|
||||||
|
||
|
Home > Hidden files software |
Related keywords: files, hidden, hide files, Files, PDF files, compare files, protect files, duplicate files, delete files, recover files |
|
|
231. | ActMon Computer and Internet Monitoring 5.04 (ActMon.com) | ||
during Windows 2000/XP login. And ActMon has a unique "kernel-level" file protection: Files are not just hidden! They are completely inaccessible to unauthorized users. Files cannot be removed or manipulated by an unauthorized user or so called spyware "cleaner" applications or any | |||
Updated: 8, 2004 | Rating: 215 | Author: Team ActMon | Size: 1602 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
232. | Asterisk Password Recovery XP 1.89 (fadsoft.com) | ||
your email client, or FTP tool. Once the password is stored, it is hidden under a row of asterisks (*****) and can not be read by you again. Asterisk Password Recovery XP is designed to help you read any of your passwords that are covered by the asterisks by simply moving the mouse cursor over the password field. Asterisk Password Recovery XP works with all windows system include | |||
Updated: 8, 2004 | Rating: 4736 | Author: Dart Zheng | Size: 368 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
233. | PC Activity Monitor Lite (PC Acme Lite) 7.2 (keyloggers.com) | ||
Activity Monitor Lite (PC Acme Lite) is designed for monitoring user's PC activity. PC Acme Lite works under Windows 2000/XP operating systems. All data collected by the monitoring are saved to the encrypted log file located on the user's machine. Monitoring program works in background | |||
Updated: 8, 2004 | Rating: 0 | Author: Raytown Corporation | Size: 2774 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
234. | PC Activity Monitor Standard (PC Acme Standard) 7.2 (keyloggers.com) | ||
Monitor Standard (PC Acme Standard) is designed for monitoring user's PC activity. PC Acme Standard works under Windows 2000/XP operating systems. All data collected by the monitoring are saved to the encrypted log file located on the user's machine. Monitoring program works in background, transparent for the user, on the level of OS kernel. PC Acme Standard supports | |||
Updated: 8, 2004 | Rating: 0 | Author: Raytown Corporation | Size: 2915 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
235. | Privacy Master 3.9 (webroot.com) | ||
within your computer where everything you choose is encrypted and hidden from prying eyes. Powerful 128-bit encryption combined with a unique session-based program style provide the tools you need to secure your privacy on-line and off. Open a secure session in Privacy Master, and whether you are working on documents or browsing the Internet, everything you do during your session is | |||
Updated: 8, 2004 | Rating: 0 | Author: Steve Thomas | Size: 1457 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
236. | Secure Disk Pro 3.0 (securedisk.netfirms.com) | ||
Disk Pro completely eliminates all hidden evidence of activities on your computer and allows you to clean up the history of all activities on your PC. It can clean your browser's cache, cookies, web forms data, entries in your recent documents history, recent applications history, find files history, your temporary files, recycle bin, clean recent documents | |||
Updated: 8, 2004 | Rating: 114 | Author: DD Software | Size: 1030 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
237. | Secure Files 2.8 (securefiles.net) | ||
Files allows you to hide,protect and encrypt your personal files and folders easily, the protected files will be encrypted and unreadable. With Secure Files, what you need to do is just adding your filesand folders to Securet Files. The files will be encrypted and hidden automatically.If you want access them again, just launch Secure | |||
Updated: 8, 2004 | Rating: 0 | Author: Tang Jun | Size: 720 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
238. | The Keytrap Application invisible keylogger 2.1 (keytrap.camouflagesoft.com) | ||
all keyboard activity. The keystrokes are stored in an encrypted file in a secret location. There is an Admin program available for retrieving the keystroke information in a convenient report format. The report stores the keystrokes according to application as well as date and time. The program will record everything - including all passwords typed, all chat room activity, etc. It | |||
Updated: 8, 2004 | Rating: 116 | Size: 458 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
239. | WinTools.net Professional 4.1.1 (wintools.net) | ||
WinTools.net Professional contains tools: Clean Uninstaller, Scan Files, Scan Registry, Start Up, Tweak UI, Net Tweaker, The Privacy... Clean Uninstaller - This tool is used for both correctly removing software and for monitoring changes made to the hard drive, MS Windows registry and system files during program installations. Scan Files - This tool is used for | |||
Updated: 8, 2004 | Rating: 42 | Author: Ruslan Smekalov | Size: 954 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
|
Home > Hidden files software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|