|
||||||
|
||
|
Home > Hidden software |
Related keywords: hidden files, hidden password, hidden share, hidden sharing, hidden errors, hidden picture, hidden picture puzzle game, hidden stereo, hidden watermarks, hidden camera |
|
|
1. | G-Lock SpamCombat 2.61 (glocksoft.com) | ||
code. - Safe email preview - no pictures are downloaded, no hidden scripts or codes are executed. - Cuts down unproductive email traffic and saves bandwidth. - Filters email from multiple email accounts. - Can work in a fully automatic mode. - Provides an easy way of recovering deleted emails. - Has a very customizable user interface. - Provides comprehensive statistics | |||
Updated: 3, 2006 | Rating: 16 | Author: Alex Markov | Size: 4209 kb | Shareware Go to category: Security & Privacy > Anti-Spam & Anti-Spy Tools Similar programs | |||
2. | Clean Disk Security 7.54 (diskcleaners.com) | ||
list. Comes with a "Direct Disk Viewer" for discovering all that is hidden on your hard disk. Don't sell your hard drive before cleaning it with this program! Now with improved support for WinNT/2000/XP. Comes with plugins, a plugin editor, and cookie management. Now cleans "index.dat" internet history | |||
Updated: 3, 2006 | Rating: 16 | Author: Kevin Solway | Size: 660 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
3. | Masker 7.0.6 (softpuls.com) | ||
RIJNDAEL 256-bit, TWOFISH) The encrypted files will then be hidden within a carrierfile. MASKER is able to compress files in order to reduce size of the carrier file. As a carrier file you can use: image files (bmp, gif, jpg, tif); audio files (wav, mid, snd, mp3); program files (exe, dll, ocx); video files (avi, mov, mpg, asf); For example, you could create a picture file | |||
Updated: 3, 2006 | Rating: 16 | Author: Evgeny Zaretskiy | Size: 2399 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
4. | WinCal 4.9.0 (techsysconsultants.com.au) | ||
The memories of special events, such as holidays, are no longer hidden in photographic albums but before you every day. A business is able to produce a calendar promoting themselves, their products or services to their customers in minutes. You can use the wizard to produce a calendar in minutes or, once you are familiar with the complete tool set, you can experience the full | |||
Updated: 2, 2006 | Rating: 0 | Author: Rajesh Jain | Size: 16326 kb | Shareware Go to category: System Utilities > Text/Document Editors Similar programs | |||
5. | WinCal 4.9.0 (techsysconsultants.com.au) | ||
The memories of special events, such as holidays, are no longer hidden in photographic albums but before you every day. A business is able to produce a calendar promoting themselves, their products or services to their customers in minutes. You can use the wizard to produce a calendar in minutes or, once you are familiar with the complete tool set, you can experience the full | |||
Updated: 2, 2006 | Rating: 0 | Author: Rajesh Jain | Size: 16326 kb | Shareware Go to category: System Utilities > Text/Document Editors Similar programs | |||
6. | Folder Lock 5.3.9 (newsoftwares.net) | ||
drives, pictures and documents in seconds. Protected files are hidden, undeletable, inaccessible and highly secure. It hides files from kids, friends and co-workers, safeguards them from viruses, trojans, worms and spyware, and even protects them from networked PCs, cable users and hackers. Files can also be protected on USB Flash Drives, Memory Sticks, CD-RW, floppies and | |||
Updated: 2, 2006 | Rating: 6296 | Author: Salman Ashraf | Size: 1941 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
7. | Hide Window Hotkey 2.5 (elongsoft.com) | ||
by pressing hotkey.At a later time you will be able to return all hidden windows back to the desktop and continue your work.And you also can close those hidden windows through another hotkey.You also can hide the current window through a hotky. Automatically manages any window you specify. For instance, some web browsers open up in a non-maximized window. Using Hide Window | |||
Updated: 2, 2006 | Rating: 0 | Author: Helen Lin | Size: 885 kb | Shareware Go to category: System Utilities > Shell Tools Similar programs | |||
8. | Secret Explorer 6.6.1471 (unhsolutions.com) | ||
hidden data, such as IE form autocomplete data (including logins and passwords), recover various internet passwords (passwords to protected websites, email account and identity passwords), and much more with this new system inspection tool. Secret Explorer is designed to browse, analyze and edit hidden data which is stored in undocumented Windows Protected Storage. With Secret | |||
Updated: 2, 2006 | Rating: 0 | Author: Vitas Ramanchauskas | Size: 504 kb | Shareware Similar programs | |||
9. | Secret Explorer 6.6.1471 (unhsolutions.com) | ||
hidden data, such as IE form autocomplete data (including logins and passwords), recover various internet passwords (passwords to protected websites, email account and identity passwords), and much more with this new system inspection tool. Secret Explorer is designed to browse, analyze and edit hidden data which is stored in undocumented Windows Protected Storage. With Secret | |||
Updated: 2, 2006 | Rating: 0 | Author: Vitas Ramanchauskas | Size: 504 kb | Shareware Similar programs | |||
10. | Secret Explorer 6.6.1471 (unhsolutions.net) | ||
hidden data, such as IE form autocomplete data (including logins and passwords), recover various internet passwords (passwords to protected websites, email account and identity passwords), and much more with this new system inspection tool. Secret Explorer is designed to browse, analyze and edit hidden data which is stored in undocumented Windows Protected Storage. With Secret | |||
Updated: 2, 2006 | Rating: 0 | Author: Vitas Ramanchauskas | Size: 504 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
|
Home > Hidden software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|