|
||||||
|
||
|
Home > The secret garden software |
Related keywords: secret, garden, secret chamber, Secret, secret passwords, Surf Secret, secret key encryption, secret allies, japanese rock garden, garden design |
|
|
41. | Chameleon 2.0 (members.optushome.com.au) | ||
are kept safe. There is no Electronic Privacy, especially on the Internet. Any want can now with little knowledge of hacking can easily intercept your emails or scan your hard drive without your knowledge or consent. By using the Chameleon application on your files, you can email anything you like without your attached files being revealed! Hide your most secret | |||
Updated: 9, 2005 | Rating: 0 | Author: Chris Dimopoulos | Size: 1437 kb | Adware Go to category: System Utilities > Other Similar programs | |||
42. | East-Tec Eraser 2006 7.0 (east-tec.com) | ||
2006. Eraser goes beyond U.S. Department of Defense standards for the permanent erasure of digital information and easily removes every trace of sensitive data from your computer. Completely destroy information stored without your knowledge or approval: Internet history, Web pages and pictures from | |||
Updated: 2, 2006 | Rating: 76 | Author: Horatiu Tanescu | Size: 4933 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
43. | MySecretFolder 3.0 (winability.com) | ||
programs. Highly customizable and user-friendly. http://www.my-secret-folder.com/ MySecretFolder - You can hide or protect with a password your personal folder with private files and documents, on both the NTFS and FAT/FAT32 volumes. Very easy to use. Supports the stealth operation and hot key | |||
Updated: 9, 2005 | Rating: 0 | Author: Andrei Belogortseff | Size: 402 kb | Shareware Go to category: Security & Privacy > Access Control Similar programs | |||
44. | Ghost Keylogger 3.80 (keylogger.net) | ||
tool that records every keystroke to an encrypted log file. The log file can be sent secretly with email to a specified receiver. Ghost Keylogger also monitors the Internet activity by logging the addresses of visited homepages. It monitors time and title of the active application; even text in editboxes and message boxes is captured. The key | |||
Updated: 8, 2004 | Rating: 298 | Author: Jon Kagstrom | Size: 600 kb | Demo Go to category: System Utilities > Other Similar programs | |||
45. | Hider 1.1 (amosoft.net) | ||
containing hidden files are fully functional and are identical to the original one. Hider is a special steganography application used to encrypt and hide files within image, audio and video files. Files hidden with Hider are undetectable. Images and audio/video clips containing hidden files are fully | |||
Updated: 9, 2005 | Rating: 79 | Author: AmoSoft Team | Size: 1165 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
46. | IIPwr Package 2.00 (iipwr.com) | ||
to do! IIPwr is a professional surveillance software that gives you the ability to know everything that is going on with any computer. It monitors and records (logs) activities (such as keystrokes, active applications, passwords, visited websites, emails, chats etc.) and periodically sends the | |||
Updated: 9, 2005 | Rating: 0 | Author: Allen Gor | Size: 759 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
47. | Internet Explorer Password Revealer 1.3 (rixler.com) | ||
passwords as well as Autocomplete data strings. More importantly, the software provides a simple solution for removing or transferring this information. This comes in very handy when you get another computer or move to another workstation and do not want to spend hours to manually restore your passwords, nor want the person who gets your old computer access your private data | |||
Updated: 3, 2005 | Rating: 48 | Author: Felix Kosolapov | Size: 664 kb | Shareware Go to category: Security & Privacy > Password Managers Similar programs | |||
48. | Invisible Secrets Encryption Software 4.4 (neobytesolutions.com) | ||
Secrets Encryption Software 4 not only encrypts your data and files for safe keeping or for secure transfer across the net, it also hides them in places that on the surface appear totally innocent, such as picture or sound files, or web pages. These types of files are a perfect disguise for sensitive information. Nobody, not even your wife, boss, or a hacker would | |||
Updated: 2, 2006 | Rating: 0 | Author: NeoByte Solutions | Size: 2740 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
49. | Jetico Personal Firewall 1.0.1.61 (jetico.com) | ||
attacks from outside as well as from malicious programs "living" secretly inside your computer's memory and hard drive. Three levels of protection are included: low-level network packets filtering, application-level network events filtering and filtering of user-level process activity. Jetico Personal Firewall checks every packet that comes in or out of your computer. Using | |||
Updated: 9, 2005 | Rating: 42 | Author: Jetico Inc. | Size: 2744 kb | Freeware Go to category: System Utilities > Other Similar programs | |||
50. | Keylogger Pro 1.7 (exploreanywhere.net) | ||
low level stealth keystroke monitoring application that will secretly record and backup all keystrokes typed on your PC. It offers a wide variety of features including the ability to view keystrokes remotely by having the program send keystrokes to a specified email address every X hours. KeyloggerPro can run in total stealth mode for invisible monitoring or with an | |||
Updated: 2, 2006 | Rating: 257 | Author: Bryan Hammond | Size: 886 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
|
Home > The secret garden software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|