|
||||||
|
||
|
Home > Hidden software |
Related keywords: hidden files, hidden password, hidden share, hidden sharing, hidden errors, hidden picture, hidden picture puzzle game, hidden stereo, hidden watermarks, hidden camera |
|
|
271. | LAN Search Pro 7.0 (softperfect.com) | ||
a lightning fast search engine and includes the ability to search hidden network resources, restricted access resources, IP subnets, LAN FTP servers and much more. It comes with a built-in password manager to store your network logins for resources with restricted access. Besides the file searching capabilities, LAN Search Pro offers features that allow you to perform actions on the | |||
Updated: 9, 2005 | Rating: 48 | Size: 1080 kb | Shareware Go to category: Network & Internet > Other Similar programs | |||
272. | LAN Spider 2.1.0.17 (lanspider.com) | ||
LAN Spider goes through your local area network to search the shared directories for certain files: documents, drawings, music & video files and many others. LAN Spider features include: Fast multi-thread search. LAN Spider is the fastest file searching utility: tests shows 300-500% increased performance over | |||
Updated: 9, 2005 | Rating: 0 | Author: Maxim Nukin | Size: 985 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
273. | LanHunter 1.50 (waterfallsoft.com) | ||
computers or the whole network. -Ability to search through hidden network resources. -Flexible search settings (search for files by date, size and so on). -Ability to export search results to various file formats. -And much more! LanHunter makes it easy to search for files on your local network (LAN). When you use LanHunter, you can specify several search criteria. For | |||
Updated: 9, 2005 | Rating: 0 | Author: Alex Vdovin | Size: 1017 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
274. | Lock Folder 5.0 (realclicks.com) | ||
and the rest is done automatically. Now your data is protected, hidden and can not be accessed without entering your personal password. It is critical to have effective protection from unauthorized access, since over 80% of reported security breaches come from within the organization, not hackers! Locking files and folders is the best way to guarantee that nobody accidentally or | |||
Updated: 9, 2005 | Rating: 146 | Author: Leo van Opstal | Size: 1400 kb | Freeware Go to category: System Utilities > Other Similar programs | |||
275. | LockBox 2.11 (locksoft.net) | ||
The LockBox looks and acts much like a regular windows folder, except it is opened with a password. Any files dragged into the LockBox are protected with a strong encryption algorithm. Files can be run or modified from directly within the LockBox, without compromising security. Large files can optionally be | |||
Updated: 3, 2005 | Rating: 474 | Author: David Dosanjh | Size: 600 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
276. | Macro Mania 11.1 (nstarsolutions.com) | ||
This award-winning program will save you time and money as you automate your computer tasks with macros. Macro Mania eliminates all the tedious computer tasks and redundant typing chores that can be done much faster and easier with macros. It can launch new or activate an already running program; send | |||
Updated: 2, 2006 | Rating: 42 | Author: Jeff Camino | Size: 1171 kb | Shareware Go to category: System Utilities > Automation Tools Similar programs | |||
277. | MagicTweak 3.20 (magictweak.com) | ||
Windows. This unique software makes it easy to tweak hundreds of hidden settings in Windows XP/2000/Me/98, so there is no longer any need to dig through the registry looking for that specific setting (from Start Menu,Desktop,IE skin,System Icon to System Security) that just doesn't seem to be there. With the ability to cutomize almost any aspect of Windows, you can become a Windows | |||
Updated: 2, 2006 | Rating: 195 | Author: Albert Hoffmann | Size: 1666 kb | Shareware Go to category: Games & Entertainment > Tools & Editors Similar programs | |||
278. | Masker 7.0.6 (softpuls.com) | ||
RIJNDAEL 256-bit, TWOFISH) The encrypted files will then be hidden within a carrierfile. MASKER is able to compress files in order to reduce size of the carrier file. As a carrier file you can use: image files (bmp, gif, jpg, tif); audio files (wav, mid, snd, mp3); program files (exe, dll, ocx); video files (avi, mov, mpg, asf); For example, you could create a picture file | |||
Updated: 3, 2006 | Rating: 16 | Author: Evgeny Zaretskiy | Size: 2399 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
279. | MaxMonkey 2.24 (homepage.ntlworld.com) | ||
following desirable features: Window visibility manager: View hidden or stealth programs or viruses that maybe running without your knowledge or consent. Detect applications that are hidden and still running but no longer in use. Windows state manager: MaxMonkey is a windows maximizer, minimizer, restorer and closer. With one easy left-click, double-click or | |||
Updated: 9, 2005 | Rating: 0 | Author: monkey job | Size: 350 kb | Shareware Go to category: System Utilities > Shell Tools Similar programs | |||
280. | Memory Optimizer 2002a (dmk.ca) | ||
memory. You can also set CPU priorities for programs and see what hidden programs are running on your PC. With Memory Optimizer you can work on your PC smoothly even when many applications are running. Memory Optimizer is an easy to use yet powerful program that Boosts your PC's Performance and Stability up to | |||
Updated: 9, 2005 | Rating: 73 | Author: DMK Corp. | Size: 467 kb | Shareware Go to category: System Utilities > System Maintenance Similar programs | |||
|
Home > Hidden software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|