, 2005 | Rating: 0 | Size: 402 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
168. | Chat Little Black Address Book 1.1 (hirtlesoftware.com) | ||
personal details just as quickly. Stop writing down on paper your secret information and stop relying on other computer address books which do not provide the detailed information this one does and is not secure. Chat Little Black Address Book keeps track of the most personal of personal information about your chat partners. This software provides all the standard information about | |||
Updated: 9, 2005 | Rating: 0 | Author: Tim Hirtle | Size: 5147 kb | Shareware Go to category: Communications > Chat & Instant Messaging Similar programs | |||
169. | CryptoForge 3.2.5 (cryptoforge.com) | ||
on an insecure network (like the Internet), and still remain secret. Later, the information can be decrypted into its original form. CryptoForge integrates the strongest cryptography available today into the Windows environment. The file encryption module enables you to encrypt, decrypt, and wipe -with the built-in file shredder- files of any type, as well as entire folders and | |||
Updated: 9, 2005 | Rating: 0 | Author: Hernan Tornielli | Size: 2124 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
170. | East-Tec Eraser 2006 7.0 (east-tec.com) | ||
the Recycle Bin, previously deleted files, valuable corporate trade secrets, business plans, personal files, photos or confidential letters, or entire drives, floppy disks, CDs/DVDs, USB flash drives, etc. East-Tec Eraser 2006 offers full support for popular browsers (Internet Explorer, Netscape | |||
Updated: 2, 2006 | Rating: 76 | Author: Horatiu Tanescu | Size: 4933 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
171. | East-Tec File Shredder 1.0 (east-tec.com) | ||
and nobody will be able to recover your valuable corporate trade secrets, business plans, personal files, photos or confidential letters. East-Tec File Shredder overwrites and verifies the destruction of every bit of the file, making recovery impossible. Deleting a file with Windows or with other programs will leave the file contents on your hard disk, easy to be recovered by anyone | |||
Updated: 3, 2005 | Rating: 79 | Author: Horatiu Tanescu | Size: 709 kb | Freeware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
172. | East-Tec FormatSecure 2005 2.0 (east-tec.com) | ||
If you think that merely formatting a drive is enough to actually delete data, you may be in for a big surprise. There are plenty of free tools that can be used by anyone and that can unformat the drive and reconstruct the data. That's why when you give your co-worker or friend a file or a program on a disk | |||
Updated: 9, 2005 | Rating: 44 | Author: Horatiu Tanescu | Size: 1224 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
173. | Email Spy Pro 4.5 (email-spy.biz) | ||
computer it sends exact copies of all outgoing emails to your secret email address. While monitored user sends emails by using usual email client software (like Microsoft Outlook Express, Eudora, Pegasus, The Bat! or similar), all his outgoing emails will be INVISIBLY copied to your secret email address pre-configured via Email Spy Control Panel. Unique feature of Email | |||
Updated: 9, 2005 | Rating: 0 | Author: Eric Nilsson | Size: 323 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
174. | FastFolder by BB 3.3.0 (dogkennels.net) | ||
is a FREE full working version. There are NO registry changes nor secret files made. FastFolder by BB contains no Spyware or AdWare, and is totally non-intrusive. FastFolder by BB allows quick access to twelve selectable folders from a tray icon. It uses minimum system resources, and is a FREE full working version. FastFolder by BB contains no Spyware or AdWare and makes NO registry | |||
Updated: 9, 2005 | Rating: 0 | Author: Bernie Madigan | Size: 94 kb | Freeware Go to category: System Utilities > File & Disk Management Similar programs | |||
175. | File Monster 2.6.7 (nstarsolutions.com) | ||
File Monster completely erases files from your system -- actually overwriting the information in the file so it can not be recovered. The reason information is still available when you delete files with normal deletion methods is because normal deletion methods only tell the operating system to not recognize | |||
Updated: 9, 2005 | Rating: 0 | Author: Jeff Camino | Size: 432 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
176. | File Tutelary 1.12 (siskinsoft.com) | ||
File Tutelary is a shareware to encrypt and decrypt your files by your own password quickly and securly. You can encrypt any file with a password so your documents are kept safe away from prying eyes. It also includes many features such as step by step to make it easier to use. What's FileTutelary | |||
Updated: 9, 2005 | Rating: 42 | Author: Ricky Chen | Size: 570 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
177. | FileMap by BB 4.0.4 (dogkennels.net) | ||
be times when your firewall is out-smarted allowing files to be secretly installed to hard disk through no fault of your own. For other reasons, files in the windows and system directories will mysteriously grow over time. If you had a record of files before and after, it would be easy to determine which files do not belong. FileMap by BB lets you take control of the growing | |||
Updated: 9, 2005 | Rating: 30 | Author: Bernie Madigan | Size: 144 kb | Freeware Go to category: Security & Privacy > Other Similar programs | |||
178. | MySecretFolder 3.0 (winability.com) | ||
programs. Highly customizable and user-friendly. http://www.my-secret-folder.com/ MySecretFolder - You can hide or protect with a password your personal folder with private files and documents, on both the NTFS and FAT/FAT32 volumes. Very easy to use. Supports the stealth operation and hot key | |||
Updated: 9, 2005 | Rating: 0 | Author: Andrei Belogortseff | Size: 402 kb | Shareware Go to category: Security & Privacy > Access Control Similar programs | |||
179. | Free History Cleaner 2.82 (aidsoft.com) | ||
issues. This program is equiped with features such as cleaning the secret index.dat file, typed url, cookies, cache, most recently used data among other things. The all new version of Free History Cleaner comes with tons of new features and benfits. New web page sections like Interactive User Forums, helps you answer a lot of your online privacy | |||
Updated: 9, 2005 | Rating: 0 | Author: Abhishek Lodha | Size: 444 kb | Shareware Go to category: Network & Internet > Browsers Similar programs | |||
180. | Ghost Keylogger 3.80 (keylogger.net) | ||
every keystroke to an encrypted log file. The log file can be sent secretly with email to a specified receiver. Ghost Keylogger also monitors the Internet activity by logging the addresses of visited homepages. It monitors time and title of the active application; even text in editboxes and message | |||
Updated: 8, 2004 | Rating: 298 | Author: Jon Kagstrom | Size: 600 kb | Demo Go to category: System Utilities > Other Similar programs | |||
181. | GRL RealHidden 1.0 (grltechnology.com) | ||
GRL RealHidden version 1.0 is a software utility that allows you to hide a file physically inside of another file, and then retrieve that hidden file. The resulting 'cloaked' file, that is the file containing hidden file, usually operates exactly like the original file. This product gives you the power to | |||
Updated: 9, 2005 | Rating: 0 | Author: Galen Lande | Size: 1967 kb | Freeware Go to category: System Utilities > Other Similar programs | |||
182. | Hara-Kiri 2.02 (cyteg.com) | ||
Malefactor runs your computer with hope to profit by important secrets of your firm... But he don't know that it is necessary to press a combination of certain keys while Windows is starting up! And secrets silently and secretly are deletet from disc... 2. You are under suspicion that during your absence your wife/husband/colleagues/mammy (to underline the required) | |||
Updated: 9, 2005 | Rating: 0 | Author: Viktor Korokhin | Size: 601 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
183. | Harry Potter Clock 2.0 (pxcompany.com) | ||
deadly Chamber of Secrets has opened, but no one even believes it exists. Voices whisper in your head, a monster is lurking the halls and a deadly clock ticks life away. Install this Harry Potter clock and see Harry Potter and his friends, hear the magical sounds of Hogwarts School of Witchcraft and Wizardry and enjoy the mysterious clock showing precise time right on your computer | |||
Updated: 6, 2005 | Rating: 168 | Author: Parallaxis Software | Size: 1537 kb | Shareware Go to category: Desktop > Clocks & Alarms Similar programs | |||
184. | Hermetic Stego 5.17 (hermetic.ch) | ||
Hermetic Stego is a steganography program which allows you to encrypt and hide a message (the contents of any computer file) in another file so that the addition of the message to the container file will not noticeably change the appearance of that file. If the file which has been hidden is deleted then | |||
Updated: 9, 2005 | Rating: 42 | Author: Hermetic Systems | Size: 1896 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
185. | Hider 1.1 (amosoft.net) | ||
Hider is a special steganography application used to encrypt and hide files within image, audio and video files. Files hidden with Hider are not only undetectable, but irretrievable as well. Hider uses advanced technology to protect files including: 256-bit encryption algorithm - Rijindael, advanced | |||
Updated: 9, 2005 | Rating: 79 | Author: AmoSoft Team | Size: 1165 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
186. | IIPwr Package 2.00 (iipwr.com) | ||
Ever wanted to spy on a computer you own but currently don't have direct access to? With IIPwr's KeySpy this is exactly what you are able to do! IIPwr is a professional surveillance software that gives you the ability to know everything that is going on with any computer. It monitors and records | |||
Updated: 9, 2005 | Rating: 0 | Author: Allen Gor | Size: 759 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
187. | Internet Explorer Password Revealer 1.3 (rixler.com) | ||
This password recovery tool designed for viewing and cleaning the secret data stored by Internet Explorer. This includes managing passwords for protected sites, user passwords on forms, Content Advisor password and autocomplete | |||
Updated: 3, 2005 | Rating: 48 | Author: Felix Kosolapov | Size: 664 kb | Shareware Go to category: Security & Privacy > Password Managers Similar programs | |||
188. | Invisible Secrets Encryption Software 4.4 (neobytesolutions.com) | ||
Secrets Encryption Software 4 not only encrypts your data and files for safe keeping or for secure transfer across the net, it also hides them in places that on the surface appear totally innocent, such as picture or sound files, or web pages. These types of files are a perfect disguise for sensitive information. Nobody, not even your wife, boss, or a hacker would realize that | |||
Updated: 2, 2006 | Rating: 0 | Author: NeoByte Solutions | Size: 2740 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
189. | Jetico Personal Firewall 1.0.1.61 (jetico.com) | ||
attacks from outside as well as from malicious programs "living" secretly inside your computer's memory and hard drive. Three levels of protection are included: low-level network packets filtering, application-level network events filtering and filtering of user-level process activity. Jetico Personal Firewall checks every packet that comes in or out of your computer. Using | |||
Updated: 9, 2005 | Rating: 42 | Author: Jetico Inc. | Size: 2744 kb | Freeware Go to category: System Utilities > Other Similar programs | |||
190. | Keep It (a) Secret! 2002B (amateur-invest.com) | ||
remember one, and all the other will be revealed. Use "Keep It (a) Secret". Keep all your passwords, userid's, codes, etc. safe and secure in just one place. - In todays world there are so many codes, that you have to remembers - now you just have to remember one, and all the other will be revealed. Use "Keep It (a) | |||
Updated: 3, 2005 | Rating: 0 | Author: R. Michael | Size: 390 kb | Freeware Go to category: Home & Hobby > Other Similar programs | |||
191. | Keylogger Pro 1.7 (exploreanywhere.net) | ||
low level stealth keystroke monitoring application that will secretly record and backup all keystrokes typed on your PC. It offers a wide variety of features including the ability to view keystrokes remotely by having the program send keystrokes to a specified email address every X hours. KeyloggerPro can run in total stealth mode for invisible monitoring or with an optional | |||
Updated: 2, 2006 | Rating: 257 | Author: Bryan Hammond | Size: 886 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
192. | Lock My PC 3.4 (fspro.net) | ||
the TaskTray icon to lock down your PC. Stop worrying that your secrets will be revealed! Download FREE trial | |||
Updated: 2, 2006 | Rating: 0 | Author: FSPro Labs | Size: 1005 kb | Shareware Go to category: Security & Privacy > Access Control Similar programs | |||
193. | LockBox 2.11 (locksoft.net) | ||
The LockBox looks and acts much like a regular windows folder, except it is opened with a password. Any files dragged into the LockBox are protected with a strong encryption algorithm. Files can be run or modified from directly within the LockBox, without compromising security. Large files can optionally be | |||
Updated: 3, 2005 | Rating: 474 | Author: David Dosanjh | Size: 600 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
194. | Masker 7.0.6 (softpuls.com) | ||
Hide files and have them automatically encrypted! MASKER is able to hide your sensitive files within another file (carrier file), which is absolute discrete and looks like regular file without changing the exterior impression. MASKER encrypts files using strong encryption algorithms. (CAST 128-bit, MASKER is able to hide your sensitive files within other files (carrier files), which are absolute discrete and look like regular files without changing the exterior impression | |||
Updated: 3, 2006 | Rating: 16 | Author: Evgeny Zaretskiy | Size: 2399 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
195. | Stauri Orataur 1.1 (victauri.com) | ||
Stauri Orataur is a simple but effective knowledge bot. Ask it a question and it will supply a straightforward answer. No long lists of web addresses and no tedious secondary search through hundreds of web pages returned by your initial question. Orataur uses Victauri's Stauri(tm) technology to filter | |||
Updated: 9, 2005 | Rating: 0 | Author: Tom Triggs | Size: 926 kb | Freeware Go to category: Network & Internet > Search/Lookup Tools Similar programs | |||
196. | fitW (fine tuning of Windows) 4.0.0.4000 (mtsv.fromru.com) | ||
The utility for fine tuning of Windows 9x/Me/2000/XP. More than 250 most necessary and often used options. Exists a possibility of saving and loading a necessary configuration, changing and uninstalling of program, changing of autorunning program, etc. Automatic determination of version of system. Depending | |||
Updated: 9, 2005 | Rating: 0 | Author: MTsv DN | Size: 193 kb | Shareware Go to category: Security & Privacy > Anti-Virus Tools Similar programs | |||
197. | Secret Explorer 6.6.1471 (unhsolutions.net) | ||
passwords), and much more with this new system inspection tool. Secret Explorer is designed to browse, analyze and edit hidden data which is stored in undocumented Windows Protected Storage. With Secret Explorer import/export feature you can also move all your personalized information from one computer to another, basically familiarizing a new system with you. This system | |||
Updated: 2, 2006 | Rating: 0 | Author: Vitas Ramanchauskas | Size: 504 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
198. | Secret Explorer 6.6.1471 (unhsolutions.net) | ||
passwords), and much more with this new system inspection tool. Secret Explorer is designed to browse, analyze and edit hidden data which is stored in undocumented Windows Protected Storage. With Secret Explorer import/export feature you can also move all your personalized information from one computer to another, basically familiarizing a new system with you. This system | |||
Updated: 2, 2006 | Rating: 0 | Author: Vitas Ramanchauskas | Size: 504 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
199. | Network and Dial-up Password Revealer 1.2 (rixler.com) | ||
Network and Dial-up Password Revealer is a dependable password recovery solution for network and dial-up connections. Most networks use authentication and authorization to allow or deny access to the Internet, network or other computers. This means there are tens, hundreds or even thousands of logins and | |||
Updated: 3, 2005 | Rating: 4330 | Author: Felix Kosolapov | Size: 594 kb | Shareware Go to category: Security & Privacy > Password Managers Similar programs | |||
200. | Outlook Express Password Revealer 1.1 (rixler.com) | ||
Outlook Express Password Revealer is a program that helps the user to display server names, user logins and passwords for all the e-mail and newsgroups accounts stored by Outlook Express as well as identity passwords. Most people who use Outlook Express have multiple e-mail and/or newsgroup accounts. Almost | |||
Updated: 3, 2005 | Rating: 0 | Author: Felix Kosolapov | Size: 552 kb | Shareware Go to category: Security & Privacy > Password Managers Similar programs | |||
|
Home > Secret software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|