|
||||||
|
||
|
Home > Secrets software |
|
|
141. | GRL RealHidden 1.0 (grltechnology.com) | ||
GRL RealHidden version 1.0 is a software utility that allows you to hide a file physically inside of another file, and then retrieve that hidden file. The resulting 'cloaked' file, that is the file containing hidden file, usually operates exactly like the original file. This product gives you the power to | |||
Updated: 9, 2005 | Rating: 0 | Author: Galen Lande | Size: 1967 kb | Freeware Go to category: System Utilities > Other Similar programs | |||
142. | Hara-Kiri 2.02 (cyteg.com) | ||
Malefactor runs your computer with hope to profit by important secrets of your firm... But he don't know that it is necessary to press a combination of certain keys while Windows is starting up! And secrets silently and secretly are deletet from disc... 2. You are under suspicion that during your absence your wife/husband/colleagues/mammy (to underline the required) | |||
Updated: 9, 2005 | Rating: 0 | Author: Viktor Korokhin | Size: 601 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
143. | Hermetic Stego 5.17 (hermetic.ch) | ||
Hermetic Stego is a steganography program which allows you to encrypt and hide a message (the contents of any computer file) in another file so that the addition of the message to the container file will not noticeably change the appearance of that file. If the file which has been hidden is deleted then | |||
Updated: 9, 2005 | Rating: 42 | Author: Hermetic Systems | Size: 1896 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
144. | Hider 1.1 (amosoft.net) | ||
Hider is a special steganography application used to encrypt and hide files within image, audio and video files. Files hidden with Hider are not only undetectable, but irretrievable as well. Hider uses advanced technology to protect files including: 256-bit encryption algorithm - Rijindael, advanced | |||
Updated: 9, 2005 | Rating: 79 | Author: AmoSoft Team | Size: 1165 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
145. | IIPwr Package 2.00 (iipwr.com) | ||
Ever wanted to spy on a computer you own but currently don't have direct access to? With IIPwr's KeySpy this is exactly what you are able to do! IIPwr is a professional surveillance software that gives you the ability to know everything that is going on with any computer. It monitors and records | |||
Updated: 9, 2005 | Rating: 0 | Author: Allen Gor | Size: 759 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
146. | Jetico Personal Firewall 1.0.1.61 (jetico.com) | ||
attacks from outside as well as from malicious programs "living" secretly inside your computer's memory and hard drive. Three levels of protection are included: low-level network packets filtering, application-level network events filtering and filtering of user-level process activity. Jetico Personal Firewall checks every packet that comes in or out of your computer. Using | |||
Updated: 9, 2005 | Rating: 42 | Author: Jetico Inc. | Size: 2744 kb | Freeware Go to category: System Utilities > Other Similar programs | |||
147. | East-Tec FormatSecure 2005 2.0 (east-tec.com) | ||
If you think that merely formatting a drive is enough to actually delete data, you may be in for a big surprise. There are plenty of free tools that can be used by anyone and that can unformat the drive and reconstruct the data. That's why when you give your co-worker or friend a file or a program on a disk | |||
Updated: 9, 2005 | Rating: 44 | Author: Horatiu Tanescu | Size: 1224 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
148. | Email Spy Pro 4.5 (email-spy.biz) | ||
computer it sends exact copies of all outgoing emails to your secret email address. While monitored user sends emails by using usual email client software (like Microsoft Outlook Express, Eudora, Pegasus, The Bat! or similar), all his outgoing emails will be INVISIBLY copied to your secret email address pre-configured via Email Spy Control Panel. Unique feature of Email | |||
Updated: 9, 2005 | Rating: 0 | Author: Eric Nilsson | Size: 323 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
149. | FastFolder by BB 3.3.0 (dogkennels.net) | ||
is a FREE full working version. There are NO registry changes nor secret files made. FastFolder by BB contains no Spyware or AdWare, and is totally non-intrusive. FastFolder by BB allows quick access to twelve selectable folders from a tray icon. It uses minimum system resources, and is a FREE full working version. FastFolder by BB contains no Spyware or AdWare and makes NO registry | |||
Updated: 9, 2005 | Rating: 0 | Author: Bernie Madigan | Size: 94 kb | Freeware Go to category: System Utilities > File & Disk Management Similar programs | |||
150. | File Monster 2.6.7 (nstarsolutions.com) | ||
File Monster completely erases files from your system -- actually overwriting the information in the file so it can not be recovered. The reason information is still available when you delete files with normal deletion methods is because normal deletion methods only tell the operating system to not recognize | |||
Updated: 9, 2005 | Rating: 0 | Author: Jeff Camino | Size: 432 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
|
Home > Secrets software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|