|
||||||
|
||
|
Home > Hack software |
Related keywords: ANTI HACK, OS hack utilities |
|
|
291. | FitoNT 1.0.0.0 (netnet.ca) | ||
virus's brought in by employee's checking their e-mail, internet hackers, unexpected hard drive or hardware crashes, and any other dangers that lurk out there. With FITONT by your side, as soon as your file is edited and changed, it is shuffled to a safe backup of your choice. The real time protection of FITONT is a must in today's day and age of constant data corruption. Program | |||
Updated: 9, 2005 | Rating: 0 | Author: Boris na | Size: 3752 kb | Freeware Go to category: System Utilities > Backup & Restore Similar programs | |||
292. | Folder Lock 5.3.9 (newsoftwares.net) | ||
spyware, and even protects them from networked PCs, cable users and hackers. Files can also be protected on USB Flash Drives, Memory Sticks, CD-RW, floppies and notebooks. Protection works even if files are taken from one PC to another on a removable disk, without the need to install any software. It locks files in Windows, DOS and even Safe Modes. Additional Options include Stealth | |||
Updated: 2, 2006 | Rating: 6296 | Author: Salman Ashraf | Size: 1941 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
293. | FolderSafe 2.1 (occultsoft.com) | ||
- Anyone who wants to protected his files/information from trojan or hackers. - Anyone who like to make more security for their sesitive folders/files. FolderSafe is a software tool that lets you hide or restrict access to non-virtual files and folders of your choice, manage your net shares. If you want to improve security of some sensitive folders/files, FolderSafe can | |||
Updated: 8, 2004 | Rating: 120 | Author: Ken Li | Size: 3066 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
294. | FolderAccess 2.0 (lockfolder.net) | ||
of reported security breaches come from within the organization, not hackers! Locking files and folders is the best way to guarantee that nobody accidentally or intentionally gets access to your financial, health, private or confidential information. And since locking your files, folders or drives | |||
Updated: 9, 2005 | Rating: 0 | Author: Leo van Opstal | Size: 4313 kb | Freeware Go to category: System Utilities > Other Similar programs | |||
295. | Geek Superhero 1.3 (geeksuperhero.com) | ||
It includes other features to help you protect your computer from hackers and worms by disabling rarely used Windows services, it helps you protect your privacy by blocking popup advertising windows, blocking "Phishing" scams, and removing "Web Bugs" used to track you. Geek Superhero has more tools to fix you computer if Internet Explorer has been hijacked, to easily look at all | |||
Updated: 9, 2005 | Rating: 16 | Author: Michael Burford | Size: 2548 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
296. | Hotkey Assistant 1.5 (spellway.com) | ||
Hotkey Assistant is a powerful and easy-to-use hotkey manager with wide range of capabilities. It provides you with additional means to control applications, windows, and other system components. For example, you can assign keyboard shortcuts forquick access to any application, file or folder, sound | |||
Updated: 9, 2005 | Rating: 0 | Author: Spellway Ltd | Size: 765 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
297. | HotKeyz 2.4.2.0 (skynergy.com) | ||
Windows Hotkey / Shortcut Creator Using your keyboard will help you to work faster and much more efficiently. HotKeyz is a keyboard utility with hotkey / shortcut control for executing files, folders, Start / Run commands, opening your mail, browsing to a website and logging in and much more | |||
Updated: 2, 2006 | Rating: 812 | Author: Magnus Kruger | Size: 1020 kb | Freeware Go to category: Development > Other Similar programs | |||
298. | IntraMail 2003.01.20 (dplanet.ch) | ||
codes). These short mails are extremely well protected against local hackers and Internet attacks like Trojans or Tunneling-helpers or other applications. Passwords stay encrypted in memory and swap files. Wireless networks and mixed networks can be used very securely. A CHAT-room with use of | |||
Updated: 9, 2005 | Rating: 42 | Author: Jean-Maurice Tellenbach | Size: 2918 kb | Shareware Go to category: Communications > E-Mail Clients Similar programs | |||
299. | Invisible Secrets Encryption Software 4.4 (neobytesolutions.com) | ||
for sensitive information. Nobody, not even your wife, boss, or a hacker would realize that your important papers or letters are stored in your last holiday pictures, or that you use your personal web page to exchange messages or secret documents. Invisible Secrets Encryption Software 4 features | |||
Updated: 2, 2006 | Rating: 0 | Author: NeoByte Solutions | Size: 2740 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
300. | Jetico Personal Firewall 1.0.1.61 (jetico.com) | ||
Personal Firewall protects your computer from unwanted hacker's attacks from outside as well as from malicious programs "living" secretly inside your computer's memory and hard drive. Three levels of protection are included: low-level network packets filtering, application-level network events filtering and filtering of user-level process activity. Jetico Personal Firewall checks | |||
Updated: 9, 2005 | Rating: 42 | Author: Jetico Inc. | Size: 2744 kb | Freeware Go to category: System Utilities > Other Similar programs | |||
|
Home > Hack software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|