|
||||||
|
||
|
Home > Secret software |
Related keywords: secret chamber, secret passwords, Surf Secret, secret key encryption, secret allies, The Secret Garden, invisible secret, secret pictures, secret diary, secret hotkey |
|
|
251. | Biblio School 2.0.2 (librarysmith.co.uk) | ||
The Biblio School software package has designed by teachers and school librarians as a teaching resource specifically for the school environment (originally for primary school libraries, although it may be applicable to smaller secondary schools) and with pupils in mind. The librarian and teaching staff can | |||
Updated: 9, 2005 | Rating: 42 | Author: Matthew Smith | Size: 2671 kb | Shareware Go to category: Business > Databases & Tools Similar programs | |||
252. | Harry Potter Clock 2.0 (pxcompany.com) | ||
deadly Chamber of Secrets has opened, but no one even believes it exists. Voices whisper in your head, a monster is lurking the halls and a deadly clock ticks life away. Install this Harry Potter clock and see Harry Potter and his friends, hear the magical sounds of Hogwarts School of Witchcraft and Wizardry and enjoy the mysterious clock showing precise time right on your computer | |||
Updated: 6, 2005 | Rating: 168 | Author: Parallaxis Software | Size: 1537 kb | Shareware Go to category: Desktop > Clocks & Alarms Similar programs | |||
253. | Real Lives 2004 (educationalsimulations.com) | ||
Educational Simulations offers Real Lives, the life simulation that gives you the opportunity to learn how people really live in other countries. Real Lives is an interactive life simulation software program that enables you and your students to live one of billions of lives in any country in the world | |||
Updated: 5, 2005 | Rating: 0 | Author: Bob Runyan | Size: 86914 kb | Demo Go to category: Education > Other Similar programs | |||
254. | Ghost Keylogger 3.80 (keylogger.net) | ||
every keystroke to an encrypted log file. The log file can be sent secretly with email to a specified receiver. Ghost Keylogger also monitors the Internet activity by logging the addresses of visited homepages. It monitors time and title of the active application; even text in editboxes and message | |||
Updated: 3, 2005 | Rating: 0 | Author: Jon Kagstrom | Size: 600 kb | Demo Similar programs | |||
255. | ViewFolderSize 2.52 (softmajor.com) | ||
you waste disk's free space, just open your Windows Explorer and all secrets before your eyes. ViewFolderSize is Windows Explorer add-in, which adds ability to view folder's content size as well as file size. Now you needn't any additional utility to find a folder where you waste disk's free | |||
Updated: 3, 2005 | Rating: 329 | Author: Andrey Veselov | Size: 981 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
256. | AbsoluteSystemBackup 1.1 (asbackup.com) | ||
AbsoluteSystemBackup - is the best professional backup program. AbsoluteSystemBackup presents a high-quality program to keep your data at your PC. There are a lot of reasons of information loss: software problems, system errors in the operating system, etc. Sometimes it is impossible to restore the AbsoluteSystemBackup presents a backup utility for Windows 9Z/Me/Xp/2000. AbsoluteSystemBackup presents a high-quality program to keep your data at your PC | |||
Updated: 3, 2005 | Rating: 0 | Author: Dmitry Lapkin | Size: 6398 kb | Shareware Go to category: System Utilities > Backup & Restore Similar programs | |||
257. | 007 Spy Software 3.01 (e-spy-software.com) | ||
Spy Software is a stealthy monitoring spyware which allows you to secretly track all activities of computer users and automatically deliver logs to you via Email or FTP, including all areas of the system such as email sent, Web sites visited, files operations, every keystroke, username and password, online conversation (ICQ, MSN, AIM), and take screen snapshots at set intervals just | |||
Updated: 3, 2005 | Rating: 1455 | Author: Demi He | Size: 2176 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
258. | East-Tec File Shredder 1.0 (east-tec.com) | ||
and nobody will be able to recover your valuable corporate trade secrets, business plans, personal files, photos or confidential letters. East-Tec File Shredder overwrites and verifies the destruction of every bit of the file, making recovery impossible. Deleting a file with Windows or with other programs will leave the file contents on your hard disk, easy to be recovered by anyone | |||
Updated: 3, 2005 | Rating: 79 | Author: Horatiu Tanescu | Size: 709 kb | Freeware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
259. | Internet Explorer Password Revealer 1.3 (rixler.com) | ||
This password recovery tool designed for viewing and cleaning the secret data stored by Internet Explorer. This includes managing passwords for protected sites, user passwords on forms, Content Advisor password and autocomplete | |||
Updated: 3, 2005 | Rating: 48 | Author: Felix Kosolapov | Size: 664 kb | Shareware Go to category: Security & Privacy > Password Managers Similar programs | |||
260. | LockBox 2.11 (locksoft.net) | ||
The LockBox looks and acts much like a regular windows folder, except it is opened with a password. Any files dragged into the LockBox are protected with a strong encryption algorithm. Files can be run or modified from directly within the LockBox, without compromising security. Large files can optionally be | |||
Updated: 3, 2005 | Rating: 474 | Author: David Dosanjh | Size: 600 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
261. | Network and Dial-up Password Revealer 1.2 (rixler.com) | ||
Network and Dial-up Password Revealer is a dependable password recovery solution for network and dial-up connections. Most networks use authentication and authorization to allow or deny access to the Internet, network or other computers. This means there are tens, hundreds or even thousands of logins and | |||
Updated: 3, 2005 | Rating: 4330 | Author: Felix Kosolapov | Size: 594 kb | Shareware Go to category: Security & Privacy > Password Managers Similar programs | |||
262. | Outlook Express Password Revealer 1.1 (rixler.com) | ||
Outlook Express Password Revealer is a program that helps the user to display server names, user logins and passwords for all the e-mail and newsgroups accounts stored by Outlook Express as well as identity passwords. Most people who use Outlook Express have multiple e-mail and/or newsgroup accounts. Almost | |||
Updated: 3, 2005 | Rating: 0 | Author: Felix Kosolapov | Size: 552 kb | Shareware Go to category: Security & Privacy > Password Managers Similar programs | |||
263. | ComThing 7.0 (interlocator.com) | ||
ComThing is a completely automatic tool which stops all spam for a given address or addresses. ComThing will also optionally archive all spam so that the user does not have to ever wonder if they missed something. There are several secondary tools as well which have been designed to make internet ComThing will also optionally archive all spam so that the user does not have to ever wonder if they missed something | |||
Updated: 3, 2005 | Rating: 0 | Author: Mike Hunt | Freeware Go to category: Security & Privacy > Anti-Spam & Anti-Spy Tools Similar programs | |||
264. | Porno Crawler 4.1 (iloveu.free.fr) | ||
the files it will download. Just try it and you will see ! The secret of Porno Crawler is that this program downloads porn files from external web sites that are refreshed daily or weekly by their owners. Porno Crawler has the ability to search into Internet Sex Directories, and to recognize millions of pictures and movies galleries within billions of advertisements. Of course you | |||
Updated: 3, 2005 | Rating: 25663 | Author: JAMAN JAMAN | Size: 4368 kb | Shareware Go to category: Network & Internet > Search/Lookup Tools Similar programs | |||
265. | Ax NetGuard 2.0 (ax-soft.com) | ||
NetGuard allows you to either secretly view the activities of another user or you can use the parent control features to limit a user's access to the computer. Taking control of your PC is next step beyond monitoring. Many parents have problems with their children spending too much time on the | |||
Updated: 3, 2005 | Rating: 42 | Author: Moser Damien | Size: 2187 kb | Shareware Go to category: Network & Internet > Browsers Similar programs | |||
266. | IE Booster 2.13 (paessler.com) | ||
online resources to check and analyze a webpage. Uncover the Secrets of The Web. Have you ever wondered how websites are built? Have you ever wondered what information about you is being passed from webpage to webpage? Have you ever needed to search a website that doesn’t have a search feature? Don’t wonder anymore because IE Booster will help you answer any question you have ever | |||
Updated: 3, 2005 | Rating: 0 | Author: Dirk Paessler | Size: 2544 kb | Shareware Go to category: Network & Internet > Browsers Similar programs | |||
267. | Dreamystar Organizer 2.8 (dreamysoft.com) | ||
book,schedule,Notes,to do,anniversary,eBook,ePhoto,finance and secrets.Supports Data Password Protect,Data category.with a real-time reminder monitor,a nice book reader and a powerful photo viewer,user can import contacts from outlook, use address book as word merge data source,change data directory,set world time,support word merge mail,bulk mail send,report print and design,many | |||
Updated: 3, 2005 | Rating: 0 | Author: smartstone Lee | Size: 3014 kb | Shareware Go to category: Home & Hobby > Personal Finance Similar programs | |||
268. | Of Dreams 1.0 (e-dition.net) | ||
the dream dimension so that not only scholars could master the secrets of this magical world, but the average person. Of Dreams has taken the art of reading dreams to a new, easy level combining dream halting or enhancing herbs, crystals and stones to assist on your dream quest. Also included are elemental power therapies, magical stones for your astrological sign, child's play | |||
Updated: 3, 2005 | Rating: 0 | Author: Angie Garcia | Size: 3029 kb | Demo Go to category: Home & Hobby > Other Similar programs | |||
269. | Keep It (a) Secret! 2002B (amateur-invest.com) | ||
remember one, and all the other will be revealed. Use "Keep It (a) Secret". Keep all your passwords, userid's, codes, etc. safe and secure in just one place. - In todays world there are so many codes, that you have to remembers - now you just have to remember one, and all the other will be revealed. Use "Keep It (a) | |||
Updated: 3, 2005 | Rating: 0 | Author: R. Michael | Size: 390 kb | Freeware Go to category: Home & Hobby > Other Similar programs | |||
270. | AdvancedBiorhythms:Lite 1.5 (whitestranger.com) | ||
Advanced Biorhythms is a powerful but at the same time easy-to-use application ideal for making the personal forecasts. The program’s got a scientific basis: that is the western theory of biorhythms containing oriental philosophy. Having knowledge about biorhythms you can be sure what to expect at any day | |||
Updated: 3, 2005 | Rating: 124 | Author: Dmitry Konovalov | Size: 1162 kb | Freeware Go to category: Home & Hobby > Health & Nutrition Similar programs | |||
271. | Split 'n Match Infinite 1.10 (splitnmatch.com) | ||
you explore the map by throwing a dice, uncovering and solving the secret hidden rounds to win the game. Test your eye for details by locating/matching random cells picked out from a splitted puzzle pic before the time runs | |||
Updated: 3, 2005 | Rating: 0 | Author: Yap Alan | Size: 1947 kb | Shareware Go to category: Games & Entertainment > Puzzle & Word Games Similar programs | |||
272. | The Walls of Jericho 1.0 (enterjericho.com) | ||
The Walls of Jericho is a challenging move-and-match puzzle game sure to twist the brain and please the eye. Inspired by the epic tale of faith and perseverance, this game features awesome artwork and classic gameplay for the whole family. Just match up colored blocks to crumble them, align powerful special | |||
Updated: 3, 2005 | Rating: 0 | Author: Full Armor Studios | Size: 5816 kb | Shareware Go to category: Games & Entertainment > Puzzle & Word Games Similar programs | |||
273. | WinMind 2.10A (winimage.com) | ||
is a single-player game. Your goal is to break the secret code created by the computer. This code is made of 5 slots which can be either empty (expert mode only) or contain a ball randomly chosen among balls from 8 different colors. WinMind offers you three different modes: beginner, intermediate or expert that use different code creation schemes: - Beginner mode: WinMind | |||
Updated: 3, 2005 | Rating: 0 | Author: François Liger | Size: 19 kb | Freeware Go to category: Games & Entertainment > Other Similar programs | |||
274. | Hang3001 - Hangman for Windows 1.04 (winograd.com) | ||
unlimited lists of your own words, hints and much more. Hang3001 is secretly-educational. It's played for fun, but you can't help learning. Included in Hang3001 is a new Knowledge Area. This area will include information associated with the guessed word or phrase. If the word chosen is from the States or Countries category, for example, the Knowledge Area will show the capital of the | |||
Updated: 3, 2005 | Rating: 0 | Author: Ken Winograd | Size: 912 kb | Shareware Go to category: Games & Entertainment > Other Similar programs | |||
275. | teoria 2.0 (teoria.com) | ||
Software for developing music theory and ear training skills with construction, identification and ear training exercises of intervals (melodic and harmonic), chords (triads, 7ths, 9ths, 11ths and 13ths), scales (major, minor, modes, whole tone, diminished), key signatures, harmonic functions (secondary | |||
Updated: 3, 2005 | Rating: 48 | Author: Jose Rodriguez Alvira | Size: 7704 kb | Shareware Go to category: Education > Other Similar programs | |||
276. | GUIPDFTK 0.4 (free.pages.at) | ||
then pdftk is an electronic staple-remover, hole-punch, binder, secret-decoder-ring, and X-Ray-glasses. Pdftk is a useful tool for handling PDF documents. Every PDF user should have one in the top drawer of his/her desktop. Use it to: Merge PDF Documents Split PDF Pages into a New Document Decrypt Input as Necessary (Password Required) Encrypt Output as Desired Burst a PDF | |||
Updated: 3, 2005 | Rating: 5222 | Author: Dirk Paehl | Size: 1122 kb | Freeware Go to category: Development > Other Similar programs | |||
277. | SecuritySkillz PC SystemGaurd 1.1 (securityskillz.com) | ||
destroys those hidden FTP type trojans(backdoors) transferring your secret data and confidential files without your knowledge. Even those advanced trojans which use random ports to trasfer your private details. Keloggers generally require a secret hotkey to become visible, but our code fools it into revealing itself just by clicking a single button. When spy program is | |||
Updated: 3, 2005 | Rating: 0 | Author: Amit Gupta | Size: 3072 kb | Shareware Go to category: Business > Other Similar programs | |||
278. | AccountUnity 1.0 (silkmoth.net) | ||
With AccountUnity, you NEVER give your details to ANYONE; your secret information remains secret. Your details are stored only on your own PC using multi-level encryption and security. Once you log in to AccountUnity, everything you do and the financial details you see go directly between your PC and the institutions holding your accounts. Your information is never seen by | |||
Updated: 3, 2005 | Rating: 102 | Author: N/A N/A | Size: 777 kb | Freeware Go to category: Business > Accounting & Finance Similar programs | |||
279. | P.C. Police 2004 (pc-police.nethint.com) | ||
spouses, malicious users and negligent employees on the spot. It secretly logs almost all PC activities including text copying on the computer. It is password-protected, its main log files are encrypted and it has stop/resume functionality. You can set and change your password, view different date logs, print the logs, set up a warning screen for legal purposes and more. P.C. Police | |||
Updated: 3, 2005 | Rating: 0 | Author: Roumen Petrov | Size: 2520 kb | Shareware Go to category: Audio & Multimedia > Other Similar programs | |||
280. | Dominant Ad Creator 2.3.2 (volcanicsoft.com) | ||
system, a quick-start guide, step-by-step tutorials, auction listing secrets, and more. After generating the ad, you can easily insert it into eBay, Yahoo Auctions, and any other site that accepts HTML ads. Dominant Ad Creator allows anyone to create full-blown, professional looking auction ads in a matter of minutes! The ads you create are compatible with virtually all auction sites | |||
Updated: 8, 2004 | Rating: 0 | Author: Matt Pilz | Size: 3759 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
281. | Overhead 1.3 (3rddaysoftware.com) | ||
OverHead is a church song organizer for Microsoft Powerpoint. It's designed to allow churches to organize their songs into a list to be shown during a service. * Built-in search feature to find a songs with word(s) in it. * Special secondary play list for special slides, (car lights on, baby care | |||
Updated: 8, 2004 | Rating: 0 | Author: Lou Vasquez | Size: 44032 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
282. | Ghost Keylogger 3.80 (keylogger.net) | ||
every keystroke to an encrypted log file. The log file can be sent secretly with email to a specified receiver. Ghost Keylogger also monitors the Internet activity by logging the addresses of visited homepages. It monitors time and title of the active application; even text in editboxes and message | |||
Updated: 8, 2004 | Rating: 298 | Author: Jon Kagstrom | Size: 600 kb | Demo Go to category: System Utilities > Other Similar programs | |||
283. | PC Activity Monitor Net 6.3 (spy-soft.biz) | ||
you can launch or delete PC Activity Monitor Net™. This lets you secretly monitor anything viewed on your computer while you are away. This process goes on undetected and logs a considerable amount of data. Simply install the agent to the PCs and within seconds, you'll be monitoring your networked computers. Log file can be optionally sent via e-mail to a specified address (or saved | |||
Updated: 8, 2004 | Rating: 0 | Author: Raytown Corp. | Size: 981 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
284. | @KeyLogger Home 2.10 (activity-tracker.com) | ||
@KeyLogger is the highly flexible, all-round desktop security monitoring solution used by concerned parents, small businesses, and "Fortune 500" companies alike. @KeyLogger is also popular for many special tasks like software usability testing or scientific studies of PC usage. So how do you know what your | |||
Updated: 8, 2004 | Rating: 48 | Author: Konstantin Romanovsky | Size: 959 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
285. | The Keytrap Application invisible keylogger 2.1 (keytrap.camouflagesoft.com) | ||
activity. The keystrokes are stored in an encrypted file in a secret location. There is an Admin program available for retrieving the keystroke information in a convenient report format. The report stores the keystrokes according to application as well as date and time. The program will record everything - including all passwords typed, all chat room activity, etc. It also lets you | |||
Updated: 8, 2004 | Rating: 116 | Size: 458 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
|
Home > Secret software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|