|
||||||
|
||
|
Home > Information hiding software |
|
|
51. | Autorunman 2.0 (rudenko.com) | ||
for programs running automatically on Windows startup even those hiding themselves in the Registry. Autorunman allows the user to prevent startup of unwanted applications with a single mouse click. To give you a hint which programs to disable, Autorunman extracts additional info from executables. You can view Company and Product name, icon etc. for all applications found. In | |||
Updated: 9, 2005 | Rating: 0 | Author: Mykola Rudenko | Size: 615 kb | Shareware Go to category: System Utilities > Automation Tools Similar programs | |||
52. | Boss Key 1.6 (boss-key.com) | ||
Key permits you to hide immediatlly active program window using a hot key! Everybody should have such program for personal security. Imagine, you work with confidential information - maybe, just writing email to your girlfriend, or entering your credit card information, or typing password to login somewhere, or,maybe, working with CIA files. WARNING! Someone comes to | |||
Updated: 9, 2005 | Rating: 16 | Author: VicMan Software | Size: 298 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
53. | Chameleon 2.0 (members.optushome.com.au) | ||
is a secure file encryption application that hides your files from anyone that monitors your emails, personal files even hard disk. More and more SPY software is being used; You need to be sure that files containing sensitive information are kept safe. There is no Electronic Privacy, especially on the Internet. Any want can now with little knowledge of hacking can easily | |||
Updated: 9, 2005 | Rating: 0 | Author: Chris Dimopoulos | Size: 1437 kb | Adware Go to category: System Utilities > Other Similar programs | |||
54. | Cloak 8.0 (insight-concepts.com) | ||
award winning security package designed to safeguard your personal information and documents from prying eyes. Cloak provides different levels of protection by allowing you to encrypt & hide documents within images, compress & encrypt documents, send e-mails that appear completely blank to the | |||
Updated: 3, 2005 | Rating: 0 | Author: Team Concepts | Size: 7661 kb | Demo Go to category: Security & Privacy > Encryption Tools Similar programs | |||
55. | ComputerSafe 3.0.0.5 (com-guard.com) | ||
an internal Safe inside your computer where you can store your vital information and protect yourself against identity theft and data security breaches. ComputerSafe safeguards a virtually unlimited number of files. Its unique combination of file protection, event recording, and notification | |||
Updated: 9, 2005 | Rating: 0 | Author: Dev. Team | Size: 6199 kb | Shareware Go to category: Security & Privacy > Access Control Similar programs | |||
56. | CryptEnCrypt 1.10 (inetprom.com) | ||
forget your password then you will not be able to decrypt data and information will be unrecoverable. CryptEnCrypt allows you to choose several encryption algorithms to protect your data. These are AES, Triple-DES, GOST, RC2, RC4 and Data Protection API based algorithms. Strong encryption ensures that your information would not be easily stolen from your computer by hackers | |||
Updated: 9, 2005 | Rating: 36 | Author: iNetProm SoftLab | Size: 632 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
57. | Dekart Private Disk 2.07 (dekart.com) | ||
disk partitions (drive letters) to protect your confidential information. Private Disk hides your programs and data, and restricts access to them. Dekart Private Disk includes innovative Disk Firewall mechanism - a unique technology that makes your files as safe as they could possibly be. Disk Firewall shields files from viruses and other malware even if your antivirus or | |||
Updated: 2, 2006 | Rating: 0 | Author: Dekart Contact | Size: 1159 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
58. | DriveScrubber 2.0a (iolo.com) | ||
and security of private, personal, confidential, or proprietary information. Once a drive has been wiped with DriveScrubber, no attempts (regardless of their level of sophistication) will be able to recover any data that previously existed thereon. Most people believe that when a drive is formatted, all information within is permanently and irrecoverably gone. The | |||
Updated: 9, 2005 | Rating: 0 | Author: iolo technologies | Size: 729 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
59. | EndTask Pro 2.00.0123 (products.asynchrony.com) | ||
ours won't kill pop-up windows you want. Our unique software hides pop-ups and just shows information about them. With a simple mouse hover you can take a peek and decide whether to show them. Otherwise, pop-ups will be automatically blocked after a few seconds. The technology is invisible to sites that try to detect and foil blockers. Its design isn't based on a specific | |||
Updated: 9, 2005 | Rating: 16 | Author: Osama Abdel-Karim | Size: 1507 kb | Shareware Go to category: System Utilities > Launchers & Task Managers Similar programs | |||
60. | eXtended Task Manager 1.95 (warecase.com) | ||
give fast solutions for sudden problems which may arise in a product's functioning. - Debugging and improving application development. - A rich workstation investigation tool. - White box testing sessions for the QA department. - Investigation tool for integration possibilities. - And much | |||
Updated: 2, 2006 | Rating: 0 | Author: Michael Ritter | Size: 2464 kb | Shareware Go to category: System Utilities > Launchers & Task Managers Similar programs | |||
|
Home > Information hiding software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|