|
||||||
|
||
|
Home > Hide software |
Related keywords: hide files, hide folder, hide folders, hide file, hide windows, hide applications, hide pictures, Hide Folder, hide icons, hide program |
|
|
531. | SecurDesk! LV 5.32 (cursorarts.net) | ||
A highly customizable desktop environment for Windows which locks down icons, buttons and hotspots. Your desktop can hold multiple animated icons, sound, buttons, wallpaper, images, text, and other elements. You can spread icons across multiple password-protected pages so you have much more room to | |||
Updated: 9, 2005 | Rating: 0 | Author: CursorArts Company | Size: 3168 kb | Shareware Go to category: System Utilities > Launchers & Task Managers Similar programs | |||
532. | Secure Password Store 0.81 (lmphotonics.com) | ||
in plain text format. - Edit Records. - Delete Records. -Show/Hide Secure Fields - Random Password generator of variable length in numeric, hex or alphanumeric format. - Demo Version (Free) allows 5 records - Lite Version allows 15 records - Pro Version allows unlimited records. Secure Password Store is a secure Password database program that stores all your passwords and | |||
Updated: 9, 2005 | Rating: 0 | Author: Mark Empson | Size: 607 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
533. | Security Administrator 10.14 (getfreefile.com) | ||
context menus, DOS windows, Registry editing, and network access. Hide your desktop icons, individual drives, Start menu items, or even the entire taskbar. You can also apply password protection to Windows and restrict users to running specific applications only, control Internet usage, view statistics of working of your kids or employees. Security restrictions can be applied | |||
Updated: 2, 2006 | Rating: 0 | Author: Ixis Ltd | Size: 1104 kb | Shareware Go to category: Security & Privacy > Access Control Similar programs | |||
534. | Security Folder 2.0 (security-folder.com) | ||
the new generation of computer safeguard tools and is intended for hiding your files, folders and entire drives from other users of a Windows NT/2000/XP machine. The application combines the ultimate power of industry-standard strong encryption algorithms with unique stealth technologies to protect your data from both unauthorized access and modification/destruction by malicious | |||
Updated: 9, 2005 | Rating: 0 | Author: Richard Davids | Size: 515 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
535. | Steganography 1.7.1.1 (pipisoft.com) | ||
3 quick steps! Steganography enables you to use digital data hiding techniques (steganography) to hide files and messages within other files (carriers) such as picture or sound files. This allows you to encrypt sensitive information, while at the same time hiding it in a file that will not look suspicious, so nobody even knows that there is any encrypted | |||
Updated: 2, 2006 | Rating: 0 | Author: Rachel White | Size: 1106 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
536. | 1st Security Agent 6.14 (getfreefile.com) | ||
My Documents, etc. Additionally, you can: disable Start Menu items, hide local and network drives, disable the DOS prompt, boot keys, real DOS mode, Registry editing, taskbar, task manager, and network access, hide desktop icons, and much more. You can apply password protection to Windows and restrict users to running specific applications only. Security restrictions can be | |||
Updated: 2, 2006 | Rating: 214 | Author: Ixis Ltd | Size: 1105 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
537. | Universal Programmer Analyser-UPA 2.3 Lite (elrasoft.hostcolor.com) | ||
Copy hex/dec/bin/text to clipboard; Font and color options; Show/Hide offset/hex/text; Group bytes; Up to 2 GB file size; Adjust bytes per line; Compare Files, Import Intel hex format and Motorola S record files PULSE GENERATOR: 0-50kHz FREQUENCY METERr: 0-50kHz <1% 4 CHANNELS ANALYSER speed 1-2us, HEX EDITOR, I2C & Microwire Monitor, PROGRAMMER:24c01-24c512, 93c46-86 | |||
Updated: 9, 2005 | Rating: 142 | Author: Penko Kovatchev | Size: 540 kb | Freeware Go to category: Development > Other Similar programs | |||
538. | Windows Security Officer 6.8.1.1 (mybestsoft.com) | ||
own custom desktop. You can additionally: disable Start menu items, hide your drives, disable the DOS prompt, hide desktop icons, and much more. You can even set an access timer for each user (when and how long access will be allowed) and allow access only to programs on your personal computer | |||
Updated: 2, 2006 | Rating: 0 | Author: Eugene Mihailov | Size: 1578 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
539. | Modem Spy 3.4 (modemspy.com) | ||
ID information. 8) Pop up caller ID info. 9) Super Spy mode will hide Modem Spy behaviour. Nobody will know that you are recording phone calls. Modem spy records all telephone calls, records from microphone, plays back recorded mesages via phone line or sound card. Has built-in software automatic gain control. Detects and logs Caller | |||
Updated: 9, 2005 | Rating: 0 | Author: SoftCab Inc | Size: 253 kb | Shareware Go to category: Audio & Multimedia > Rippers & Converters Similar programs | |||
540. | Classical Block 3.00 (zhangduo.com) | ||
A special function of the game is to press F12 to cheat your boss by hiding the game, which is very effective. When your boss is away, you may resume to play at the right point. 15 days trial, $14 or Euro 14 to register. Classical Tetris is designed for Tetris beginners and experts and even | |||
Updated: 9, 2005 | Rating: 42 | Author: Duo Zhang | Size: 625 kb | Shareware Go to category: Games & Entertainment > Puzzle & Word Games Similar programs | |||
|
Home > Hide software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|