|
||||||
|
||
|
Home > Hiding software |
Related keywords: information hiding, hiding a file |
|
|
361. | Absolute CHAOS 3.8 (safechaos.net) | ||
CHAOS allows to encrypt the files and folders and to hide it as the files .ipg, .gif, .doc, .rtf or any others. Absolute CHAOS has high speed and allows variable-length keys, making it very reliable and easy to use. The program is compact, efficient and user friendly. Absolute CHAOS has comprehensive privacy tools including file/folder compression, file/folder shredder. Encrypt | |||
Updated: 9, 2005 | Rating: 16 | Size: 580 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
362. | Absurd Terminator 2.9 (nesoft.org) | ||
and do following other actions: - - refresh list of tasks - or - hide Terminator's window (minimise it to system tray) - in menu "File" you can check menu item "Autostart" and Terminator will start every time when your Windows starts up (recommended) - also in this menu you may select or unselect | |||
Updated: 9, 2005 | Rating: 134 | Author: Alexey Rykov | Size: 304 kb | Shareware Go to category: System Utilities > Automation Tools Similar programs | |||
363. | Access Administrator Pro 4.14 (getfreefile.com) | ||
It enables you to deny access to certain files and folders, or to hide them securely from viewing and searching. An easy-to-use user interface gives you a lot of abilities to allocate access to your files and folders between your users according to predefined schedules. It means that each user has his own list of allowed and disallowed files and folders within certain time periods | |||
Updated: 2, 2006 | Rating: 34 | Author: Ixis Ltd | Size: 678 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
364. | Access Administrator Pro 4.14 (softheap.com) | ||
It enables you to deny access to certain files and folders, or to hide them securely from viewing and searching. An easy-to-use user interface gives you a lot of abilities to allocate access to your files and folders between your users according to predefined schedules. It means that each user has his own list of allowed and disallowed files and folders within certain time periods | |||
Updated: 2, 2006 | Rating: 16 | Author: Ixis Ltd | Size: 678 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
365. | Access Lock 2.83 (softheap.com) | ||
the Access Lock system-tray icon every time you need to disable and hide your desktop. While it is locked, the system keys and taskbar are disabled and the mouse cursor is trapped, unauthorized password entries are met with an audio alert and logged to disk. The only thing is available in this mode is | |||
Updated: 2, 2006 | Rating: 99 | Author: Ixis Ltd | Size: 795 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
366. | Access Lock 2.83 (getfreefile.com) | ||
the Access Lock system-tray icon every time you need to disable and hide your desktop. While it is locked, the system keys and taskbar are disabled and the mouse cursor is trapped, unauthorized password entries are met with an audio alert and logged to disk. The only thing is available in this mode is | |||
Updated: 2, 2006 | Rating: 16 | Author: Ixis Ltd | Size: 795 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
367. | Accessor 1.7 (nesoft.org) | ||
more convenient settings window; - Tray Popup Menu which allows to hide/show some Menu Items. Main features of the program: - Review of the File System (FDD, HDD, CD drives and Network drives) from icon on the system tray; - creation of the list of the most frequently used and favorite | |||
Updated: 9, 2005 | Rating: 42 | Author: Aleksey Skopin | Size: 554 kb | Shareware Go to category: Desktop > Other Similar programs | |||
368. | Cursor Hider 1.4.4 (softexe.com) | ||
Hider helps you to work more productively. It removes the mouse pointer (the mouse cursor does not cover the entered text) while you are working with the keyboard and returns the pointer with any mouse action. Real example: You are going to visit aweb site with forms to fill in. At first you type the URL in the browser's address bar - www.softexe.com. What do you think about | |||
Updated: 2, 2006 | Rating: 0 | Author: Nickolas Smith | Size: 279 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
369. | Active Key Logger 3.0 (winsoul.com) | ||
the program will run when windows starts, and if you enable "Run in Hide Mode" then the program will run by full stealth for others, no one will even think that Active Key Logger is running and logging any activities on the computer. By choosing hot keys that are comfortable for you, you can view log file when the program is running by stealth. Active Key Logger can also send the log | |||
Updated: 2, 2006 | Rating: 242 | Author: Alex Atushev | Size: 703 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
370. | Active Keyboard 3.1 (drive-software.com) | ||
- Minimize any window to the system tray with this utility - Hide application windows by using a hotkey or an icon in the system tray - Control your Winamp player - Open, Play and Close your CD-ROM - Lock and Unlock your CD-ROM - Change the volume, mute - Logon and Power management - Open dialup connections - Empty recycle bin - Create New Folder - Lock/Unlock | |||
Updated: 2, 2006 | Rating: 144 | Author: Dmitri Drive | Size: 914 kb | Shareware Go to category: Desktop > Other Similar programs | |||
|
Home > Hiding software |
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|