|
||||||
|
||
|
Home > Beavers software |
|
|
271. | Frozen Icons 2.25 (djokisoft.com) | ||
When you work with the Microsoft Windows operating system, you may experience the problem of unexpectedly changed icons. This is the annoyance of finding the icons on your desktop ungrouped or moved around in some unwanted way. This can happen after: a.. a system or program lockup or crash. b.. some | |||
Updated: 9, 2005 | Rating: 0 | Author: Oleg Gashev | Size: 810 kb | Shareware Go to category: System Utilities > Launchers & Task Managers Similar programs | |||
272. | GRL RealHidden 1.0 (grltechnology.com) | ||
GRL RealHidden version 1.0 is a software utility that allows you to hide a file physically inside of another file, and then retrieve that hidden file. The resulting 'cloaked' file, that is the file containing hidden file, usually operates exactly like the original file. This product gives you the power to | |||
Updated: 9, 2005 | Rating: 0 | Author: Galen Lande | Size: 1967 kb | Freeware Go to category: System Utilities > Other Similar programs | |||
273. | Hermetic Stego 5.17 (hermetic.ch) | ||
Hermetic Stego is a steganography program which allows you to encrypt and hide a message (the contents of any computer file) in another file so that the addition of the message to the container file will not noticeably change the appearance of that file. If the file which has been hidden is deleted then | |||
Updated: 9, 2005 | Rating: 42 | Author: Hermetic Systems | Size: 1896 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
274. | Hide Folders XP 2.2 (fspro.net) | ||
Every day we trust our personal files to a computer. Most of us store various bits of personal or business-critical information on our hard drives. If you share your computer with co-workers, children, or a spouse, or your computer is always connected to the Internet, your private files are under threat of | |||
Updated: 9, 2005 | Rating: 173 | Author: FSPro Labs | Size: 1025 kb | Shareware Go to category: Security & Privacy > Access Control Similar programs | |||
275. | HideInPicture 1.1 (braintwist-studios.com) | ||
and in a place that no one would even think to look. HideInPicture's purpose is to hide any data in a way that the viewer does not recognize any difference. Nobody will suspect hidden data inside the image. You also can create complete Web galleries with your hidden files, ready for upload, with just a few mouse clicks. A wizard will guide you through the necessary steps needed to | |||
Updated: 9, 2005 | Rating: 0 | Author: Jens Huebner | Size: 979 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
276. | Hider 1.1 (amosoft.net) | ||
Hider is a special steganography application used to encrypt and hide files within image, audio and video files. Files hidden with Hider are not only undetectable, but irretrievable as well. Hider uses advanced technology to protect files including: 256-bit encryption algorithm - Rijindael, advanced | |||
Updated: 9, 2005 | Rating: 79 | Author: AmoSoft Team | Size: 1165 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
277. | Iconic Tray 1.21 (iconictray.com) | ||
tray is easy: simply right-click (or middle-click) on the window's "Minimize" button. Anytime you want to view the minimized windows, just open the Iconic Tray icon to see a menu list - click on a window in the list and it's back on screen again. It really is that easy. Of course, if you had chosen to minimize to the system tray, just restore your window as you would any other | |||
Updated: 9, 2005 | Rating: 0 | Author: Dmitry Nikitin | Size: 47 kb | Shareware Go to category: Desktop > Other Similar programs | |||
278. | Incredi IE Manager 1.3 (iemanager.com) | ||
Add Many Features to Internet Explorer 5.5 or higher with this easy to use but powerful program . It gives you the power of pop-up blocking ,save flash movies and pictures , check spelling , favorites maintaining , link checker, security features , temporary internet files cleaning, new window maximizer | |||
Updated: 9, 2005 | Rating: 0 | Author: George Valtchew | Size: 1723 kb | Freeware Go to category: Network & Internet > Browsers Similar programs | |||
279. | Invisible CHAOS 5.1 (safechaos.net) | ||
Stego product for Windows with a CHAOS interface and a very large hiding capacity (~100% of carrier file). Includes built-in encryption and ability to hide data within specific sub-areas of the image. Chaos uses the newest chaos logic and stream cipher. It has high speed and allows variable-length keys | |||
Updated: 9, 2005 | Rating: 56 | Size: 350 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
280. | ActMon Password Recovery XP 4.03 (iopus.com) | ||
The newest version of this popular password recovery utility decrypts and displays the passwords behind the asterisks on ALL Windows systems. It works automatically on Web pages, Windows 9x/NT and Windows 2000/XP systems. Windows systems allow a convenient storage of frequently used passwords, such as the | |||
Updated: 9, 2005 | Rating: 685 | Author: Team ActMon | Size: 315 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
|
Home > Beavers software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|