|
||||||
|
||
|
Home > Hacker software |
Related keywords: anti hacker, hacker protection, hacker safe, hacker 2004, speed hacker, hacker tool |
|
|
41. | DriveCrypt 3.03a (drivecrypt.com) | ||
special functionalities that prevent passwords from being sniffed by Hackers or Trojan horses such as Back Orifice, SubSeven DRIVECRYPT makes Dictionary or Brute Force attacks against encrypted volumes much harder than any of the actual competitor products. DriveCrypt is the most powerful, flexible | |||
Updated: 9, 2005 | Rating: 0 | Author: Wilfried Hafner | Size: 3222 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
42. | Go-Go Database 1.203 (gogodatabase.com) | ||
Go-Go Database is a fully functional database application that you can rapidly and easily adapt to your needs without any programming at all. You can easily change field names, create new categories, add drop down lists, add email fields, web fields and secure your data with usernames and passwords. You do | |||
Updated: 3, 2005 | Rating: 0 | Author: Paul Baker | Size: 2632 kb | Shareware Go to category: Business > Databases & Tools Similar programs | |||
43. | Go-Go Quotations 1.203 (gogodatabase.com) | ||
Go-Go Quotations is sales quoting software that will save you time and money when quoting and selling products and services. Go-Go Quotations will help increase your quoting productivity by helping you to create detailed quotes with speed and efficiency. You can also put in hidden costs that do not appear as | |||
Updated: 3, 2005 | Rating: 0 | Author: Paul Baker | Size: 15288 kb | Shareware Go to category: Business > Other Similar programs | |||
44. | My Notes Center 1.4.3 (mynotescenter.com) | ||
Have you ever worked on a research project that required days even months to complete? Then you probably know the frustration of using the regular software solutions for systemizing gathered information and adding new notes. After a while you simply don’t know which file contains necessary information and | |||
Updated: 2, 2006 | Rating: 0 | Author: Dmitry Bobrik | Size: 1873 kb | Shareware Go to category: Business > PIMS & Calendars Similar programs | |||
45. | OlapX Application 4.0 (olapxsoftware.com) | ||
interactive analysis, reporting and presentation of Microsoft's Analysis Services databases. Designed for users at any business or technical skill level in a company to perform their own multidimensional analysis, create reports, and share them for better decision making. - Open MSAS cubes, cubes, cue views or report portfolios from your network or web addresses | |||
Updated: 9, 2005 | Rating: 42 | Author: Carlos Goldberg | Size: 7899 kb | Shareware Go to category: Business > Databases & Tools Similar programs | |||
46. | PC Activity Monitor (PC Acme) 6.4 (softsecurity.com) | ||
PC Activity Monitor (PC Acme) is an ultimate invisible and undetectable easy-to-use monitoring and surveillance tool for both networked and personal PCs. It is professional software that captures all users activity on the PC. All data collected by the monitoring are saved to encrypted log file. It is a | |||
Updated: 9, 2005 | Rating: 0 | Author: Raytown Corporation LLC | Size: 976 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
47. | EXECryptor 2.3.7 (softcomplete.com) | ||
PellesC, Visual Basic, PowerBASIC, IBASIC, PureBasic. All SDK's and samples are available. Powerful software tool used for an application code protection from reverse engineering, analysis and modifications, based on a brand new metamorphing code transformation technology, that provides with strong software | |||
Updated: 2, 2006 | Rating: 140 | Author: Alex Sergeev | Size: 2865 kb | Shareware Go to category: Development > Management & Distribution Similar programs | |||
48. | HardKey License Manager 3.2 (softcomplete.com) | ||
HardKey System is easy and powerfull license manager and work with short (15-25 chars) keys. Program based on strong asymetric (public keys) cryptography. HardKey Base Features : - Short registration key (by example: "29UD4-3K6GH-VE5SX-ZA7EK") - Key may contain following optional fields: - Hardware ID | |||
Updated: 9, 2005 | Rating: 536 | Size: 8054 kb | Shareware Go to category: Development > Management & Distribution Similar programs | |||
49. | Restorator 2006 (bome.com) | ||
+ Enhance control over resource files in software development + Hack into the inner workings of applications on your computer + and much more see website for details A powerful find dialog lets you find any resource in files on your disk. You can distribute your modifications in a small | |||
Updated: 2, 2006 | Rating: 3199 | Author: Florian Bomers | Size: 3176 kb | Shareware Go to category: Development > Other Similar programs | |||
50. | SignetSure 1.0 (SignetSure.com) | ||
programs and data over the Internet. Disaster would strike if hackers could impersonate you and send their own files to your subscribers. You have installed a program on the subscriber's machine that receives your files. This program must be able to authenticate files even against a hacker who has reverse-engineered your program. Scenario Two: You distribute | |||
Updated: 9, 2005 | Rating: 0 | Author: Jim Serwer | Size: 696 kb | Shareware Go to category: Development > Delphi Similar programs | |||
|
Home > Hacker software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|