|
||||||
|
||
|
Home > Secretly software |
|
|
171. | Acceleration Startup Manager + Release RAM Bundle for Win2k/XP 2 (acceleratedsoftware.net) | ||
system, or why their computer technicians don't tell them of these secrets. The reason is they will find it hard to persuade you to upgrade your system to the next Windows version or to upgrade your hardware. Release RAM enables your computer to work more efficiently. No matter how much memory you | |||
Updated: 9, 2005 | Rating: 174 | Author: Shaughn Prestidge | Size: 1810 kb | Shareware Go to category: System Utilities > Launchers & Task Managers Similar programs | |||
172. | Acceleration Startup Manager + Release RAM Bundle for Win9x 2 (acceleratedsoftware.net) | ||
system, or why their computer technicians don't tell them of these secrets. The reason is they will find it hard to persuade you to upgrade your system to the next Windows version or to upgrade your hardware. Release RAM enables your computer to work more efficiently. No matter how much memory you | |||
Updated: 9, 2005 | Rating: 0 | Author: Shaughn Prestidge | Size: 1842 kb | Shareware Go to category: System Utilities > Launchers & Task Managers Similar programs | |||
173. | Ace ScreenSpy 5.0 (caltroxsoft.com) | ||
ScreenSpy 5.0 is a popular Advanced Security Software to secretly monitor your PC screen, capture and save any Screen or Windows activity that occurs at any time. The Software automatically captures and saves the entire monitor screen, together with any Windows, Applications, Browser windows & images, Web-pages & Web-images etc that are opened by any user as well any other activity | |||
Updated: 9, 2005 | Rating: 0 | Author: Caltrox Software | Size: 3550 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
174. | ActiveTextBox 2.3 (ActiveTextBox.com) | ||
days of using the program nobody agrees to switch back. The other secret of program's popularity is its flexible setup system. For example, as the list of text strings keeps growing, you can sort them out alphabetically or in the order of regular use. In addition, the users can create their own custom lists of the text strings that are most commonly used - such as names or logins | |||
Updated: 9, 2005 | Rating: 0 | Author: AbsoluteWay | Size: 806 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
175. | Advanced Email Monitoring 3.8 (email-monitoring.net) | ||
computer it sends exact copies of all outgoing emails to your secret email address. While monitored user sends emails by using usual email client software (like Microsoft Outlook Express, Eudora, Pegasus, The Bat! or similar), all his outgoing emails will be INVISIBLY copied to your secret email address pre-configured via Advanced Email Monitoring Control Panel. Unique | |||
Updated: 9, 2005 | Rating: 0 | Author: Otto Schulz | Size: 394 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
176. | CryptoCrat 2005 4.61 (secureaction.com) | ||
file can only be unscrambled and read by someone who knows the secret | |||
Updated: 2, 2006 | Rating: 0 | Author: SecureAction Research, LLC | Size: 847 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
177. | Advanced Encryption Package 2006 Professional 4.2.9 (secureaction.com) | ||
RSA algorithm and Public-Private Key cryptography. One key is kept secret and is referred to as the private key while the other is made available to others and is called the public key since anyone can access this key. These keys are large mathematically-related numbers derived from algorithms that form a unique pair. Either key may be used to encrypt a message, but only the other | |||
Updated: 2, 2006 | Rating: 141 | Author: SecureAction Research, LLC | Size: 2347 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
178. | Advanced Keylogger 1.7 (eltima.com) | ||
Advanced Keylogger is an invisible surveillance tool that records every keystroke to encrypted user-friendly easy-to-understand logs. Logs can also be automatically sent to any number of specified e-mails. Advanced Keylogger also monitors the internet activity by logging all web-pages the user visits | |||
Updated: 9, 2005 | Rating: 242 | Author: SoftInfinity | Size: 1146 kb | Shareware Go to category: Security & Privacy > Password Managers Similar programs | |||
179. | Advanced Windows Password Recovery 3.5 (elcomsoft.com) | ||
Other information that could be recovered by AWPR is LSA Secrets; the program also allows to run any programs in other user's context, show password histrory hashes, read password hashes from SAM and SYSTEM files, perform brute-force and dictionary attacks on Windows 9x PWL files, and decrypt product ID and CD key for Windows and Microsoft Office installations. Recover all | |||
Updated: 9, 2005 | Rating: 7398 | Author: Vladimir Katalov | Size: 1839 kb | Shareware Go to category: Security & Privacy > Password Managers Similar programs | |||
180. | AlmerShredder 1.05 (almersoft.com) | ||
remains on your hard drive and can be restored any moment. Thus secret and valued information is available to many people. Recognizing this need, we created AlmerShredder. This powerful program helps you to shred important files so that they cannot be restored and nobody can even guess what information a file contained. AlmerShredder has an easy-to-follow user interface and is of | |||
Updated: 9, 2005 | Rating: 90 | Author: Max Fadeev | Size: 406 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
|
Home > Secretly software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|