|
||||||
|
||
|
Home > Hidden software |
Related keywords: hidden files, hidden password, hidden share, hidden sharing, hidden errors, hidden picture, hidden picture puzzle game, hidden stereo, hidden watermarks, hidden camera |
|
|
41. | MicroLocked 1.6.3 (jcmatt.com) | ||
when your machine locks. Desktop icons and taskbar can be optionally hidden while locked. Ideal for personal or business use and in situations where you need to view system monitoring applications or provide a secure kiosk environment to present your service or product. Small, easy to setup, security | |||
Updated: 2, 2006 | Rating: 0 | Author: James Matt | Size: 1630 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
42. | MagicTweak 3.20 (magictweak.com) | ||
Windows. This unique software makes it easy to tweak hundreds of hidden settings in Windows XP/2000/Me/98, so there is no longer any need to dig through the registry looking for that specific setting (from Start Menu,Desktop,IE skin,System Icon to System Security) that just doesn't seem to be there. With the ability to cutomize almost any aspect of Windows, you can become a Windows | |||
Updated: 2, 2006 | Rating: 195 | Author: Albert Hoffmann | Size: 1666 kb | Shareware Go to category: Games & Entertainment > Tools & Editors Similar programs | |||
43. | Macro Mania 11.1 (nstarsolutions.com) | ||
This award-winning program will save you time and money as you automate your computer tasks with macros. Macro Mania eliminates all the tedious computer tasks and redundant typing chores that can be done much faster and easier with macros. It can launch new or activate an already running program; send | |||
Updated: 2, 2006 | Rating: 42 | Author: Jeff Camino | Size: 1171 kb | Shareware Go to category: System Utilities > Automation Tools Similar programs | |||
44. | IDEM File Synchronization 2.2i (peccatte.karefil.com) | ||
permissions on NTFS partitions and files and folders attributes ie hidden, system, archive, etc. Synchronize and transfer data across local or network drives each time that existing files are modified in original folders or on newer files are created. Idem detects changes and will copy or dispatch them into destination folders according your setup parameters. Used as a desktop | |||
Updated: 2, 2006 | Rating: 0 | Author: Patrick Peccatte | Size: 2203 kb | Shareware Go to category: System Utilities > Backup & Restore Similar programs | |||
45. | HotKeyz 2.4.2.0 (skynergy.com) | ||
... Launch applications in a Normal, Minimized, Maximized or Hidden state. The Parameter option gives you parameter control when launching another application like the Internet Explorer and surfing to a specific site as parameter. HotKeyz also features default hotkeys for minimizing, maximizing, restoring or closing the active window. Launch your default e-mail window to | |||
Updated: 2, 2006 | Rating: 812 | Author: Magnus Kruger | Size: 1020 kb | Freeware Go to category: Development > Other Similar programs | |||
46. | Hide Files 3.4 (hide-files.biz) | ||
make files or folders invisible for another's eyes. Hide Files makes hidden any files and folders (or whole Windows folder or even all computer disks). Hide Files allows you to select any folders (and sub folders with files) of your choice to protect as hidden files and folders. You can select any folders on your computer or drag-and-drop the desired folders from Windows | |||
Updated: 2, 2006 | Rating: 0 | Author: Eric Nilsson | Size: 234 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
47. | Hide Files 3.4 (spydex.com) | ||
make files or folders invisible for another's eyes. Hide Files makes hidden any files and folders (or whole Windows folder or even all computer disks). Hide Files allows you to select any folders (and sub folders with files) of your choice to protect as hidden files and folders. You can select any folders on your computer or drag-and-drop the desired folders from Windows | |||
Updated: 2, 2006 | Rating: 0 | Author: Eric Nilsson | Size: 234 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
48. | Evidence Killer 2005 1.0 (securedisk.netfirms.com) | ||
Killer 2005 completely eliminates all hidden evidence of activities on your computer and allows you to clean up the history of all activities on your PC. It can clean your browser's cache, cookies, web forms data, entries in your recent documents history, recent applications history, find files history, your temporary files, recycle bin, clean recent documents lists for popular | |||
Updated: 2, 2006 | Rating: 82 | Author: Solution inc | Size: 2060 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
49. | Evidence Exterminator 2.14 (softstack.com) | ||
Windows does not actually delete the files but places them to the hidden RECYCLER folder, and even if you use the Empty Recycle Bin command, some files may stay in this folder and can not be deleted by Windows? Evidence Exterminator is a complex security system that ensures your privacy by destroying | |||
Updated: 2, 2006 | Rating: 0 | Author: IM Soft | Size: 984 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
50. | DMUSB 2.8.0 (flenik.com) | ||
the installation folder and the backup target. These shares can be hidden from public view and known only to DMUSB. Clients do not need to share their drives, at all. Nevertheless, you - as an administrator - will be able to access these drives from any computer in the network. Added Value Due to | |||
Updated: 2, 2006 | Rating: 0 | Author: Nick Cassos | Size: 3709 kb | Shareware Go to category: System Utilities > Backup & Restore Similar programs | |||
|
Home > Hidden software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|