|
||||||
|
||
|
Home > Invisible software |
Related keywords: invisible keylogger, invisible surf, invisible key logger, invisible keylogger 97, make folders invisible, invisible secret, invisible and undetectable |
|
|
1. | Active ERASER 4.01 (active-eraser.com) | ||
The program also wipes out deleted files, which Windows just renders invisible, from your disk. It cleans the tracks of your Internet and local activities, such as cookies and temporary files. The log lets you control the process. You can schedule erasing to trigger every time you start Active Eraser | |||
Updated: 9, 2005 | Rating: 489 | Author: Data Security | Size: 1030 kb | Demo Go to category: System Utilities > Other Similar programs | |||
2. | DLM 666 2.2 (delemme.com) | ||
it with DLM 666' '!" : "Numerology is helpful, to understand the invisible and the notions of Luck, Destin... But it seems so complex, so mysterious... There was a real need for a reliable, cheap and powerful software... No more excuse now: click, enter a data, clack and you get an amazing document | |||
Updated: 9, 2005 | Rating: 0 | Author: Philippe DELEMME | Size: 2400 kb | Shareware Go to category: Home & Hobby > Other Similar programs | |||
3. | Paragon Drive Backup Personal 6.0 (pad.paragon.ag) | ||
for hard disk backups, upgrades and cloning. Backup to CD/DVD and invisible hard disk volumes, including system areas to backup without interrupting Windows; via LAN or locally; bootable CD in case of | |||
Updated: 9, 2005 | Rating: 155 | Author: Konstantin Komarov | Size: 4844 kb | Demo Go to category: System Utilities > Backup & Restore Similar programs | |||
4. | SpyAnytime PC Spy 2.4 (waresight.com) | ||
interface. SpyAnytime PC Spy works just like a combination of invisible keyLogger, screen snapshots captor, web Urls recorder, plus application and file/folder monitor. But not like other products sold them in split package, SpyAnytime PC Spy is a complete package with all above components! Have you ever wondered what your spouse, kids or employees have been doing on the | |||
Updated: 9, 2005 | Rating: 520 | Author: Jason H | Size: 1400 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
5. | SurfSecret Privacy Protector 5.02 (surfsecret.com) | ||
sits down to use your computer - your entire surfing history will be invisible to them. By constantly destroying cookies, Privacy Protector makes it impossible for companies to profile or track your actions on the web. Nobody will know where you have been surfing - not a family member, friend, or even | |||
Updated: 9, 2005 | Rating: 16 | Author: Jon Oringer | Size: 800 kb | Shareware Go to category: Network & Internet > Other Similar programs | |||
6. | Active Desktop Calendar 5.99 (xemico.com) | ||
on the desktop. You can set each note to normal, private or invisible desktop view. Private notes are displayed as generic text reminder and invisible notes are not displayed at all. Printing calendar data is easy and includes an option to choose date range for printing notes. Special desktop pictures option allows you to add some of your pictures to existing desktop | |||
Updated: 2, 2006 | Rating: 1356 | Author: XemiComputers Ltd. | Size: 2243 kb | Shareware Go to category: Home & Hobby > Personal Finance Similar programs | |||
7. | PC Activity Monitor (PC Acme) 6.4 (softsecurity.com) | ||
Activity Monitor (PC Acme) is an ultimate invisible and undetectable easy-to-use monitoring and surveillance tool for both networked and personal PCs. It is professional software that captures all users activity on the PC. All data collected by the monitoring are saved to encrypted log file. It is a powerful management tool for users and companies, which want to increase their | |||
Updated: 9, 2005 | Rating: 0 | Author: Raytown Corporation LLC | Size: 976 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
8. | PDF Editor 2.4 (cadkas.de) | ||
pages. Also you can hide the information on a page so that it is invisible in the Acrobat Reader but can be unhidden later. You can change the page size or move the content. Add stamps like "Confidential" or "Top secret". The source code of the page (a language like HTML) is editable for you. Use the program to read and write encrypted pdf files. The program leaves the layout | |||
Updated: 2, 2006 | Rating: 42 | Author: Christian A.D. Kassler | Size: 1875 kb | Demo Go to category: Business > Other Similar programs | |||
9. | RecOnPhone 2.50.25 (reconphone.com) | ||
: in "hidden mode", the software can be made running and invisible at each PC startup. It will record but nothing will be heard and nothing will be displayed on the screen. RecOnPhone won't appear in the Windows task manager. The recordings file extension can also be renamed so that external programs can't read them. Password protection : The software cannot be run until | |||
Updated: 9, 2005 | Rating: 1382 | Author: Eric Brat | Size: 1390 kb | Freeware Go to category: Business > Other Similar programs | |||
10. | Silent Spy 2.0.4 (silent-spy.com) | ||
from simple setup and operation. Password protected and completely invisible to the user. Activity monitoring for network or home use, report on all user activity. Detailed activity recording including keystrokes and graphical summary reports from simple setup and operation. Password protected and completely invisible to the | |||
Updated: 3, 2005 | Rating: 116 | Size: 3685 kb | Shareware Go to category: Business > Other Similar programs | |||
|
Home > Invisible software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|