|
||||||
|
||
|
Home > Trace remover software |
Related keywords: trace, remover, spyware remover, adware remover, Trace, trace route, spam remover products foundry Outlook, trace image, ad remover, ip trace |
|
|
31. | Transparent Screen Lock PRO for WinNT/2000/XP/2003 4.50 (e-motional.com) | ||
that are running. Prevent system access via CRTL-ALT-DEL. Options to remove the pocess from the Windows Task Manager and restrict configuration menus to Administrators only in order to prevent regular users from disabling or tampering with the program. Log file tracks failed logon attempts, and can initiate shutdown/logoff. Save log file locally, to network or to Event Log. Use | |||
Updated: 2, 2006 | Rating: 16 | Author: Sandra Buckingham | Size: 992 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
32. | Stealth Folder Hide XP 9.3 (folder-hider-stealth.com) | ||
it up. Stealth Folder is not visible in Start, Toolbar, Taskbar, Add/Remove Programs or CTL ALT DEL.. Stealth Folder is Password Protected and you may hide as many folders as you wish. Stealth Folder comes with a Folder Hider and Clear Tracks utility. With Stealth Folder you will be able to hide any | |||
Updated: 2, 2006 | Rating: 0 | Author: Ben Nelson | Size: 540 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
33. | Reg Organizer 3.1 (chemtable.com) | ||
the 'Open with...' context menu, delete items from the 'Add/Remove Programs' dialog, specify the programs to run at Windows startup, analyze the shared dynamic link libraries (DLL) and more... Extensive and extremely powerful set of Registry tools to safely modify the Windows Registry. It keeps track of changes made so they can easily be reverted. It includes many system | |||
Updated: 2, 2006 | Rating: 0 | Author: Konstantin Polyakov | Size: 1440 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
34. | Junk-Out for Outlook 2003/2002/2000 1.0 (theofficemaven.com) | ||
Junk-Out keeps junk mail out of your Microsoft Outlook Inbox, using a combination of statistical methods (Bayesian filtering) and information you provide, to show only e-mail messages you want to see. The more you use Junk-Out, the better it gets at distinguishing useful e-mail, and getting junk out of your | |||
Updated: 2, 2006 | Rating: 0 | Author: Mike Craven | Size: 10536 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
35. | Internet History Eraser 5.5 (internet-history-eraser.com) | ||
free up valuable disk space as well. With a single click, it removes files from your cache, cookies, and history folders. The program goes further to clear out typed URLs as well as the contents of your browser's "autocomplete" function. Internet History Erasereven covers your normal Windows activities. You can optionally delete items from your system's Temp and Recent Documents | |||
Updated: 2, 2006 | Rating: 0 | Author: Kevin | Size: 1460 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
36. | Hide Files 3.4 (hide-files.biz) | ||
or folders are hidden, it is impossible to find them, or access and remove any file. Unhiding files or folders is as easy as hiding them - just one mouse click and they are visible and accessible to you again. If program folder or whole disks are hidden, itself program or Windows will continue to | |||
Updated: 2, 2006 | Rating: 0 | Author: Eric Nilsson | Size: 234 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
37. | Hide Files 3.4 (spydex.com) | ||
or folders are hidden, it is impossible to find them, or access and remove any file. Unhiding files or folders is as easy as hiding them - just one mouse click and they are visible and accessible to you again. If program folder or whole disks are hidden, itself program or Windows will continue to | |||
Updated: 2, 2006 | Rating: 0 | Author: Eric Nilsson | Size: 234 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
38. | East-Tec Eraser 2006 7.0 (east-tec.com) | ||
your data and privacy and remove all evidence of your computer and online activity with East-Tec Eraser 2006. Eraser goes beyond U.S. Department of Defense standards for the permanent erasure of digital information and easily removes every trace of sensitive data from your computer. Completely destroy information stored without your knowledge or approval: Internet | |||
Updated: 2, 2006 | Rating: 76 | Author: Horatiu Tanescu | Size: 4933 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
39. | East-Tec DisposeSecure 2005 3.3 (east-tec.com) | ||
trade secrets, business plans, personal files and letters, or traces of Internet or newsgroup activity with the old computers that you or your company resells, donates, reassigns to different departments or removes from operation. Deleting all the files or even formatting the hard disk is not enough to stop people to restore information using basic recovery programs | |||
Updated: 2, 2006 | Rating: 0 | Author: Horatiu Tanescu | Size: 2574 kb | Shareware Similar programs | |||
40. | DiskState 3.11 (geekcorp.com) | ||
surfing the web (Firefox, IE, Opera). But wait--you can do more.. Remove left-overs from unsuccessful uninstalls, add multiboot for Linux, schedule cleanups on a regular basis, command-line enabled for scripting (sysadms), capture and detect the slightest file system changes, manage internet cookies, winshading, folder and file comparison, disk image size calculator and historic file | |||
Updated: 2, 2006 | Rating: 79 | Author: Sveinar Rasmussen | Size: 1432 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
|
Home > Trace remover software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|