|
||||||
|
||
|
Home > Invisible software |
Related keywords: invisible keylogger, invisible surf, invisible key logger, invisible keylogger 97, make folders invisible, invisible secret, invisible and undetectable |
|
|
101. | Control Runner 3.10 (momsoftco.com) | ||
application? With Control Runner any application is. Do you need invisible applications running in the background? Control Runner will hide them for you. Do you want to prevent launching a second instance of an already running, huge application? Control Runner will take care of it. Want to hide all your sensitive data from prying eyes? Just click on the panic button before leaving | |||
Updated: 9, 2005 | Rating: 0 | Author: Manuel Onate | Size: 2106 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
102. | DCPP 2.7 (securstar.com) | ||
Special care has been taken to render all cryptographic parts as invisible & transparent as possible. DriveCrypt Plus Pack provides true real-time "on the fly" 256-bit disk encryption. Providing advanced FDE (Full disk encryption) as opposed to VDE (Virtual disk encryption) or "container" encryption, DCPP is an important evolutionary step in the field of transparent data | |||
Updated: 9, 2005 | Rating: 0 | Author: Wilfried Hafner | Size: 5411 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
103. | Personal Desktop Spy 2.10 (spyarsenal.com) | ||
Spy Agent is an invisible and easy-to-use PC activity monitoring tool that captures screenshots of the active application window or the entire desktop at the predefined time intervals varying from 1 second to several hours and saves the recorded images to a specified directory on the hard drive. The images can later be viewed with the built-in image viewer or any external software | |||
Updated: 9, 2005 | Rating: 0 | Author: Mikhail Kalinskiy | Size: 615 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
104. | DriveCryptPlusPack 1.0c (securstar.de) | ||
Special care has been taken to render all cryptographic parts as invisible and transparent as possible.The user is authenticated by means of pre-boot authentication (PBA) before the system is started and therefore before the operating system is booted. This kind of authentication cannot be manipulated, PBA therefore guarantees maximum security.Neither keys nor passwords are stored on | |||
Updated: 9, 2005 | Rating: 0 | Author: Wilfried Hafner | Size: 2779 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
105. | All-In-One Spy 2.0 (allinonespy.com) | ||
addresses. The program runs in the stealth mode and is completely invisible on the computer. The log files with the program work results can be securely transferred to another computer over a local area network or send to a certain address via e-mail. You can configure the program to start automatically every time the computer starts. All-In-One SPY is the program that allows | |||
Updated: 9, 2005 | Rating: 42 | Author: Nikita Melkin | Size: 2824 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
106. | AlphaXP 1.1.2 (zeroherosoftware.com) | ||
it to any transparency level possible - from fully opaque to totally invisible - all with the ease of a keyboard shortcut, click of a menu, or click of a button! AlphaXP also has a unique feature called Advanced Transparency, which is a set of special techniques that builds upon the standard Windows | |||
Updated: 9, 2005 | Rating: 42 | Author: John Katenay | Size: 1323 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
107. | 2nd Millennium Invisible Calculator 3.1 (zslab.com) | ||
Millennium Invisible Calculator allows you to make calculations in any place where it is possible to enter expressions (e.g. text editor, lines of input, etc.). After starting the calculator, it is automatically placed in your system tray. All you have to do to count an expression in any text editor is to type it, select it, and press the hotkey (by default it is Ctrl + F11). The | |||
Updated: 9, 2005 | Rating: 0 | Author: Sergey Zubov | Size: 318 kb | Shareware Go to category: Business > Calculators & Converters Similar programs | |||
108. | Advanced Keylogger 1.7 (eltima.com) | ||
Keylogger is an invisible surveillance tool that records every keystroke to encrypted user-friendly easy-to-understand logs. Logs can also be automatically sent to any number of specified e-mails. Advanced Keylogger also monitors the internet activity by logging all web-pages the user visits. Advanced Keylogger keeps track of everything happening on the screen invisibly | |||
Updated: 9, 2005 | Rating: 242 | Author: SoftInfinity | Size: 1146 kb | Shareware Go to category: Security & Privacy > Password Managers Similar programs | |||
109. | Akala EXE Lock 3.20 (zero2000software.com) | ||
access to portions of your computer, programs that make your files invisible. You get the general idea. A novel approach to the problem lies in Akala EXE Lock. Akala EXE Lock password protects any program currently residing on your hard drive. An attempt to run a program that's locked down will | |||
Updated: 9, 2005 | Rating: 158 | Author: Zero Lee | Size: 1152 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
110. | God Our Creator Screen Saver 3.0 (christianscreensavers.com) | ||
one of the attributes of our Creator: He is eternal, glorious, invisible, mighty, powerful, praiseworthy, satisfying, self-revealing, empowering, strong, well-pleased, and worthy! Each attribute is supported by a verse of Scripture which demonstrates that attribute as being shown by God's creation. This screen saver combines beautiful photographs of nature scenes with Scriptural | |||
Updated: 9, 2005 | Rating: 0 | Author: Frank Johnson | Size: 5891 kb | Demo Go to category: Desktop > Similar programs | |||
|
Home > Invisible software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|