|
||||||
|
||
|
Home > Hacker software |
Related keywords: anti hacker, hacker protection, hacker safe, hacker 2004, speed hacker, hacker tool |
|
|
151. | Lock Folder XP 3.4 (everstrike.com) | ||
of reported security breaches come from within the organization, not hackers! Locking files, folders and drives is the best way to guarantee that nobody accidentally or intentionally gets access to your financial, health, private or confidential information. And since locking your files, folders or | |||
Updated: 9, 2005 | Rating: 126 | Author: Richard Davids | Size: 1243 kb | Shareware Go to category: Security & Privacy > Access Control Similar programs | |||
152. | MMHotkeys 1.1 (librarysmith.co.uk) | ||
MM hotkey provides instant control of the windows play control (mixer) and display settings through user defined hotkeys. Ideal for musicians, multimedia technicians or home users who need instant control of sound settings. (Instant mute when the phone rings!) User definable hotkeys enable you to select | |||
Updated: 9, 2005 | Rating: 16 | Author: Matthew Smith | Size: 775 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
153. | Mutilate File Wiper 2.92 (mutilatefilewiper.com) | ||
is NOT secure. Deleting files merely removes the file system's pointer to the file, ALL THE DATA REMAINS ON YOUR HARD DRIVE. The remaining data can be easily recovered with data recovery or forensic software. Your sensitive files may also be vulnerable to advanced recovery techniques, EVEN WHEN OVERWRITTEN, by analyzing latent magnetic traces. Mutilate File Wiper is a file | |||
Updated: 9, 2005 | Rating: 82 | Author: Craig Christensen | Size: 823 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
154. | My Firewall Plus 5.0 (webroot.com) | ||
your personal data is at risk now more than ever. It used to be that hacking attacks came from the outside world (the Internet) and simple, low-cost firewalls could protect your data. Today hackers and web snoops are using more sophisticated viruses, cookies, Trojan Horses and other malicious software tools to gain access to your PC. Once they gain access, they put unsafe | |||
Updated: 9, 2005 | Rating: 0 | Author: Steve Thomas | Size: 6006 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
155. | NetWorx 3.2 (softperfect.com) | ||
down suspicious network activity characteristic of Trojan horses and hacker attacks. The program allows you to monitor all your network connections or a specific network connection (such as Ethernet or PPP) only. The software also features a system of highly customizable visual and sound alerts. You | |||
Updated: 9, 2005 | Rating: 16 | Author: Andrey Kotov | Size: 982 kb | Shareware Go to category: Network & Internet > Network Monitoring Similar programs | |||
156. | NookNak 2004 V1.0.0 (nakware.com) | ||
Do more with your mouse - easily. You can use it to quickly mute music when you want to talk to someone or hide confidential information quickly and easily. You can also use NookNak to disable and re-enable screen saving easily and start your favorite program with the same ease. With NookNak you can now have Have music while you work | |||
Updated: 9, 2005 | Rating: 0 | Author: Andy Erceg | Size: 567 kb | Shareware Go to category: System Utilities > Shell Tools Similar programs | |||
157. | Geek Superhero 1.3 (geeksuperhero.com) | ||
It includes other features to help you protect your computer from hackers and worms by disabling rarely used Windows services, it helps you protect your privacy by blocking popup advertising windows, blocking "Phishing" scams, and removing "Web Bugs" used to track you. Geek Superhero has more tools to fix you computer if Internet Explorer has been hijacked, to easily look at all | |||
Updated: 9, 2005 | Rating: 16 | Author: Michael Burford | Size: 2548 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
158. | Hotkey Assistant 1.5 (spellway.com) | ||
Hotkey Assistant is a powerful and easy-to-use hotkey manager with wide range of capabilities. It provides you with additional means to control applications, windows, and other system components. For example, you can assign keyboard shortcuts forquick access to any application, file or folder, sound | |||
Updated: 9, 2005 | Rating: 0 | Author: Spellway Ltd | Size: 765 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
159. | IntraMail 2003.01.20 (dplanet.ch) | ||
codes). These short mails are extremely well protected against local hackers and Internet attacks like Trojans or Tunneling-helpers or other applications. Passwords stay encrypted in memory and swap files. Wireless networks and mixed networks can be used very securely. A CHAT-room with use of | |||
Updated: 9, 2005 | Rating: 42 | Author: Jean-Maurice Tellenbach | Size: 2918 kb | Shareware Go to category: Communications > E-Mail Clients Similar programs | |||
160. | Jetico Personal Firewall 1.0.1.61 (jetico.com) | ||
Personal Firewall protects your computer from unwanted hacker's attacks from outside as well as from malicious programs "living" secretly inside your computer's memory and hard drive. Three levels of protection are included: low-level network packets filtering, application-level network events filtering and filtering of user-level process activity. Jetico Personal | |||
Updated: 9, 2005 | Rating: 42 | Author: Jetico Inc. | Size: 2744 kb | Freeware Go to category: System Utilities > Other Similar programs | |||
|
Home > Hacker software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|