|
||||||
|
||
|
Home > Mute software |
Related keywords: mute sound card |
|
|
101. | Norton Personal Firewall 2003 (nct.symantecstore.com) | ||
Symantec’s Norton Personal Firewall 2003 keeps hackers out and personal data in. Its robust defenses include intrusion detection, application control, and privacy protection — all in one easy-to-use program. Right out of the box, Norton Personal Firewall hides your PC on the Internet to keep hackers from | |||
Updated: 9, 2005 | Rating: 0 | Author: Jennifer Leonard | Size: 766 kb | Shareware Go to category: Network & Internet > Other Similar programs | |||
102. | AeroTags TagsLock Pro 2.50 (aerotags.com) | ||
Do you own a website and need to protect your HTML files with password, encrypt the content of your web pages and hide source code of your HTML and XML documents? There is a solution! Today we are glad to offer an ultimate all-in-one solution for webmasters - AtomPark TagsLock Pro. This program provides | |||
Updated: 9, 2005 | Rating: 0 | Author: Evgeny Medvednicov | Size: 1045 kb | Shareware Go to category: Web Development > HTML Tools Similar programs | |||
103. | Chatterbox 1.2 (chatterbox.singlescrowd.com) | ||
Chatterbox offers one of the first downloadable dating services that allows you to instantly communicate with single people from all over the world. Say goodbye to attempting to have a meaningful conversation in a crowded loud bar. Now you can do it all online and Unlike other online dating services that use | |||
Updated: 9, 2005 | Rating: 42 | Author: Robert Fathers | Size: 355 kb | Freeware Go to category: Communications > Chat & Instant Messaging Similar programs | |||
104. | Hackers Coloring Book 3.02.18 (innerpeace.org) | ||
After an exhaustive search to find such a tool, we finally made our own. There are LOTS of color pickers out there. Many of them are slow. Most of them only show one color at a time. Colors on web pages do not exist alone. How they look together is very important. With the Hackers Coloring Book, you can | |||
Updated: 9, 2005 | Rating: 0 | Author: Inner Peace Volunteers | Size: 9 kb | Freeware Go to category: Development > Other Similar programs | |||
105. | Wav Mp3 Editor 6.5 (code-it.com) | ||
Record your band and convert the .wav to .mp3 to distribute on the web. Digitize your old tapes and records, save them to your hard drive, and then burn them to CD using your CDR software.Record your voice and add special effects (like echo and fade).Delete the annoying applause at the end of a song that was | |||
Updated: 9, 2005 | Rating: 113 | Author: mike baker | Size: 10026 kb | Shareware Go to category: Audio & Multimedia > Rippers & Converters Similar programs | |||
106. | pcAudit 6.3 (pcinternetpatrol.com) | ||
You have seen many times “Secured web site” or “Your transaction on this page is secured” on your bank's web site, online merchants, governmental and other web pages. What you probably did not understand is that even though the web site is in fact secure, this security does NOT extend to your computer | |||
Updated: 9, 2005 | Rating: 0 | Author: ISA, Inc ISA, Inc | Size: 97 kb | Freeware Go to category: Servers > Firewall & Proxy Servers Similar programs | |||
107. | Bean Software Search Control 2.2 (beansoftware.com) | ||
Enable feature rich database searching in your Windows application or on your web site! You can choose between four ways of searching: any word, all words, phrase or boolean search expression with AND, OR and NOT keywords. Bean Software Search Control creates WHERE clause of SQL Query to database. It Choose between four ways of searching: any word, all words, phrase or boolean search with AND, OR and NOT keywords. There is ActiveX, .NET and ASP.NET edition | |||
Updated: 9, 2005 | Rating: 0 | Author: Richard Bean | Size: 93 kb | Shareware Go to category: Development > Components & Libraries Similar programs | |||
108. | Visual Log 2.10 (softgears.com) | ||
To us the main concern about windows system security is it's weak log functions. A Unix/Linux administrator is able to trace what happened in the history, however it's really a nightmare to a windows administrator after a disaster has happened. Window's users have very few tools to find out who or | |||
Updated: 9, 2005 | Rating: 0 | Author: Song Huang | Size: 135 kb | Shareware Go to category: System Utilities > System Maintenance Similar programs | |||
109. | Window Security Toolkit 5.0 (dmisoftware.com) | ||
Get over 51 Advanced Security Settings for Windows with this power tool ! Window Security Toolkit helps you make windows totally secured by Providing access restrictions on the control panel, display settings, network, passwords, users, dos, games, internet, memory, printers, desktop, system, Internet | |||
Updated: 9, 2005 | Rating: 0 | Author: Dr.Salman Zafar | Size: 1710 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
110. | XP Style Hacker 1.0 (skyjuicesoftware.com) | ||
Get your old Win32 apps looking like their Windows XP counterparts! XP Style Hacker is a small unique tool that instantly transforms applications that do not recognise Windows XP visual styles to be "style aware". Just select the EXE file from the program dialog and the next time you run the program it will | |||
Updated: 9, 2005 | Rating: 42 | Author: Chooi Guan Lim | Size: 445 kb | Freeware Go to category: Desktop > Themes & Wallpaper Similar programs | |||
111. | Spyware Begone Free Scan 5.00 (aidsoft.com) | ||
Spyware Begone is back! More powerfuol than ever. Finds and removes unwanted Spyware & Adware infections, including Keyloggers, etc. Prevent Identity Theft, credit card theft, data corruption, Hacker attacks & even popup ads due to Spyware Infections. Now with built in AUTO PROTECT, LIVE UPDATE, SYSTEM | |||
Updated: 9, 2005 | Rating: 0 | Author: Bernie Ferguson | Size: 1651 kb | Freeware Go to category: Security & Privacy > Anti-Virus Tools Similar programs | |||
112. | Stealth Keyboard Interceptor for Win NT/2000/XP 6.0.1 (softsecurity.com) | ||
Stealth Keyboard Interceptor for Windows NT/2000/ XP (SKIn2000) is a monitoring program which allows to intercept all keystrokes, mouse clicks, captions of active windows, static text and other. It has a unique set of features that makes SKIn2000 the powerful program, suitable for perfect monitoring of user's | |||
Updated: 9, 2005 | Rating: 16 | Author: Raytown Corporation | Size: 467 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
113. | Toolfish Utility Suite 2.05 (rtsoft.com) | ||
also supports system wide keystroke and application logging, muting on inactivity, Stealth Mode and robust custom event creation by stacking triggers and actions and much more. Professional multi threaded version with full Unicode support. Supports 98/ME/W2K/XP. Toolfish is a collection of powerful utilities in one including Web Compare, Talking New Email Announcer, Site | |||
Updated: 9, 2005 | Rating: 0 | Author: Seth Robinson | Size: 1517 kb | Shareware Go to category: Desktop > Other Similar programs | |||
114. | Tweak Manager 2.12 (winguides.com) | ||
WinGuides Tweak Manager enables casual and experienced computer users alike to effortlessly make their computer systems faster, more efficient and more secure! With just a few mouse clicks you can customize virtually every aspect of your computer, including tweaks for popular software like Microsoft Office | |||
Updated: 9, 2005 | Rating: 0 | Author: WinGuides Software | Size: 1721 kb | Shareware Go to category: System Utilities > System Maintenance Similar programs | |||
115. | Tweaki...for Power Users 4.3.1 (jermar.com) | ||
Designed for *all* Windows operating systems, Tweaki is your Swiss Army knife of utilities. Configure, secure and optimize Windows, MS Office and Internet Explorer. Add productivity enhancements like right click functions that allow you to print the contents of a folder or drive, copy a path to the clipboard | |||
Updated: 9, 2005 | Rating: 0 | Author: Jerry Rawdon | Size: 3596 kb | Shareware Go to category: System Utilities > System Maintenance Similar programs | |||
116. | Tweaki/FileName Pro Bundle 1.2 (jermar.com) | ||
The Tweaki/FileName Pro bundle: Tweaki puts several Windows utilities into one easy to use program while adding hundreds of additional tweaks not found in other system tweakers. Tweaki exposes Windows optimizations that make your computer run and boot faster, secure your computer from unauthorized access | |||
Updated: 9, 2005 | Rating: 0 | Author: Jerry Rawdon | Size: 5802 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
117. | !Remove Access Passwords! 2.0 (e-tech.ca) | ||
Do you have a password protected Access Data file (MDB)? Is your system administrator unavailable, and you need access to your data. Do you need to modify your MS Access program code, and the programmer isn’t available? Do you like to hack? Do you have a database with user-level security? Want it | |||
Updated: 9, 2005 | Rating: 0 | Author: Neil Britto | Size: 1515 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
118. | #Remove Access Security 3.0 (e-tech.ca) | ||
'Remove Access Security 3.0' is the ultimate tool concerning security for Access databases. 'Remove Access Security' can reveal passwords, reset passwords and remove user-level security for secured and non-secured database (.MDB) files. This software is simple to use, and can be a real life-saver in a variety | |||
Updated: 9, 2005 | Rating: 1996 | Author: Neil Britto | Size: 350 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
119. | Secur-e-mail for Windows 1.20 (acmetoolz.com) | ||
Secur-e-mail will encrypt the communication between your e-mail client (e.g. Outlook) and the POP3 server using an SSH connection. No server-side installation is needed. The software runs on a Windows system tray. It will enable a local POP3 server on your computer, which will allow you to setup your e-mail | |||
Updated: 9, 2005 | Rating: 0 | Author: Sandra Anderson | Size: 510 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
120. | Panda Antivirus platinum 7 7.06 (pandasoftware.com) | ||
Panda Antivirus Platinum 7.0, an innovative security solution that adapts perfectly to the needs of today's small businesses and professionals , protecting information from viruses and hackers with a single product. With a series of additional security features, including a firewall and script blocker , this | |||
Updated: 9, 2005 | Rating: 410 | Author: Panda Software | Size: 25470 kb | Shareware Go to category: Security & Privacy > Anti-Virus Tools Similar programs | |||
121. | Power Spike - Baldur's Gate 2 SoA 1.00 (zeromassengine.com) | ||
Baldur's Gate 2 SoA Character Trainer. Power Spike is a quick and dirty editor that's fairly straight forward to use. While not the best editor for BG2, it suited my needs nicely ;) (It contains links to other BG2 game editting resources - just right click the image in the program interface) | |||
Updated: 9, 2005 | Rating: 0 | Author: Corby Johanneson | Size: 235 kb | Freeware Go to category: System Utilities > Other Similar programs | |||
122. | Power Spike - Icewind Dale 1.25 (zeromassengine.com) | ||
Icewind Dale character editor. This program was the first in line of programs that I hope to continue as time goes on - the Power Spike game editors. They're intended to be quick and dirty editors that will do most of the things you want to do in a game editor. This one edits the savegame file for programs that I hope to continue as time goes on - the Power Spike game editors | |||
Updated: 9, 2005 | Rating: 270 | Author: Corby Johanneson | Size: 412 kb | Freeware Go to category: Games & Entertainment > Tools & Editors Similar programs | |||
123. | PrivacyKeyboard 6.1 (anti-hack.biz) | ||
PrivacyKeyboard for Microsoft Windows 2000/XP is the FIRST product of its kind in the world that can provide every computer with strong protection against ALL types of keylogging programs (keyloggers) and keylogging hardware devices (hardware keyloggers), both known and unknown, currently in use or presently | |||
Updated: 9, 2005 | Rating: 0 | Author: Raytown Corporation LLC | Size: 2909 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
124. | ProBot 2.5.0 (nethunter.cc) | ||
ProBot is a powerful and effective computer monitoring solution. Primary task of this feature-packed surveillance system is user activity event interception and logging. ProBot software maintains the detailed event log that is stored securely in binary files. Special tools provided within the package are used | |||
Updated: 9, 2005 | Rating: 49 | Author: Andrei Birjukov | Size: 2225 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
125. | ProBot SE 2.3.0 (nethunter.cc) | ||
ProBot SE is a full-featured workstation monitoring tool. It allows administrators to keep track of all activity occurring on a computer. In addition to keystrokes and mouse clicks, it detects access to applications, folders and files on connected drives. It also watches over keylogging in NT console windows | |||
Updated: 9, 2005 | Rating: 48 | Author: Andrei Birjukov | Size: 2236 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
126. | PwdDoubleCheck (Passwords) 1.0.1 (doubleupsoftware.com) | ||
Developed using Microsoft s internal infrastructure. PwdDoubleCheck is an easy to use application to check the strength of your passwords on Windows based systems. Whether you are a security expert of a large multi-national corporation or a home computer user you should test your computers password strength | |||
Updated: 9, 2005 | Rating: 16 | Author: Daniel M. | Size: 2527 kb | Commercial Go to category: Security & Privacy > Password Managers Similar programs | |||
127. | Lock Folder XP 3.4 (everstrike.com) | ||
Lock Folder XP is a new security tool that lets you lock your files, folders and drives with your personal password. Now nobody but you can access your most sensitive information. Locking folders, files and drives also effectively protects you from malicious programs, such as viruses, worms and trojans. Here | |||
Updated: 9, 2005 | Rating: 126 | Author: Richard Davids | Size: 1243 kb | Shareware Go to category: Security & Privacy > Access Control Similar programs | |||
128. | MMHotkeys 1.1 (librarysmith.co.uk) | ||
or home users who need instant control of sound settings. (Instant mute when the phone rings!) User definable hotkeys enable you to select only the features of the utility that you require and define your own hotkeys simply by pressing them. Runs silently in the background and is configured using | |||
Updated: 9, 2005 | Rating: 16 | Author: Matthew Smith | Size: 775 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
129. | Mutilate File Wiper 2.92 (mutilatefilewiper.com) | ||
Normal File Deletion is NOT secure. Deleting files merely removes the file system's pointer to the file, ALL THE DATA REMAINS ON YOUR HARD DRIVE. The remaining data can be easily recovered with data recovery or forensic software. Your sensitive files may also be vulnerable to advanced recovery techniques | |||
Updated: 9, 2005 | Rating: 82 | Author: Craig Christensen | Size: 823 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
130. | My Firewall Plus 5.0 (webroot.com) | ||
Whether you connect to the Internet occasionally with a dial-up connection, or you are constantly connected via DSL, Cable, Satellite or via a Network, your personal data is at risk now more than ever. It used to be that hacking attacks came from the outside world (the Internet) and simple, low-cost firewalls | |||
Updated: 9, 2005 | Rating: 0 | Author: Steve Thomas | Size: 6006 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
131. | NetWorx 3.2 (softperfect.com) | ||
NetWorx is a simple, yet powerful tool that helps you objectively evaluate your bandwidth situation. You can use it to collect bandwidth usage data and measure the speed of your Internet or any other network connection. NetWorx can help you identify possible sources of network problems, ensure that you don't | |||
Updated: 9, 2005 | Rating: 16 | Author: Andrey Kotov | Size: 982 kb | Shareware Go to category: Network & Internet > Network Monitoring Similar programs | |||
132. | NookNak 2004 V1.0.0 (nakware.com) | ||
more with your mouse - easily. You can use it to quickly mute music when you want to talk to someone or hide confidential information quickly and easily. You can also use NookNak to disable and re-enable screen saving easily and start your favorite program with the same ease. With NookNak you can now | |||
Updated: 9, 2005 | Rating: 0 | Author: Andy Erceg | Size: 567 kb | Shareware Go to category: System Utilities > Shell Tools Similar programs | |||
133. | Geek Superhero 1.3 (geeksuperhero.com) | ||
Geek Superhero watches your computer for changes, immediately notifying you when a setting is altered to confirm you want to keep or reject the change. This catches many of the modifications made by a virus, trojan or worm; protecting your computer from harm. (A "Computer Setting Firewall" is an excellent | |||
Updated: 9, 2005 | Rating: 16 | Author: Michael Burford | Size: 2548 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
134. | Hotkey Assistant 1.5 (spellway.com) | ||
application closing - Sound control (volume up, volume down, mute) - Screensaver control - Removable Drive Control - management of portable data medium drives (CD-ROM drives, MO drives, Tape libraries) - Quick launch of any applications with the help of hotkeys Advanced features - A possibility to assign separate settings for any application - Differentiation of the | |||
Updated: 9, 2005 | Rating: 0 | Author: Spellway Ltd | Size: 765 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
135. | IntraMail 2003.01.20 (dplanet.ch) | ||
Secure exchange of messages in a local network Intranet (Windows 95, 98, Me, NT, 2000, XP). The mail (or Email) can be written or read from any PC easily. Every mail-account can be protected by a password. The personal messages are always strongly encrypted (with 3 adaptive codes). These short mails are Every mail-account can be protected by a password. Personal messages are strongly encrypted | |||
Updated: 9, 2005 | Rating: 42 | Author: Jean-Maurice Tellenbach | Size: 2918 kb | Shareware Go to category: Communications > E-Mail Clients Similar programs | |||
136. | Jetico Personal Firewall 1.0.1.61 (jetico.com) | ||
Jetico Personal Firewall protects your computer from unwanted hacker's attacks from outside as well as from malicious programs "living" secretly inside your computer's memory and hard drive. Three levels of protection are included: low-level network packets filtering, application-level network events as well as from malicious programs "living" secretly inside your computer's memory and hard drive | |||
Updated: 9, 2005 | Rating: 42 | Author: Jetico Inc. | Size: 2744 kb | Freeware Go to category: System Utilities > Other Similar programs | |||
137. | Lock Folder 5.0 (realclicks.com) | ||
Lock Folder is a new security tool that lets you lock your files and folders with your personal password. Now nobody but you can access your most sensitive information. Locking folders and files also effectively protects you from malicious programs, such as viruses, worms and trojans. Here is how Lock Folder | |||
Updated: 9, 2005 | Rating: 146 | Author: Leo van Opstal | Size: 1400 kb | Freeware Go to category: System Utilities > Other Similar programs | |||
138. | LockTheFile 1.8 (okosoft.com) | ||
LockTheFile is a tool that encrypts files with strong encryption alghorytm. You may protect any information - text files, pictures, video and audio files from other eyes and ears, as many files as you need, without any limites. The core functions of this program are: Strong encryption alghorytm; Handy | |||
Updated: 9, 2005 | Rating: 0 | Author: Andrew Maltsev | Size: 1808 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
139. | EzCrypt+ 2.01 (kmgi.com) | ||
EzCrypt+ by KMGI makes protection of sensitive data as simple as a mouse click. KMGI is a leading Internet technologies company whose innovations have been acclaimed as "The cutting edge" (CNN) and "The Future of the Internet" (Forbes). EzCypt+ adds Encrypt option to your mouse’s right button menu. Just | |||
Updated: 9, 2005 | Rating: 0 | Author: Alex Konanykhin | Size: 616 kb | Shareware Go to category: Communications > E-Mail Clients Similar programs | |||
140. | F-Secure Anti-Virus 2004 2004 (f-secure.com) | ||
With F-Secure Anti-Virus 2004 you can surf on the Internet, open e-mail attachments and use your computer without any fear of virus infections. You can also be sure that you are not sending viruses to others. Especially for home users and small offices without dedicated IT-staff, F-Secure Anti-Virus | |||
Updated: 9, 2005 | Rating: 34 | Author: F-Secure Corporation | Size: 6866 kb | Commercial Go to category: System Utilities > Other Similar programs | |||
141. | F-Secure Internet Security 2003 2003 (f-secure.com) | ||
Download now a highly advanced service against viruses and break-in attempts when you are connected to the Internet! F-Secure Internet Security 2003 includes an award winning antivirus software and an easy-to-use personal firewall product that protects your system against break-in attempts when you are when you are connected to the Internet. F-Secure Internet Security 2003 is easy to install and use. Updates automatically over Internet. You can safely read your e-mail and surf the Internet | |||
Updated: 9, 2005 | Rating: 45 | Author: F-Secure Corporation | Size: 6416 kb | Commercial Go to category: Security & Privacy > Anti-Virus Tools Similar programs | |||
142. | File Monster 2.6.7 (nstarsolutions.com) | ||
File Monster completely erases files from your system -- actually overwriting the information in the file so it can not be recovered. The reason information is still available when you delete files with normal deletion methods is because normal deletion methods only tell the operating system to not recognize | |||
Updated: 9, 2005 | Rating: 0 | Author: Jeff Camino | Size: 432 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
143. | FitoNT 1.0.0.0 (netnet.ca) | ||
WRONG....In today's day and age, your personal or company data is in danger 24 hours a day 7 days a week. That 7 day span, or 24 hour span is to long to have your valuable data in harms way. Your data is under constant threat from virus's brought in by employee's checking their e-mail, internet hackers | |||
Updated: 9, 2005 | Rating: 0 | Author: Boris na | Size: 3752 kb | Freeware Go to category: System Utilities > Backup & Restore Similar programs | |||
144. | FolderAccess 2.0 (lockfolder.net) | ||
FolderAccess is a new security tool that lets you lock your files and folders with your personal password. Now nobody but you can access your most sensitive information. Locking folders and files also effectively protects you from malicious programs, such as viruses, worms and trojans. Here is how Lock Folder | |||
Updated: 9, 2005 | Rating: 0 | Author: Leo van Opstal | Size: 4313 kb | Freeware Go to category: System Utilities > Other Similar programs | |||
145. | DA Password Recovery Pro 2.03 (deskarsenal.com) | ||
Internet security has long become a buzz word. Everywhere you go, you hear about it. Naturally, it is great to feel yourself safe and secure when surfing the Net. When you enter your password on most sites, you see only asterisk signs. This feature is intended to protect your passwords; but sometimes this | |||
Updated: 9, 2005 | Rating: 740 | Author: DeskArsenal.com | Size: 656 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
146. | DeskBar 1.5 (barefootinc.com) | ||
click. Volume Control: Select your main volume setting and mute with one click. Set Default Printer: Allows the default printer to be changed. If you need to add a new printer, it can be done from DeskBar. Screen Saver: Starts the default screen saver. Power Indicator: Shows whether your notebook is running on AC power or battery. Shutdown: One-click shutdown | |||
Updated: 9, 2005 | Rating: 16 | Author: Don Metzler | Size: 703 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
147. | Anti-keylogger 6.1 (anti-keyloggers.com) | ||
Anti-keylogger for Windows 2000/XP provides every computer with strong protection against most types of the keylogging software, both known and unknown. Anti-keylogger blocks keylogging programs activity without using of signature bases. Anti-keylogger is capable to buck various types of keylogging programs | |||
Updated: 9, 2005 | Rating: 16 | Author: Raytown Corporation LLC | Size: 2659 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
148. | ATS Warning! The Boss! 1.6 (apituan.com) | ||
hiding windows, applications and the icons in the systray and mute the sound of your PC. You will be able to hide entirely applications and windows, one by one, by class or by title or all very easily. Control the visibility by hotkeys that will give you total control of each window, hiding and showing them according to your needs. You will be able to modify the hotkeys according | |||
Updated: 9, 2005 | Rating: 0 | Author: Jorge Millet | Size: 2001 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
149. | BCWipe 3.07.2 (jetico.com) | ||
BCWipe ensures that another person will not restore files you have deleted from a disk. When you delete sensitive files from a disk on your computer, Windows does not erase the contents of these files from the disk - it only deletes 'references' to these files from filesystem tables. Contents of the deleted | |||
Updated: 9, 2005 | Rating: 24 | Author: Jetico Inc. | Size: 2651 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
150. | BestCrypt 7.20.2 (jetico.com) | ||
BestCrypt is easy-to-use, powerful data encryption software. You allocate a portion (container) of free space of your drive where you keep all your sensitive data in encrypted form. BestCrypt creates a virtual drive in your system which you work with like with any other drive. All data written there are | |||
Updated: 9, 2005 | Rating: 55 | Author: Jetico Inc. | Size: 5004 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
|
Home > Mute software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|