|
||||||
|
||
|
Home > Hacker software |
Related keywords: anti hacker, hacker protection, hacker safe, hacker 2004, speed hacker, hacker tool |
|
|
331. | FolderSafe 2.1 (occultsoft.com) | ||
- Anyone who wants to protected his files/information from trojan or hackers. - Anyone who like to make more security for their sesitive folders/files. FolderSafe is a software tool that lets you hide or restrict access to non-virtual files and folders of your choice, manage your net shares. If you want to improve security of some sensitive folders/files, FolderSafe can | |||
Updated: 8, 2004 | Rating: 120 | Author: Ken Li | Size: 3066 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
332. | FolderAccess 2.0 (lockfolder.net) | ||
of reported security breaches come from within the organization, not hackers! Locking files and folders is the best way to guarantee that nobody accidentally or intentionally gets access to your financial, health, private or confidential information. And since locking your files, folders or drives | |||
Updated: 9, 2005 | Rating: 0 | Author: Leo van Opstal | Size: 4313 kb | Freeware Go to category: System Utilities > Other Similar programs | |||
333. | Geek Superhero 1.3 (geeksuperhero.com) | ||
It includes other features to help you protect your computer from hackers and worms by disabling rarely used Windows services, it helps you protect your privacy by blocking popup advertising windows, blocking "Phishing" scams, and removing "Web Bugs" used to track you. Geek Superhero has more tools to fix you computer if Internet Explorer has been hijacked, to easily look at all | |||
Updated: 9, 2005 | Rating: 16 | Author: Michael Burford | Size: 2548 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
334. | Hotkey Assistant 1.5 (spellway.com) | ||
Hotkey Assistant is a powerful and easy-to-use hotkey manager with wide range of capabilities. It provides you with additional means to control applications, windows, and other system components. For example, you can assign keyboard shortcuts forquick access to any application, file or folder, sound | |||
Updated: 9, 2005 | Rating: 0 | Author: Spellway Ltd | Size: 765 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
335. | HotKeyz 2.4.2.0 (skynergy.com) | ||
characters or the current date and time. Open and close your CD-Rom(s). Power off, shutdown, logoff or reboot your PC. Start your screen saver, hide or unhide your desktop, taskbar or any desktop window. Connect to the internet and disconnect your dial-up with a hotkey. Control your windows sound by | |||
Updated: 2, 2006 | Rating: 812 | Author: Magnus Kruger | Size: 1020 kb | Freeware Go to category: Development > Other Similar programs | |||
336. | IntraMail 2003.01.20 (dplanet.ch) | ||
codes). These short mails are extremely well protected against local hackers and Internet attacks like Trojans or Tunneling-helpers or other applications. Passwords stay encrypted in memory and swap files. Wireless networks and mixed networks can be used very securely. A CHAT-room with use of | |||
Updated: 9, 2005 | Rating: 42 | Author: Jean-Maurice Tellenbach | Size: 2918 kb | Shareware Go to category: Communications > E-Mail Clients Similar programs | |||
337. | Invisible Secrets Encryption Software 4.4 (neobytesolutions.com) | ||
for sensitive information. Nobody, not even your wife, boss, or a hacker would realize that your important papers or letters are stored in your last holiday pictures, or that you use your personal web page to exchange messages or secret documents. Invisible Secrets Encryption Software 4 features | |||
Updated: 2, 2006 | Rating: 0 | Author: NeoByte Solutions | Size: 2740 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
338. | Jetico Personal Firewall 1.0.1.61 (jetico.com) | ||
Personal Firewall protects your computer from unwanted hacker's attacks from outside as well as from malicious programs "living" secretly inside your computer's memory and hard drive. Three levels of protection are included: low-level network packets filtering, application-level network events filtering and filtering of user-level process activity. Jetico Personal | |||
Updated: 9, 2005 | Rating: 42 | Author: Jetico Inc. | Size: 2744 kb | Freeware Go to category: System Utilities > Other Similar programs | |||
339. | Lock Folder 5.0 (realclicks.com) | ||
of reported security breaches come from within the organization, not hackers! Locking files and folders is the best way to guarantee that nobody accidentally or intentionally gets access to your financial, health, private or confidential information. And since locking your files, folders or drives | |||
Updated: 9, 2005 | Rating: 146 | Author: Leo van Opstal | Size: 1400 kb | Freeware Go to category: System Utilities > Other Similar programs | |||
340. | LockTheFile 1.8 (okosoft.com) | ||
files LockTheFile encrypts the content of your important files from hackers and other users. You may protect any information - text files, pictures, video and audio | |||
Updated: 9, 2005 | Rating: 0 | Author: Andrew Maltsev | Size: 1808 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
|
Home > Hacker software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|