|
||||||
|
||
|
Home > Secret key encryption software |
Related keywords: encryption, secret, file encryption, Encryption, encryption software, encryption system, email encryption, data encryption, hard disk encryption, ENCRYPTION |
|
|
11. | Advanced Keylogger 1.7 (eltima.com) | ||
Advanced Keylogger is an invisible surveillance tool that records every keystroke to encrypted user-friendly easy-to-understand logs. Logs can also be automatically sent to any number of specified e-mails. Advanced Keylogger also monitors the internet activity by logging all web-pages the user visits | |||
Updated: 9, 2005 | Rating: 242 | Author: SoftInfinity | Size: 1146 kb | Shareware Go to category: Security & Privacy > Password Managers Similar programs | |||
12. | Chat Little Black Address Book 1.1 (hirtlesoftware.com) | ||
"tap-dancing" required when you cannot remember a chat partner's details. So, with this in mind this software was created. No more jotting down peronal chat partner information on loose pieces of paper or yellow stickies. Have your database open and ready whenever you go online. Add new chat | |||
Updated: 9, 2005 | Rating: 0 | Author: Tim Hirtle | Size: 5147 kb | Shareware Go to category: Communications > Chat & Instant Messaging Similar programs | |||
13. | Ghost Keylogger 3.80 (keylogger.net) | ||
every keystroke to an encrypted log file. The log file can be sent secretly with email to a specified receiver. Ghost Keylogger also monitors the Internet activity by logging the addresses of visited homepages. It monitors time and title of the active application; even text in editboxes and message boxes is captured. The key logger runs completly invisbly on all operating | |||
Updated: 8, 2004 | Rating: 298 | Author: Jon Kagstrom | Size: 600 kb | Demo Go to category: System Utilities > Other Similar programs | |||
14. | Hermetic Stego 5.17 (hermetic.ch) | ||
BMP image files, with or without the use of a user-specified stego/encryption key, so that (i) the presence of the hidden file is undetectable (even by forensic software using statistical methods) and (ii) if a user-specified stego key is used then the hidden file can be extracted only by someone, using this software, who knows that stego key. Hermetic Stego | |||
Updated: 9, 2005 | Rating: 42 | Author: Hermetic Systems | Size: 1896 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
15. | Invisible Secrets Encryption Software 4.4 (neobytesolutions.com) | ||
Secrets Encryption Software 4 not only encrypts your data and files for safe keeping or for secure transfer across the net, it also hides them in places that on the surface appear totally innocent, such as picture or sound files, or web pages. These types of files are a perfect disguise for sensitive information. Nobody, not even your wife, boss, or a hacker would realize | |||
Updated: 2, 2006 | Rating: 0 | Author: NeoByte Solutions | Size: 2740 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
16. | P.C. Police 2004 (pc-police.nethint.com) | ||
spouses, malicious users and negligent employees on the spot. It secretly logs almost all PC activities including text copying on the computer. It is password-protected, its main log files are encrypted and it has stop/resume functionality. You can set and change your password, view different date logs, print the logs, set up a warning screen for legal purposes and more. P.C. Police | |||
Updated: 3, 2005 | Rating: 0 | Author: Roumen Petrov | Size: 2520 kb | Shareware Go to category: Audio & Multimedia > Other Similar programs | |||
17. | Password Fortress 1.01 (passwordfortress.com) | ||
have to worry about forgetting passwords or losing registration keys again. Password Fortress manages all your private information in a single application. Your sensitive information is protected with strong 256-bit Rijndael encryption and can only be accessed using your secret password. Password Fortress can be configured to store any type of information you like | |||
Updated: 9, 2005 | Rating: 0 | Author: Donovan Dunning | Size: 3799 kb | Shareware Go to category: Security & Privacy > Password Managers Similar programs | |||
18. | Password Officer DeLuxe 5.0 (compelson.com) | ||
accessing. Security coupled with convenience: the strongest possible encryption, secure database of your most valued secrets, automatic logon to applications, servers, information systems, terminals and web pages, quick search, smart-card support. Now you can be more productive and secure | |||
Updated: 9, 2005 | Rating: 0 | Author: COMPELSON Laboratories | Size: 934 kb | Commercial Go to category: System Utilities > Other Similar programs | |||
19. | PC Activity Monitor Net 6.3 (spy-soft.biz) | ||
you can launch or delete PC Activity Monitor Net™. This lets you secretly monitor anything viewed on your computer while you are away. This process goes on undetected and logs a considerable amount of data. Simply install the agent to the PCs and within seconds, you'll be monitoring your networked computers. Log file can be optionally sent via e-mail to a specified address (or saved | |||
Updated: 8, 2004 | Rating: 0 | Author: Raytown Corp. | Size: 981 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
20. | SpyMyPC 2.0 (benutec.com) | ||
Mode", so that it makes itself invisible to anyone. Shortcut keys helps you fast access to Log View and Unhide Mode. Typical uses for SpyMyPC : Monitor Your Children's Activity ( Statistics : With an estimated 24 million children now online, one out of five have been solicited for sex in the last year. - Congressional Study submitted June 8, 2000 ) ; Keep Your Loved | |||
Updated: 9, 2005 | Rating: 0 | Author: Benutec Software | Size: 580 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
|
Home > Secret key encryption software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|