|
||||||
|
||
|
Home > Bay software |
|
|
1. | Calendarscope 3.0 beta 2 (calendarscope.com) | ||
Calendarscope is a full-featured calendar program for planning, managing, and scheduling appointments, meetings, birthdays, vacations, important dates, special events, and tasks. It allows you to view all your events in standard calendar views and supports to-do lists. Reminder windows have customizable | |||
Updated: 3, 2006 | Rating: 486 | Author: Vladimir Kulemin | Size: 2220 kb | Shareware Go to category: Business > PIMS & Calendars Similar programs | |||
2. | Super Utilities 6.25 (superlogix.net) | ||
Super Utilities offers 26 tools for fixing, speeding up, maintaining, and protecting your PC. It encompasses four suites of utilities: System Cleaner, Privacy Protector, System Maintenance, and Special Utilities. 1.System Cleaner features a spyware-removal component as well as tools for cleaning your disk and | |||
Updated: 3, 2006 | Rating: 16 | Author: li jiangnan | Size: 3328 kb | Shareware Go to category: System Utilities > System Maintenance Similar programs | |||
3. | Masker 7.0.6 (softpuls.com) | ||
Hide files and have them automatically encrypted! MASKER is able to hide your sensitive files within another file (carrier file), which is absolute discrete and looks like regular file without changing the exterior impression. MASKER encrypts files using strong encryption algorithms. (CAST 128-bit, MASKER is able to hide your sensitive files within other files (carrier files), which are absolute discrete and look like regular files without changing the exterior impression | |||
Updated: 3, 2006 | Rating: 16 | Author: Evgeny Zaretskiy | Size: 2399 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
4. | Dekart Private Disk 2.07 (dekart.com) | ||
Powerful, reliable and flexible disk encryption program that lets you create encrypted disk partitions (drive letters) to protect your confidential information. Private Disk hides your programs and data, and restricts access to them. Dekart Private Disk includes innovative Disk Firewall mechanism - a unique | |||
Updated: 2, 2006 | Rating: 0 | Author: Dekart Contact | Size: 1159 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
5. | Starfish Family Mail 1.51 (lincolnbeach.com) | ||
Starfish Family Mail is a Windows email program that lets you communicate via email with all your friends and family! Parents or teachers can set up friend lists for each person so that you can rest assured that they are only communicating with their friends! Each person logs in as themselves and using | |||
Updated: 2, 2006 | Rating: 0 | Author: Lincoln Beach Software | Size: 2409 kb | Shareware Go to category: Network & Internet > Other Similar programs | |||
6. | Image Broadway 5.1 (filestream.com) | ||
Easy-to-Use Graphic Tools at Your Fingertips Image Broadway lets you create and edit graphic images with special effects like a pro in just minutes. From simple tasks to advanced image editing capabilities, Image Broadway does it all and does it very well. It offers state-of-the-art digital image | |||
Updated: 2, 2006 | Rating: 0 | Author: Yao Chu | Size: 10414 kb | Shareware Go to category: Graphic Apps > Editors Similar programs | |||
7. | Hide Window Hotkey 2.5 (elongsoft.com) | ||
Hide Window Hotkey is a utility which allows you to hide the windows, and programs which are running on your screen.It will instantly hide or close all (or some) programs on your screen through Mouse Hotkey or Keyboard Hotkey in order to prevent uninvited persons from seeing them.It will serve you well at | |||
Updated: 2, 2006 | Rating: 0 | Author: Helen Lin | Size: 885 kb | Shareware Go to category: System Utilities > Shell Tools Similar programs | |||
8. | Steganography 1.7.1.1 (securekit.com) | ||
Steganography: an excellent method of embedding information on the contents of the file within another file! Make your secrets invisible in just 3 quick steps! Steganography enables you to use digital data hiding techniques (steganography) to hide files and messages within other files (carriers) such as | |||
Updated: 2, 2006 | Rating: 1019 | Author: Rachel White | Size: 1106 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
9. | Steganography 1.7.1.1 (pipisoft.com) | ||
Steganography: an excellent method of embedding information on the contents of the file within another file! Make your secrets invisible in just 3 quick steps! Steganography enables you to use digital data hiding techniques (steganography) to hide files and messages within other files (carriers) such as | |||
Updated: 2, 2006 | Rating: 0 | Author: Rachel White | Size: 1106 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
10. | FileBox eXtender 1.91.01 (hyperionics.com) | ||
Navigate easily through Windows folder maze with FileBox eXtender buttons placed on standard Windows file boxes. Access your favorite and recently visited folders and documents with one mouse click or hot key. Make the file boxes bigger to see more folders and files. Optionally FileBX buttons can be also | |||
Updated: 2, 2006 | Rating: 0 | Author: Greg Kochaniak | Size: 631 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
11. | 1st Privacy Tool for Windows 4.9.2.2 (privacywindows.com) | ||
1st Privacy Tool is a powerful security utility that allows you to restrict access to Windows important resources. This easy-to-use utility helps you to keep your computer in order. It enables you to impose a variety of access restrictions to protect your privacy. You can deny access to each individual | |||
Updated: 2, 2006 | Rating: 0 | Author: Eugene Mihailov | Size: 1500 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
12. | Modem Spy 1.8 (softcab.com) | ||
Modem spy is handy utility for phone calls recording. Features: 1) records phone conversations. 2) records from microphone. 3) plays back recorded mesages via phone line. 4) Plays back recorded mesages via sound card. 5) Can record ALL incomming phone calls. 6) Has built-in software automatic gain control. 7) | |||
Updated: 2, 2006 | Rating: 90 | Author: Sergei Polishchuk | Size: 78 kb | Shareware Go to category: Audio & Multimedia > Rippers & Converters Similar programs | |||
13. | Tracks Eraser Pro 5.61 (acesoft.net) | ||
Your computer is spying on you now! It stores all the evidence of your activities into your hard disk. Anyone using your computer can see where you have been on Internet, what images and movies you have seen, and even anything you have done on your computer could be seen by others. The Windows built-in | |||
Updated: 2, 2006 | Rating: 90 | Author: Acesoft | Size: 1624 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
14. | WiseTerm Telnet/Serial (32-bit) 3.1.2 (johnnypops.demon.co.uk) | ||
Win32 emulation of WY50, WY50+ and WY60 terminals. Part of the WiseTerm suite of telnet/serial emulators. Features: programmable keyboard; protect/write-protect modes; 24/25/42/43 line by 80/132 column display including Econ-80; char, line, page attributes; multiple, sizeable page modes; full split-screen | |||
Updated: 2, 2006 | Rating: 48 | Author: John Popplewell | Size: 415 kb | Shareware Go to category: Network & Internet > Other Similar programs | |||
15. | Windows Security Officer 6.8.1.1 (1securitycenter.com) | ||
Windows Security Officer is an autonomous provider of log-on and resource restriction security application integrated with, yet independent of, the Windows operating system. It has the capability of providing extremely strong, secure control of who can access a personal computer resources, and exactly what | |||
Updated: 2, 2006 | Rating: 0 | Author: Eugene Mihailov | Size: 1578 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
16. | Maverick Launch Centre 2.1.004 (skaro.net) | ||
If you're tired of trudging through endless menus from the start button, this may be the answer to your prayers. Maverick is a powerful and flexible launcher that can be configured to provide quick access to your documents, applications and games, etc. It combines ease of use with a myriad of features and | |||
Updated: 2, 2006 | Rating: 0 | Author: James Turner | Size: 1569 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
17. | EGuest PRO 4.1 (esoftpro.com) | ||
EGuest PRO is a comprehensive guestbook system based on the popular guestbook system EGuest. New features including Image Verification Code, Admin Interfaces, Theme, 250+ Emoticons, Advanced Search with Highlight, Auto Web/Email Links, IP/Word Banning, Blank Line Protection and much more. It excels other | |||
Updated: 2, 2006 | Rating: 0 | Author: Eric Leung | Size: 313 kb | Shareware Go to category: Network & Internet > Other Similar programs | |||
18. | ZoneTick 2.7.0 (products.wrconsulting.com) | ||
ZoneTick World Time Zone Clock is a download for Windows that replaces the regular system clock with several time zones of your choosing. Knowing the time around the world has never been simpler. Whether you travel from timezone to timezone or have international friends, ZoneTick is the clock for you | |||
Updated: 2, 2006 | Rating: 1410 | Author: Sales Rep | Size: 1072 kb | Shareware Go to category: Desktop > Clocks & Alarms Similar programs | |||
19. | WinLock Professional 4.32 (crystaloffice.com) | ||
WinLock is a comprehensive security solution for personal or publicly accessible computers. It is a program that ensures that only authorized people can access sensitive information on your computer. With WinLock you can control how long others can use your computer. It runs from the system tray and requires | |||
Updated: 2, 2006 | Rating: 0 | Author: Denis Zolotov | Size: 1628 kb | Shareware Go to category: Security & Privacy > Access Control Similar programs | |||
20. | WinLock 4.32 (crystaloffice.com) | ||
WinLock is a comprehensive security solution for personal or publicly accessible computers. It is a program that ensures that only authorized people can access sensitive information on your computer. With WinLock you can control how long others can use your computer. It runs from the system tray and requires | |||
Updated: 2, 2006 | Rating: 280 | Author: Denis Zolotov | Size: 1550 kb | Shareware Go to category: Security & Privacy > Access Control Similar programs | |||
21. | Windows Security Officer 6.8.1.1 (mybestsoft.com) | ||
Windows Security Officer is an autonomous provider of log-on and resource restriction security application integrated with, yet independent of, the Windows operating system. It has the capability of providing extremely strong, secure control of who can access a personal computer resources, and exactly what | |||
Updated: 2, 2006 | Rating: 0 | Author: Eugene Mihailov | Size: 1578 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
22. | Taskbar Manager 3.0 (askarya.com) | ||
If you are a Windows power user, have you ever wondered if your computer could prioritize your work view while you are multitasking? The taskbar gets cluttered with windows and it becomes annoying to switch between windows. Taskbar Manager is the desktop management utility you need. It will manage your * Hide applications on taskbar * Use Hot key to hide multiple applications * Disable startup applications * Avoid annoying Startup programs * Schedule automatic System shutdown/logoff/restart | |||
Updated: 2, 2006 | Rating: 928 | Author: Onkar Parhar | Size: 398 kb | Shareware Go to category: Audio & Multimedia > Encoders & Decoders Similar programs | |||
23. | SysDate 1.42 (SouthBayPC.com) | ||
SysDate shows the day of the month in the system tray (next to the time). This lets you see the current date with just a glance, instead of hovering the mouse pointer over the time. Great timesaver for those who are in front of a computer all day! Of course, the display is fully customizable: you can choose | |||
Updated: 2, 2006 | Rating: 16 | Author: South Bay Software | Size: 209 kb | Shareware Go to category: Desktop > Clocks & Alarms Similar programs | |||
24. | SuperCleaner 2.89 (southbaypc.com) | ||
SuperCleaner is an all in one disk cleaner for Windows. Its built-in Garbage Finder can find hundreds or even thousands of megabytes of unneeded files taking up space on your computer. The Internet Privacy features of SuperCleaner will let you erase your web browser's cache, history, cookies, and even the | |||
Updated: 2, 2006 | Rating: 121 | Author: South Bay Software | Size: 409 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
25. | SecureIT Encryption Software 3.1.7 (cypherix.co.uk) | ||
Cypherix's Secure IT 2000 is an easy to use, feature packed program that protects all your files and folders using 448bit strong Blowfish encryption. It includes a powerful, customizable file shredder. Secure IT 2000 has the ability to generate self-decrypting email attachments that allows the user to send | |||
Updated: 2, 2006 | Rating: 0 | Author: Cypherix Cypherix | Size: 2088 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
26. | SafeSystem 2006 (gemiscorp.com) | ||
SafeSystem allows you to prevent access to your personal and important files and folders, as well as protect and guarantee the integrity and well functioning of your system. It can make your files and folders completely invisible, inaccessible or simply read-only and prevent the change of configuration and | |||
Updated: 2, 2006 | Rating: 0 | Author: GemiScorp | Size: 2376 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
27. | PS Tray Factory 2.1 (pssoftlab.com) | ||
PS Tray Factory is a powerful and handy tool meant to flexibly control ALL the other icons in the system tray of the taskbar. PS Tray Factory will help you to manage all the applications that place their icons in the taskbar tray. When you have installed PS Tray Factory, you will forget about the problem of | |||
Updated: 2, 2006 | Rating: 48 | Author: Sergey Poplavsky | Size: 842 kb | Shareware Go to category: Desktop > Clocks & Alarms Similar programs | |||
28. | PS Tray Factory 2.1 (pssoftlab.com) | ||
PS Tray Factory is a powerful and handy tool meant to flexibly control ALL the other icons in the system tray of the taskbar. PS Tray Factory will help you to manage all the applications that place their icons in the taskbar tray. When you have installed PS Tray Factory, you will forget about the problem of | |||
Updated: 2, 2006 | Rating: 0 | Author: Sergey Poplavsky | Size: 842 kb | Shareware Go to category: Desktop > Clocks & Alarms Similar programs | |||
29. | Professional Renamer 2.35 (miklsoft.com) | ||
Professional Renamer helps catalogue images, music and other content of your hard drive via meaningful file names. The program offers sophisticated templates and filtering to save time and maintain consistency of name patterns. Professional Renamer is a robust tool for batch editing of file names. It | |||
Updated: 2, 2006 | Rating: 0 | Author: Mihail Cherkashin | Size: 1144 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
30. | PowerKey 2.11.01.22 (elcor.net) | ||
PowerKey is an advanced encryption toolkit designed to protect your most sensitive data. Thanks to its easy-to-use and flexible interface you can now fastly encrypt your files and not worry about your information anymore, cause now it's safe. PowerKey allows creation of SFX packages (like WinZip). It | |||
Updated: 2, 2006 | Rating: 0 | Author: Nick Nifontov | Size: 1029 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
31. | PC LockUp 2.185 (softheap.com) | ||
PC LockUp is a computer security software, which enables you to apply password protection to Windows and restrict others from being able to use your PC while you are away. It starts automatically with Windows and optionally locks your desktop upon loading. It hides your desktop at the same time and shows a | |||
Updated: 2, 2006 | Rating: 0 | Author: Ixis Ltd Ixis Ltd | Size: 839 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
32. | Password Protected Lock 2.92 (softfolder.com) | ||
Password Protected Lock is an excellent security computer lock you can use to secure your PC and protect your privacy. It is attractive, secure, and very easy to use. It starts automatically with Windows and optionally activates desktop lock with password upon loading. It hides your desktop at the same time | |||
Updated: 2, 2006 | Rating: 0 | Author: SoftFolder Inc | Size: 724 kb | Shareware Go to category: Security & Privacy > Access Control Similar programs | |||
33. | Maverick Launch Centre 2.1.004 (skaro.net) | ||
If you're tired of trudging through endless menus from the start button, this may be the answer to your prayers. Maverick is a powerful and flexible launcher that can be configured to provide quick access to your documents, applications and games, etc. It combines ease of use with a myriad of features and | |||
Updated: 2, 2006 | Rating: 0 | Author: James Turner | Size: 1569 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
34. | PC LockUp 2.185 (getfreefile.com) | ||
PC LockUp is a computer security software, which enables you to apply password protection to Windows and restrict others from being able to use your PC while you are away. It starts automatically with Windows and optionally locks your desktop upon loading. It hides your desktop at the same time and shows a | |||
Updated: 2, 2006 | Rating: 0 | Author: Ixis Ltd Ixis Ltd | Size: 839 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
35. | Hide Files 3.4 (hide-files.biz) | ||
You have any files or programs that you don't want to share with other or they contain financial and tax information, passwords, personal letters and emails, private images, and other confidential or personal data. But typically, computer files and folders have not security protection so the best way to | |||
Updated: 2, 2006 | Rating: 0 | Author: Eric Nilsson | Size: 234 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
36. | Hide Files 3.4 (spydex.com) | ||
You have any files or programs that you don't want to share with other or they contain financial and tax information, passwords, personal letters and emails, private images, and other confidential or personal data. But typically, computer files and folders have not security protection so the best way to | |||
Updated: 2, 2006 | Rating: 0 | Author: Eric Nilsson | Size: 234 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
37. | Directory Snoop 5.02 (briggsoft.com) | ||
Directory Snoop is a cluster-level search tool that lets Windows users snoop through their FAT and NTFS formatted disk drives to see what data may be hiding in the cracks. Use Directory Snoop to recover deleted files you thought you would never see again or permanently erase sensitive files so that no one | |||
Updated: 2, 2006 | Rating: 0 | Author: Kent Briggs | Size: 1534 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
38. | Dark Files 3.3.1.1 (mybestsoft.com) | ||
Dark Files can help you keep your files protected. You can choose who gets access to what files on your computer. This program provides three levels of protection to suit any user : "Hidden", "Read Only", "Full Control". It works with any Windows platforms : 9.x/ME/NT/2000/XP . Dark Files can work with | |||
Updated: 2, 2006 | Rating: 0 | Author: Eugene Mihailov | Size: 1006 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
39. | Cursor Hider 1.4.4 (softexe.com) | ||
Cursor Hider helps you to work more productively. It removes the mouse pointer (the mouse cursor does not cover the entered text) while you are working with the keyboard and returns the pointer with any mouse action. Real example: You are going to visit aweb site with forms to fill in. At first you type the | |||
Updated: 2, 2006 | Rating: 0 | Author: Nickolas Smith | Size: 279 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
40. | Astatix Launcher 1.62 (astatix.com) | ||
Astatix Launcher allows you to quick start any applications, open documents and explore folders in a single click. It allows assigning hotkeys to any actions, fulfilling several special functions: open/close CD door, run screen saver, hide task bar and others. One of additional possibilities is a control of | |||
Updated: 2, 2006 | Rating: 16 | Author: Sergey Goncharov | Size: 666 kb | Shareware Go to category: System Utilities > Launchers & Task Managers Similar programs | |||
41. | Advanced Security Level 6.1 (softfolder.com) | ||
Advanced Security Level is the best computer security application for Windows-based computers. It gives you an excellent administrative support to control the user access rights for your computer by setting up the desired access control level for each user. You can restrict access to Control Panel applets | |||
Updated: 2, 2006 | Rating: 16 | Author: SoftFolder Inc | Size: 1065 kb | Shareware Go to category: Security & Privacy > Access Control Similar programs | |||
42. | Active Keyboard 3.1 (drive-software.com) | ||
HotKey Program, Launch applications, documents, and URLs, and over 80 other actions to hot keys - Create shortcut keys supporting both mouse and keyboard macros - Minimize any window to the system tray with this utility - Hide application windows by using a hotkey or an icon in the system tray - - Control your Winamp player - Hide application windows - Open, Play and close your CD-ROM - Change the volume, mute - Empty recycle bin - Lock/Unlock Desktop | |||
Updated: 2, 2006 | Rating: 144 | Author: Dmitri Drive | Size: 914 kb | Shareware Go to category: Desktop > Other Similar programs | |||
43. | Active Key Logger 3.0 (winsoul.com) | ||
Active Key Logger this is the best choice for you if you think that others are using your computer when you are not home or away from your working place. After you install Active Key Logger on your computer, it will allow you to make program settings for tracking activities on your computer. If you enable | |||
Updated: 2, 2006 | Rating: 242 | Author: Alex Atushev | Size: 703 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
44. | Cursor Hider 1.4.4 (softexe.com) | ||
Cursor Hider helps you to work more productively. It removes the mouse pointer (the mouse cursor does not cover the entered text) while you are working with the keyboard and returns the pointer with any mouse action. Real example: You are going to visit aweb site with forms to fill in. At first you type the | |||
Updated: 2, 2006 | Rating: 0 | Author: Nickolas Smith | Size: 279 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
45. | Hot Corners 2.3 (southbaypc.com) | ||
Hot Corners lets you quickly activate or disable your screen saver by moving the mouse into any corner of the screen that you set. This is particularly useful when you need to leave your computer for a brief period, but don't want anybody to be able to access it. Using Hot Corners, you can turn on your screen | |||
Updated: 2, 2006 | Rating: 0 | Author: South Bay Software | Size: 185 kb | Shareware Go to category: Desktop > Similar programs | |||
46. | AllWallpapers 2.1 (nimblesoftware.com) | ||
The very first wallpaper management utility that really saves user money. AllWallpapers is the first and only utility that combines the capability in creating mobile wallpapers for any device, flexible desktop wallpaper management, and full-screen image slide show packed with numerous graphic effects. Taking | |||
Updated: 2, 2006 | Rating: 504 | Author: Nimble Software | Size: 2441 kb | Shareware Go to category: Desktop > Themes & Wallpaper Similar programs | |||
47. | Internet Secure Tunneling 2.0.0.228 (han-soft.biz) | ||
Internet Secure Tunneling can forward otherwise insecure TCP traffic through encrypted SSH Secure Shell tunnel. You can secure for example DATABASE, POP3, SMTP and HTTP connections that would otherwise be insecure. The tunneling capability of SSH Secure Shell is a feature that allows, for example, company | |||
Updated: 2, 2006 | Rating: 0 | Author: JING YU HAN | Size: 927 kb | Shareware Go to category: Network & Internet > Other Similar programs | |||
48. | #1 Smart Protector Pro - Internet Eraser 4.12 (smartprotector.com) | ||
Smart Protector Pro is an easy to use software that protects your privacy by erasing all the traces of your Internet activity automatically. It completely erases your Internet Explorer history, cookies, temporary files(cache), typed URLs(the drop down address list), AutoComplete, recent document list, Other features: Cookie Manager, Save/Restore State, Scheduling, Stealth mode, Emergency Key and more | |||
Updated: 2, 2006 | Rating: 440 | Author: Ivelin Kovatchev | Size: 440 kb | Shareware Go to category: Network & Internet > Browsers Similar programs | |||
49. | Internet Secure Tunneling 2.0.0.228 (han-soft.com) | ||
Internet Secure Tunneling can forward otherwise insecure TCP traffic through encrypted SSH Secure Shell tunnel. You can secure for example DATABASE, POP3, SMTP and HTTP connections that would otherwise be insecure. The tunneling capability of SSH Secure Shell is a feature that allows, for example, company | |||
Updated: 2, 2006 | Rating: 0 | Author: JING YU HAN | Size: 927 kb | Shareware Go to category: Network & Internet > Other Similar programs | |||
50. | AmiPic ShareMaster 6.16 (altomsoft.com) | ||
Send, share and download confidential data securely by storing it in images and other files. It lets you find even hidden web sites! Automated and fully customizable Internet search bot, Web and Usenet mass downloader with image viewer and useful tools, such as text finder, file splitter and duplicate files | |||
Updated: 2, 2006 | Rating: 113 | Author: Alexandre Tolmatchev | Size: 1441 kb | Shareware Go to category: Network & Internet > Download Managers Similar programs | |||
|
Home > Bay software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|