|
||||||
|
||
|
Home > Hiding software |
Related keywords: information hiding, hiding a file |
|
|
181. | IMSpeak! 3.8 (eastbaytech.com) | ||
IM Speak! is a tool that adds speech and personality to incoming messages from your favorite Instant Message program. By using the program, you can assign 'voices' to each one of your buddies allowing them to speak to you in any voice you choose along with many other features. Main features: Compatible | |||
Updated: 9, 2005 | Rating: 0 | Author: East Bay Technologies Inc. East Bay Technologies Inc. | Size: 5110 kb | Shareware Go to category: Communications > Chat & Instant Messaging Similar programs | |||
182. | iNet Shaper 2.191 (winfiles32.com) | ||
as well as it enhances the level of security within the LAN by hiding its internal structure. Internet connection sharing software. Based on software router with NAT, traffic shaping,VPN,user access accounting and restriction, detailed traffic statistics per user, remote administration, activity monitor, activity logs, authentication | |||
Updated: 3, 2005 | Rating: 90 | Author: UIP RU | Size: 4100 kb | Freeware Go to category: Network & Internet > Other Similar programs | |||
183. | Internet Secure Tunneling 2.0.0.228 (han-soft.biz) | ||
local forwarding and dynamic forwarding are supported. - Hides in the system tray and does not require any desktop space. - System tray pop up menu for easy access to main functions. - Online support, online upgrade are supported. - Windows XP compatible user interface. Internet Secure Tunneling can forward otherwise insecure TCP traffic through encrypted SSH Secure | |||
Updated: 2, 2006 | Rating: 0 | Author: JING YU HAN | Size: 927 kb | Shareware Go to category: Network & Internet > Other Similar programs | |||
184. | Internet Timer 3 3.0.348 (internet-timer.co.uk) | ||
and hidden states. Strong security features such as task list hiding, process protection, directory protection, DOS program hiding, application restrictions (based on path or titlebar, supporting wildcards) guarantee the integrity of iT3 tracked data. Network features include real-time TCP/IP transmission of log data between iT3 clients/servers, automatic log data emailing | |||
Updated: 9, 2005 | Rating: 39 | Author: Peter Chamberlin | Size: 4332 kb | Shareware Go to category: Network & Internet > Other Similar programs | |||
185. | IPalt 2.0 LITE/PRO 2.0.0.5 (ffh-lab.com) | ||
vice-versa. In intranet, member area or extranet, it makes sense to hide the client's IP in different log files at server side, client side or on the route (ISP, Gateway, etc), whatever be the protocol in use (HTTP, FTP, NNTP, Telnet, etc.). For this, use of a dotless IP makes things less directly readable than using a dotted one or an explicit domain name. E.G. : fictive FFh | |||
Updated: 6, 2005 | Rating: 0 | Author: Eric LEQUIEN | Size: 193 kb | Commercial Go to category: Network & Internet > Other Similar programs | |||
186. | JCOM Clock Synchronizer 1.7 (jcom-research.com) | ||
with any type of Internet connection, from dial-up to broadband. It hides in the system tray and works in the background consuming very little system resources and even less desktop space. When you need, you can easily access the Clock Synchronizer's main functions by right-clicking its system tray | |||
Updated: 9, 2005 | Rating: 79 | Author: Andrew Saphronov | Size: 448 kb | Shareware Go to category: Network & Internet > Other Similar programs | |||
187. | KidSplorer 3.6.0 (devicode.com) | ||
the accesss of any other programs. Toddler-proof your computer by hiding the Start button, Taskbar and Desktop icons, Disabling Ctrl+Alt+Del, Ctrl+Esc, Alt+Tab, Alt+Esc, Windows logo keys, prevent the access to any other programs including internet Explorer. Not sure where to find safe sites?, then search our KidSafe web site list. Adding new site information cannot be any easier | |||
Updated: 3, 2005 | Rating: 0 | Author: Devicode Technology | Size: 2200 kb | Shareware Go to category: Network & Internet > Browsers Similar programs | |||
188. | MailSend 7.30 (radiks.net) | ||
including return-receipt processing, stdin filtering, console window hiding, custom SMTP headers, non-standard SMTP port usage, HTML files, and pager support. Options can be specified in external files to save command-line space. MailSend is a Win32 command-line SMTP e-mail sender supporting attachments and carbon-copy lists. Many other options are | |||
Updated: 9, 2005 | Rating: 0 | Author: Jim Lawless | Size: 142 kb | Shareware Go to category: Communications > E-Mail Clients Similar programs | |||
189. | Master Mailer 1.63 (m1o0o0101o011lo0ll11o000ooll1l1o0ol1ll11.com) | ||
lose your account. Even if you buy a bulk email software it will not hide your identity or your internet service provider name or IP address. People will find out your Internet Service Provider name or IP address and complaint and you will lose your Internet connection. Our software BulletProofWebHostingSender will provides you with 100% safe and secure way to send your email | |||
Updated: 3, 2005 | Rating: 2900 | Author: mike wood | Size: 890 kb | Freeware Go to category: Communications > E-Mail Clients Similar programs | |||
190. | Max Net Shield 4.2 (maxnetshield.com) | ||
Flash Player, Eudora, and many more. Stealth Function allows you to hide the MNS program on the hard drive. Stealth function is password protected. Advanced Popup Blocker. Live updates to keep detection, Removal, cleaning, and blocking functions current. Detect and remove spyware and adware, encrypt | |||
Updated: 9, 2005 | Rating: 0 | Author: Maxion Software | Size: 6480 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
|
Home > Hiding software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|