|
||||||
|
||
|
Home > Information hiding software |
|
|
11. | DriveCrypt 3.03a (drivecrypt.com) | ||
lists, product specifications, confidential corporate memos, stock information, and much more with this product. As data is read from the hard disk, DRIVECRYPT automatically decrypts the data before it is loaded into memory. When data is written back to the hard disk, it is automatically re-encrypted. The encryption/ decryption process is completely transparent to the user or any | |||
Updated: 9, 2005 | Rating: 0 | Author: Wilfried Hafner | Size: 3222 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
12. | Modem Spy 1.8 (softcab.com) | ||
gain control. 7) Detects and logs Caller ID. 8) Pops up caller ID information. 9) Super Spy mode will hide Modem Spy behaviour. Nobody will know that you are recording phone calls. Modem spy is handy utility for phone calls recording. Features: 1) records phone conversations. 2) records from microphone. 3) plays back recorded mesages via phone line. 4) Plays back recorded | |||
Updated: 2, 2006 | Rating: 90 | Author: Sergei Polishchuk | Size: 78 kb | Shareware Go to category: Audio & Multimedia > Rippers & Converters Similar programs | |||
13. | PDF Editor 2.4 (cadkas.de) | ||
too. Change the order of the pages or delete pages. Also you can hide the information on a page so that it is invisible in the Acrobat Reader but can be unhidden later. You can change the page size or move the content. Add stamps like "Confidential" or "Top secret". The source code of the page (a language like HTML) is editable for you. Use the program to read and write | |||
Updated: 2, 2006 | Rating: 42 | Author: Christian A.D. Kassler | Size: 1875 kb | Demo Go to category: Business > Other Similar programs | |||
14. | StarPlanner 1.5 (willebois.nl) | ||
did undergo? With the History feature you can easily retrieve all information about one of your clients regarding his/her treatments. StarPlanner is a planning tool for virtually all organisations where people undergo treatments. For example: beauty salons, hairdressers, dentists, nail studios, small clinics, etc. You can use this tool for planning appointments with | |||
Updated: 9, 2005 | Rating: 0 | Author: Maurijn van der Does | Size: 1726 kb | Shareware Go to category: Business > PIMS & Calendars Similar programs | |||
15. | TurboNote 3.4 (turbonote.com) | ||
alarms, print them, lock them and keep your screen uncluttered by hiding them. Notes even stay around when you turn your computer off. TurboNote's Quick Launch feature also lets you open Web addresses, programs and files which appear in notes, simply by double-clicking. Network support suits organisation-wide deployment and TurboNote can be run by other programs or batch files | |||
Updated: 9, 2005 | Rating: 1234 | Author: Peter Hyde | Size: 542 kb | Freeware Go to category: Business > Other Similar programs | |||
16. | TurboNote+ desktop sticky notes v6.0 (turbonote.com) | ||
and sizes, set alarms, lock them and keep your screen uncluttered by hiding them. Use handy templates for common messages or make up your own style with optional rich text editing, transparency control and images. TurboNotes stay around when you turn your computer off, and are automatically backed up | |||
Updated: 2, 2006 | Rating: 173 | Author: Vicki Hyde | Size: 1616 kb | Shareware Go to category: Business > Other Similar programs | |||
17. | Web Cache Illuminator 4.8.2 (nstarsolutions.com) | ||
but, more importantly, displays the title given by the web page's creator. It conveniently searches the computer system for usual web cache folders so you don't have to, and you can use its handy View/Delete Wizard to delete an entire cache folder, or only selected files. The presentation is shown in a browser so that you can view the file list with a browser and actually see | |||
Updated: 2, 2006 | Rating: 0 | Author: Jeff Camino | Size: 491 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
18. | EasySec Firewall SDK 1.10b (effectmatrix.com) | ||
Application auditing avoids back door program leaking sensitive information, and generates application filter rule intelligently. Particular filter rules of net neighborhood can manage and control the shared resource, prevent information leaking from local network; Lots kinds of filter rules can achieve your requirement for managing network information.. Using | |||
Updated: 9, 2005 | Rating: 48 | Author: Hanse wu | Size: 1055 kb | Shareware Go to category: Development > Other Similar programs | |||
19. | WallMaster Pro 4.0a (tropicalwares.com) | ||
or filters to the wallpaper instantly as well as the ability to hide the desktop icons or make them transparent, allowing the wallpaper to show through. And with advanced image resampling, WallMaster Pro is able to produce a high quality and vivid wallpaper on your desktop screen. So if you are tired of staring at the same boring wallpaper on your PC every day, then WallMaster Pro | |||
Updated: 9, 2005 | Rating: 0 | Author: Edy Budiman | Size: 1990 kb | Shareware Go to category: Desktop > Themes & Wallpaper Similar programs | |||
20. | CyberSky 3.3.1 (cybersky.com) | ||
of labels, coordinate system grids, and reference lines. CyberSky's user-friendly interface allows you to easily change your view of the sky, search for celestial objects, and display data about those objects. CyberSky also prints attractive sky charts that you can take outside with you. CyberSky was designed to be simple enough to appeal to people who are just beginning to discover | |||
Updated: 9, 2005 | Rating: 205 | Author: Stephen Michael Schimpf | Size: 995 kb | Shareware Go to category: Games & Entertainment > Kids Similar programs | |||
|
Home > Information hiding software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|