|
||||||
|
||
|
Home > Information hiding software |
|
|
91. | WinLock 4.32 (crystaloffice.com) | ||
that ensures that only authorized people can access sensitive information on your computer. With WinLock you can control how long others can use your computer. It runs from the system tray and requires a password to gain access to the available settings. It loads automatically with Windows and allows you to add an optional startup message, provide audio notification, and set the | |||
Updated: 2, 2006 | Rating: 280 | Author: Denis Zolotov | Size: 1550 kb | Shareware Go to category: Security & Privacy > Access Control Similar programs | |||
92. | WinLock Professional 4.32 (crystaloffice.com) | ||
that ensures that only authorized people can access sensitive information on your computer. With WinLock you can control how long others can use your computer. It runs from the system tray and requires a password to gain access to the available settings. It loads automatically with Windows and allows you to add an optional startup message, provide audio notification, and set the | |||
Updated: 2, 2006 | Rating: 0 | Author: Denis Zolotov | Size: 1628 kb | Shareware Go to category: Security & Privacy > Access Control Similar programs | |||
93. | ZMover 5.0 (basta.com) | ||
Simply tell ZMover which windows you want to modify and how, then hide the program and let it work in the background. ZMover will monitor the desktop and automatically reposition, resize, or even keep selected windows below or above the others when they open. ZMover can accommodate a large number of window layouts that you can name and sort to your convenience. Moreover, the program | |||
Updated: 3, 2005 | Rating: 16 | Size: 537 kb | Shareware Go to category: System Utilities > Automation Tools Similar programs | |||
94. | Windows Lister .NET 1.2 (www27.brinkster.com) | ||
more user-friendly! Not only with Windows Lister give you important information on windows, it will also allow you manipulate each and everyone of them. You'll be able to move, resize, close, destroy, align, show, hide, disable, enable, etc... This program should be called Windows | |||
Updated: 9, 2005 | Rating: 16 | Author: Nghia Nguyen | Size: 178 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
95. | wodFTPServer 2.1.9.0 (weonlydo.com) | ||
that implements server side of following protocols: FTP, FTP/S (FTPS or FTP+SSL) both in explicit and implicit modes, and SFTP (secure ftp subsystem on SSH2 secured channel). Support for all 3 protocol is transparent for your programming - you have same set of events, same set of properties and methods, same control over connected users - and just one property to change to | |||
Updated: 2, 2006 | Rating: 16 | Author: Kresimir Petric | Size: 2235 kb | Shareware Go to category: Development > Active X Similar programs | |||
96. | CHAOS Universal 6.2 (safechaos.com) | ||
Universal hides secret information in sound, image, and text files (BMP, WAV, TXT, HTML). This sensitive data is being encrypted beforehand. That way files can be sent over the Internet without being discovered by a third party. CHAOS Universal is the utility program for safe distribution of the | |||
Updated: 9, 2005 | Rating: 0 | Size: 1023 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
97. | EasySec Firewall SDK 1.10b (itinysoft.com) | ||
Application auditing avoids back door program leaking sensitive information, and generates application filter rule intelligently. Particular filter rules of net neighborhood can manage and control the shared resource, prevent information leaking from local network; Lots kinds of filter rules can achieve your requirement for managing network information.. Using | |||
Updated: 3, 2005 | Rating: 0 | Author: Hanse wu | Size: 1055 kb | Shareware Similar programs | |||
98. | Atomic Cannon 1.26 (isotope244.com) | ||
weapons create landmasses you can use to your tactical advantage to hide behind as cover. Your arsenal is outfitted with numerous types of weapons including guns, bombs, missiles, rockets, and nukes. The landscape you battle on is randomly generated each round. There are six types of land | |||
Updated: 9, 2005 | Rating: 178 | Author: Isotope244 Graphics | Size: 2579 kb | Shareware Go to category: Games & Entertainment > Action Similar programs | |||
99. | 4D Keeper 1.1 (4DKeeper.com) | ||
This feature helps to arrange the program according to the user's desktop settings. The installation package contains several color schemes for the interface. You will be able to create your own color schemes as well. The main features of the program include PC clock synchronization with the exact-time servers (including NIST time servers), automatic switch from one time server to | |||
Updated: 9, 2005 | Rating: 0 | Author: 4D Keeper Group | Size: 1103 kb | Shareware Go to category: Network & Internet > Other Similar programs | |||
100. | eSearch for eBay 2.0 (mazepath.com) | ||
rare and bargain eBay auction items! Enter search information ONCE and then monitor eBay as often as you like! Search for hundreds of rare items or bargains in seconds and never miss that once in a lifetime deal again! Download it now and see for yourself! EASY to use, and FREE to try! Finds rare and bargain eBay auction items! Enter search information ONCE and | |||
Updated: 9, 2005 | Rating: 0 | Author: William Smith | Size: 149 kb | Shareware Go to category: Network & Internet > Search/Lookup Tools Similar programs | |||
|
Home > Information hiding software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|