|
||||||
|
||
|
Home > Mute software |
Related keywords: mute sound card |
|
|
41. | Hide&Protect 1.016c (softwar-protect.com) | ||
Hide&Protect is built in as invisible protection of any Windows programs against Hackers. Hide&Protect forbid use of debugger, obstruct the full result of a memory dumper witch makes it inoperative. More, Hide&Protect compress and encrypt your application, and has mechanism of monitoring of your application | |||
Updated: 9, 2005 | Rating: 0 | Author: LE CHATELIER Jerome | Size: 1113 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
42. | IntraMail 2003.01.20 (homepage.sunrise.ch) | ||
Secure exchange of messages in a local network Intranet (Windows 95, 98, Me, NT, 2000, XP). The mail (or Email) can be written or read from any PC easily. Every mail-account can be protected by a password. The personal messages are always strongly encrypted (with 3 adaptive codes). These short mails are Every mail-account can be protected by a password. Personal messages are strongly encrypted | |||
Updated: 9, 2005 | Rating: 0 | Author: Jean-Maurice Tellenbach | Size: 2918 kb | Shareware Go to category: Communications > E-Mail Clients Similar programs | |||
43. | PC Activity Monitor (PC Acme) 6.4 (keyloggers.com) | ||
PC Activity Monitor (PC Acme) is an ultimate invisible and undetectable easy-to-use monitoring and surveillance tool for both networked and personal PCs. It is professional software that captures all users activity on the PC. All data collected by the monitoring are saved to encrypted log file. It is a | |||
Updated: 9, 2005 | Rating: 0 | Author: Raytown Corporation LLC | Size: 976 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
44. | PC Activity Monitor (PC Acme) 6.4 (keyloggers.com) | ||
PC Activity Monitor (PC Acme) is an ultimate invisible and undetectable easy-to-use monitoring and surveillance tool for both networked and personal PCs. It is professional software that captures all users activity on the PC. All data collected by the monitoring are saved to encrypted log file. It is a | |||
Updated: 9, 2005 | Rating: 0 | Author: Raytown Corporation LLC | Size: 976 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
45. | #Remove Access Security 3.0 (e-tech.ca) | ||
'Remove Access Security 3.0' is the ultimate tool concerning security for Access databases. 'Remove Access Security' can reveal passwords, reset passwords and remove user-level security for secured and non-secured database (.MDB) files. This software is simple to use, and can be a real life-saver in a variety | |||
Updated: 9, 2005 | Rating: 102 | Author: Neil Britto | Size: 350 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
46. | Tweak Manager 2.12 (winguides.com) | ||
WinGuides Tweak Manager enables casual and experienced computer users alike to effortlessly make their computer systems faster, more efficient and more secure! With just a few mouse clicks you can customize virtually every aspect of your computer, including tweaks for popular software like Microsoft Office | |||
Updated: 9, 2005 | Rating: 42 | Author: WinGuides Software | Size: 1721 kb | Shareware Go to category: System Utilities > System Maintenance Similar programs | |||
47. | Tweaki...for Power Users 4.3.5 (jermar.com) | ||
Designed for *all* Windows operating systems, Tweaki is your Swiss Army knife of utilities. Configure, secure and optimize Windows, MS Office and Internet Explorer. Add productivity enhancements like right click functions that allow you to print the contents of a folder or drive, copy a path to the clipboard | |||
Updated: 9, 2005 | Rating: 0 | Author: Jerry Rawdon | Size: 3658 kb | Shareware Go to category: System Utilities > System Maintenance Similar programs | |||
48. | Anti-BO 1.5b (swiftprogramming.com) | ||
Anti-BO is a listening device which sits in your system tray awaiting hack attempts from Trojan programs like Back Orifice and Netbus. The program works my making your system look vulnerable to those who scan the internet for infected machines, and logs attempts of entry with your attackers IP address & | |||
Updated: 9, 2005 | Rating: 69 | Author: Ben Hynes | Size: 1100 kb | Shareware Go to category: Servers > Other Server Applications Similar programs | |||
49. | Christmas Pictures Screensaver 1.5b (altixsoft.com) | ||
MERRY CHRISTMAS! Deck your desktop with images that convey the spirit of the season. The collection of colorful Christmas images includes: Santa, natty spruce, toys, embellishment, home baking and cakes, gifts. It is available 40 miraculous images. All images in resolution 800*600 and High-Color (24-bit). The collection of colorful Christmas images includes: Santa, natty spruce, toys, embellishment, home baking and cakes, gifts. It's available 40 images + 6 tunes | |||
Updated: 9, 2005 | Rating: 0 | Author: Alec Ch. | Size: 5376 kb | Shareware Go to category: Desktop > Similar programs | |||
50. | Mutilate File Wiper 2.92 (home.att.net) | ||
Normal File Deletion is NOT secure. Deleting files merely removes the file system's pointer to the file, ALL THE DATA REMAINS ON YOUR HARD DRIVE OR FLOPPY DISK. The remaining data can be easily recovered with data recovery or forensic software. Your sensitive files may also be vulnerable to advanced recovery | |||
Updated: 9, 2005 | Rating: 0 | Author: Craig Christensen | Size: 824 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
|
Home > Mute software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|