|
||||||
|
||
|
Home > File hider software |
Related keywords: file, File, file transfer, file management, file encryption, file manager, file sharing, file backup, FILE, file compare |
|
|
311. | SecurDesk! 5.32 (cursorarts.com) | ||
security measures, to control access to important materials, to hide confusing and irrelevant items from selected users, to simplify training tasks, etc. SecurDesk! is a complete replacement for the Windows default Explorer.exe desktop/file manager shell. SecurDesk! Features Include: a desktop interface which can be custom designed; Logging of system usage; Enhanced | |||
Updated: 9, 2005 | Rating: 0 | Author: CursorArts Company | Size: 7036 kb | Shareware Go to category: Security & Privacy > Access Control Similar programs | |||
312. | Secure Password Store 0.81 (lmphotonics.com) | ||
hidden from prying eyes. Features: - Encrypted database file that is only accessible by a user specified password. This user password is used as the encryption / decryption key and is not stored anywhere. - Each record consists of : Name, Version, Serial Number, Registered To, Password, Date, Web address, Supplier, and Comment fields. - "Registered To" and "Password" fields | |||
Updated: 9, 2005 | Rating: 0 | Author: Mark Empson | Size: 607 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
313. | Security Folder 2.0 (security-folder.com) | ||
ago, our puny hard drives contained hardly a couple of thousands of files. Today, our massive hard drives contain dozens and even hundreds of thousands of various files and folders and, which is most important, the overall information value increased dramatically. From private messages to business-critical data – every singe bit of valuable information we may have on our | |||
Updated: 9, 2005 | Rating: 0 | Author: Richard Davids | Size: 515 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
314. | Steganography 1.7.1.1 (pipisoft.com) | ||
an excellent method of embedding information on the contents of the file within another file! Make your secrets invisible in just 3 quick steps! Steganography enables you to use digital data hiding techniques (steganography) to hide files and messages within other | |||
Updated: 2, 2006 | Rating: 0 | Author: Rachel White | Size: 1106 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
315. | Universal Programmer Analyser-UPA 2.3 Lite (elrasoft.hostcolor.com) | ||
you can read or write information from significant numbers of EEPROM's and microcontrollers, see I2C and microwire protocol, or use your computer as a 4 channels logic analyser. The hardware part is simple enough and uses COM and LPT port of the computer. Features: PROGRAMMER: 24c01, 24c02, 24c04, 24c08, 24c16, 24c32, 24c64, 24c65, 24c128, 24c256, 24c512, 93c46, 93c56, 93c57, 93c66 | |||
Updated: 9, 2005 | Rating: 142 | Author: Penko Kovatchev | Size: 540 kb | Freeware Go to category: Development > Other Similar programs | |||
316. | Windows Security Officer 6.8.1.1 (mybestsoft.com) | ||
they can do it while they have access to those resources. If a user's time limit has been set and it has been reached, the computer shuts itself off and that user can not log-on again until their permitted time range arrives. Windows Security Officer enables you to protect and totally control access to | |||
Updated: 2, 2006 | Rating: 0 | Author: Eugene Mihailov | Size: 1578 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
317. | Modem Spy 3.4 (modemspy.com) | ||
1) record phone conversations. 2) microphone recorder. 3) WAVe files playback via telephone line. 4) Sound card playback of recorded mesages. 5) Record ALL incomming phone calls. 6) Has built-in software automatic gain control (AGC). 7) Detect and log Caller ID information. 8) Pop up caller ID info. 9) Super Spy mode will hide Modem Spy behaviour. Nobody will know that you | |||
Updated: 9, 2005 | Rating: 0 | Author: SoftCab Inc | Size: 253 kb | Shareware Go to category: Audio & Multimedia > Rippers & Converters Similar programs | |||
318. | U-Wipe 2.0 (u-wipe.com) | ||
the tracks in Microsoft Windows and Microsoft Office, temporary files, and more. U-Wipe supports such applications as Microsoft Internet Explorer 4.1 and higher, Microsoft Office 97 and 2000, Netscape 6, Mozilla, and so on. You can plan the deleting process by running the utility manually or automatically (on schedule). An additional "Boss key" feature has been added to hide | |||
Updated: 9, 2005 | Rating: 16 | Author: Artemiy Babamuratov | Size: 1971 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
319. | Maverick Launch Centre 2.1.004 (skaro.net) | ||
features and utilities including a sophisticated alarm clock, a hex file viewer, an advanced font viewer, a file wiper (to irrevocably destroy files), a file toucher (to change dates), a file/disk profiler (to analyse disk usage), a file/disk scanner (to validate | |||
Updated: 2, 2006 | Rating: 0 | Author: James Turner | Size: 1569 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
320. | Database Tour Pro 5.0.7.655 (vlsoftware.net) | ||
-Exporting data from any open table or query to another database or file (with format conversion). -Copying data to clipboard. -Calculating numeric fields (sum, avg, min, max, count). -Editing BLOB fields (MEMO, graphic). -Tools for editing string fields (trimming, changing case of symbols). -Sorting | |||
Updated: 3, 2006 | Rating: 0 | Author: Vitaliy Levchenko | Size: 1758 kb | Shareware Go to category: Business > Databases & Tools Similar programs | |||
|
Home > File hider software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|