|
||||||
|
||
|
Home > Hidden files software |
Related keywords: files, hidden, hide files, Files, PDF files, compare files, protect files, duplicate files, delete files, recover files |
|
|
101. | Asterisk Password Recovery XP 1.89 (fadsoft.com) | ||
your email client, or FTP tool. Once the password is stored, it is hidden under a row of asterisks (*****) and can not be read by you again. Asterisk Password Recovery XP is designed to help you read any of your passwords that are covered by the asterisks by simply moving the mouse cursor over the password field. Asterisk Password Recovery XP works with all windows system include | |||
Updated: 8, 2004 | Rating: 4736 | Author: Dart Zheng | Size: 368 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
102. | Attribute Manager 2.31 (miklsoft.com) | ||
need to change attributes (date and time of their creation etc.) of files and folders? Quickly? As you know, with Windows it's tedious and slow. Not so with Attribute Manager! Attribute Manager allows you to change Read-Only, Hidden, System and Archive attributes. You can change the date and time of creation, last access, last modification of files and folders | |||
Updated: 9, 2005 | Rating: 39 | Author: Mihail Cherkashin | Size: 950 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
103. | BestCrypt 7.20.2 (jetico.com) | ||
Hot Key options. The wiping utility is included allowing you to wipe files, free space, swap file and file slacks that nobody can restore your files later. This version includes support for Windows XP, swap file encryption, and a "hidden" container feature. BestCrypt | |||
Updated: 9, 2005 | Rating: 55 | Author: Jetico Inc. | Size: 5004 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
104. | BlazingTools Perfect Keylogger Lite 1.15 (blazingtools.com) | ||
computer? Some applications of the keylogger: - Monitor children’s activity for parents - Monitor what programs opened and when - Recall what you wrote some time ago - Special purposes Features: - Invisible in Task Manager List - Logging texts typed in every application (including passwords and other hidden texts) - Log file is encrypted and can be protected with a | |||
Updated: 2, 2006 | Rating: 75 | Author: BlazingTools Software | Size: 172 kb | Freeware Go to category: Security & Privacy > Other Similar programs | |||
105. | BoostXP 2.00 (systweak.com) | ||
a start-up manager and more. The program gives you instant access to hidden Windows XP settings. For example, you can make the Windows taskbar transparent, tweak several types of desktop settings, customize the Start menu, and enable several hidden performance options that are otherwise difficult to find and change. It is a utility suite, that lets you tweak many Windows | |||
Updated: 9, 2005 | Rating: 0 | Author: Shrishail Rana | Size: 2980 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
106. | Boss Key 1.6 (boss-key.com) | ||
or typing password to login somewhere, or,maybe, working with CIA files. WARNING! Someone comes to you. What will you do? Close program? - are you sure you can do it really fast? And don't forget about "Do you want to save" dialogs! Switch off your monitor? - yeah, it's very ... very fast! And certainly your visitor will like that you trust him so much! Reboot your | |||
Updated: 9, 2005 | Rating: 16 | Author: VicMan Software | Size: 298 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
107. | Chameleon 2.0 (members.optushome.com.au) | ||
is a secure file encryption application that hides your files from anyone that monitors your emails, personal files even hard disk. More and more SPY software is being used; You need to be sure that files containing sensitive information are kept safe. There is no Electronic Privacy, especially on the Internet. Any want can now with little knowledge of | |||
Updated: 9, 2005 | Rating: 0 | Author: Chris Dimopoulos | Size: 1437 kb | Adware Go to category: System Utilities > Other Similar programs | |||
108. | Clean Disk Security 7.54 (diskcleaners.com) | ||
program gives you secure file deletion, making sure that deleted files cannot be undeleted again. Deleting a file normally just removes the file's directory entry, but the data itself remains on the disk. This program completely eliminates the contents of deleted files. The highly acclaimed Gutmann disk cleaning method is now available as an option | |||
Updated: 3, 2006 | Rating: 16 | Author: Kevin Solway | Size: 660 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
109. | Clone 2.1.0 (newtonsoftware.co.uk) | ||
allows you to backup your files. Clone can be run as either a screen saver or as a standard windows utility. Run as a screensave, clone backups up the data that is important to you while you take a break from your computer. This ensures you have a copy of your most important files backed up. Clone copies files from one location to another. This can be another | |||
Updated: 9, 2005 | Rating: 0 | Author: Tim Newton | Size: 3847 kb | Demo Go to category: System Utilities > Other Similar programs | |||
110. | Crime Catcher 2.1 (crime-catcher.com) | ||
appear in the system tray, taskbar, both, or neither - completely hidden from view! Email notifications with attachments Have emails of what the webcam has detected. FTP images to an FTP server Upload images to an FTP server for later retrieval. Webpage mode - image uploaded every x seconds Put your webcam online. Have an image uploaded every x seconds. Remote | |||
Updated: 9, 2005 | Rating: 124 | Author: Edward Torkington | Size: 4373 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
|
Home > Hidden files software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|