|
||||||
|
||
|
Home > Completely invisible software |
|
|
11. | PC Activity Monitor Lite 7.3 (spy-soft.biz) | ||
strong side of PC Acme Lite is its protection measures. It is completely hidden, and even the experienced user cannot locate, stop or destroy the program. PC Acme Lite ensures registration of the following events: typing; clipboard operation; application start and termination (from the moment of OS loading); mouse manipulation; opening and close of windows | |||
Updated: 9, 2005 | Rating: 139 | Author: Dmitry Bulat | Size: 2888 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
12. | Private Desktop 1.91 (tropsoft.com) | ||
all your private applications. Access to this desktop can be completely customized: its toolbar icon can be made either very small or invisible, hotkeys can be specified to remove you from the second desktop in a split second, and special key. List of files and programs to lock. Say you're at your computer doing something private and someone comes in... Private Desktop | |||
Updated: 9, 2005 | Rating: 0 | Author: Silvio Kuczynski | Size: 237 kb | Demo Go to category: System Utilities > Other Similar programs | |||
13. | ProBot SE 2.3.0 (nethunter.cc) | ||
ProBot predcessor. SE (Special or Stealth Edition) is a totally invisible program and is packed with all of ProBot features as well. ProBot SE remains undetected even under the most prying eye. Unlike similar tools, ProBot SE makes it very easy to browse through activity logs. Its Control Panel organizes the data into concise reports for each target system. You can easily browse | |||
Updated: 9, 2005 | Rating: 48 | Author: Andrei Birjukov | Size: 2236 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
14. | Magic Folders XP 04.04.2 (pc-magic.com) | ||
Folders makes any folder you choose and all the files in that folder completely invisible to others, even on the network! Your invisible folders and files can't be deleted, viewed, modified, or run. For all practical purposes they don't exist. Use Magic Folders to protect your finances | |||
Updated: 9, 2005 | Rating: 243 | Author: Scott Chaney | Size: 649 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
15. | Folder Guard Professional 7.5 (winability.com) | ||
Guard to stop other users from opening your personal files, or even completely hide your documents until a valid password is entered. You can protect sensitive system files from modification or destruction, disable access to the floppy, CD-ROM, and other removable drives, restrict access to Control | |||
Updated: 9, 2005 | Rating: 0 | Author: Andrei Belogortseff | Size: 1235 kb | Shareware Go to category: Security & Privacy > Access Control Similar programs | |||
16. | Folder Shield 2003 1.3 (baxbex.com) | ||
Shield can be used to hide any folders completely and securely. Your personal documents, private photographs etc. are invisible, and hence no longer accessible, as soon as the relevant folders have been hidden with Folder Shield. Just specify all confidential folders, activate Folder Shield's protection and all folders will be hidden and your sensitive data will be | |||
Updated: 9, 2005 | Rating: 0 | Author: Carsten Paasch | Size: 1269 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
17. | DCPP 2.7 (securstar.com) | ||
Special care has been taken to render all cryptographic parts as invisible & transparent as possible. DriveCrypt Plus Pack provides true real-time "on the fly" 256-bit disk encryption. Providing advanced FDE (Full disk encryption) as opposed to VDE (Virtual disk encryption) or "container" encryption, DCPP is an important evolutionary step in the field of transparent data | |||
Updated: 9, 2005 | Rating: 0 | Author: Wilfried Hafner | Size: 5411 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
18. | Personal Desktop Spy 2.10 (spyarsenal.com) | ||
Spy Agent is an invisible and easy-to-use PC activity monitoring tool that captures screenshots of the active application window or the entire desktop at the predefined time intervals varying from 1 second to several hours and saves the recorded images to a specified directory on the hard drive. The images can later be viewed with the built-in image viewer or any external software | |||
Updated: 9, 2005 | Rating: 0 | Author: Mikhail Kalinskiy | Size: 615 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
19. | DriveCryptPlusPack 1.0c (securstar.de) | ||
others) to protect sensitive information.DCPP is automatic and completely transparent to the user.Not only does this decrease user involvement and training requirements, but it creates the foundation for enforceable security. The careful integration of boot protection and automatic encryption provides a high degree of security with minimal impact on users. Boot protection prevents | |||
Updated: 9, 2005 | Rating: 0 | Author: Wilfried Hafner | Size: 2779 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
20. | All-In-One Spy 2.0 (allinonespy.com) | ||
and web site addresses. The program runs in the stealth mode and is completely invisible on the computer. The log files with the program work results can be securely transferred to another computer over a local area network or send to a certain address via e-mail. You can configure the program to start automatically every time the computer starts. All-In-One SPY is the program | |||
Updated: 9, 2005 | Rating: 42 | Author: Nikita Melkin | Size: 2824 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
|
Home > Completely invisible software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|