|
||||||
|
||
|
Home > Invisible software |
Related keywords: invisible keylogger, invisible surf, invisible key logger, invisible keylogger 97, make folders invisible, invisible secret, invisible and undetectable |
|
|
91. | Magic Folders XP 04.04.2 (pc-magic.com) | ||
any folder you choose and all the files in that folder completely invisible to others, even on the network! Your invisible folders and files can't be deleted, viewed, modified, or run. For all practical purposes they don't exist. Use Magic Folders to protect your finances, taxes, and personal | |||
Updated: 9, 2005 | Rating: 243 | Author: Scott Chaney | Size: 649 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
92. | Masker 7.0.6 (softpuls.com) | ||
Hide files and have them automatically encrypted! MASKER is able to hide your sensitive files within another file (carrier file), which is absolute discrete and looks like regular file without changing the exterior impression. MASKER encrypts files using strong encryption algorithms. (CAST 128-bit, MASKER is able to hide your sensitive files within other files (carrier files), which are absolute discrete and look like regular files without changing the exterior impression | |||
Updated: 3, 2006 | Rating: 16 | Author: Evgeny Zaretskiy | Size: 2399 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
93. | Alloy 4.3.21.2005c (pgware.com) | ||
milliseconds with files as large as 9 Mb. The extraction of files is invisible to the user and allows the programmer to distribute single executables to their end users. Alloy is a programming tool which allows the developer to embed all dependent files within the programmers main exe file. Users of Visual Basic and Visual DialogScript will find Alloy very useful as well as other | |||
Updated: 3, 2006 | Rating: 191 | Author: PGWARE LLC | Size: 1403 kb | Shareware Go to category: Development > Install & Setup Similar programs | |||
94. | Farsighter 2.00 (bysoft.se) | ||
Farsighter monitors a remote computer invisibly by streaming video to a viewer on your computer. You will know exactly what is happening on the remote computer as you see it in real-time. Some applications are: - Monitor your computer from a remote location. - Parents can monitor what their children are | |||
Updated: 9, 2005 | Rating: 42 | Author: Jon Kagstrom | Size: 2900 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
95. | Lock Folder XP 3.4 (everstrike.com) | ||
And since locking your files, folders or drives makes them invisible, they can not be deleted, damaged or harmed in any other ways. Even if a virus gets introduced to your system, your locked folders will not be detected, infected or harmed. Here is the important part - Lock Folder XP uses the encryption standards approved by the US Government. This and others innovative and | |||
Updated: 9, 2005 | Rating: 126 | Author: Richard Davids | Size: 1243 kb | Shareware Go to category: Security & Privacy > Access Control Similar programs | |||
96. | Desktop Surveillance Personal Edition 6.0.3 (omniquad.com) | ||
every other aspect of computer usage. The application runs as an invisible agent, which unobtrusively captures keystrokes and records screen contents for replay. The program also compiles activity reports that will include all user activities: web sites, chat rooms, newsgroups, games, files and | |||
Updated: 2, 2006 | Rating: 42 | Author: Daniel Sobstel | Size: 2675 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
97. | Paragon Drive Backup 6.0 Personal Version 6.0 (paragon.ru) | ||
upgrades and cloning. Supports access to recordable CD/DVD discs and invisible hard disk volumes, includes system areas to backup, restores only data you need at hand, bootable CD for | |||
Updated: 3, 2005 | Rating: 42 | Size: 6067 kb | Demo Go to category: System Utilities > Backup & Restore Similar programs | |||
98. | Password Officer DeLuxe 5.0 (compelson.com) | ||
-Trojan horse protection -dictionary attack protection -invisible keybord inputs -smart-card support Ultimate Web Engine The new Password Officer has a powerful engine with web-content scanner. It starts Internet Explorer, fills in the URL, waits until the page is loaded, fills in all fields, and finally clicks the proper button. -web-content scanner -automatic | |||
Updated: 9, 2005 | Rating: 0 | Author: COMPELSON Laboratories | Size: 934 kb | Commercial Go to category: System Utilities > Other Similar programs | |||
99. | PC Activity Monitor Lite 7.3 (spy-soft.biz) | ||
viewing in browser. PC Activity Monitor Lite is an ultimate invisible and undetectable easy-to-use monitoring and surveillance tool for personal PCs. The monitoring program works in the background, transparent for the user, on the level of OS kernel | |||
Updated: 9, 2005 | Rating: 139 | Author: Dmitry Bulat | Size: 2888 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
100. | PC Activity Monitor Lite (PC Acme Lite) 7.2 (keyloggers.com) | ||
in browser. PC Activity Monitor Lite (PC Acme Lite) is an ultimate invisible and undetectable easy-to-use monitoring and surveillance tool for personal PCs. It is professional software that captures all users activity on the | |||
Updated: 8, 2004 | Rating: 0 | Author: Raytown Corporation | Size: 2774 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
|
Home > Invisible software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|