|
||||||
|
||
|
Home > Private folder software |
Related keywords: folder, private, Folder, hide folder, lock folder, protect folder, folder guard, password protect folder, security folder, folder size |
|
|
601. | Microangelo 5.58 (microangelo.us) | ||
icon images in any type of executable file. - Browse drives and folders. Locate and access icons in any file type. Try the free, completely functional evaluation. See for yourself why Microangelo is the most popular Windows icon and cursor software in the world. The "Grand-daddy" of icon software! This power-packed suite of utilities continues to offer the finest and widest array of | |||
Updated: 9, 2005 | Rating: 169 | Author: Len Gray | Size: 3450 kb | Shareware Go to category: Graphic Apps > Icon Tools Similar programs | |||
602. | Mutilate File Wiper 2.92 (home.att.net) | ||
level with up to 297 overwrite passes. Mutilate supports complete folder deletions including subfolders. With Mutilate's disk free space wiper, you can even use Mutilate to destroy previously deleted files on your hard drive. And, you can store up to thirteen folders in Power Mutilator for quick access to files or folders you target routinely. Mutilate File Wiper is an | |||
Updated: 9, 2005 | Rating: 0 | Author: Craig Christensen | Size: 824 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
603. | PC Activity Monitor (PC Acme) 6.4 (keyloggers.com) | ||
installation/uninstallation - Putting programs in Startup folder - Visiting web sites. Log files are converted to HTML format for more convenient viewing in browser (Internet Explorer 4.0 or higher is recommended). PC Activity Monitor (PC Acme) is an ultimate invisible and undetectable easy-to-use monitoring and surveillance tool for both networked and personal PCs. It is | |||
Updated: 9, 2005 | Rating: 0 | Author: Raytown Corporation LLC | Size: 976 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
604. | PC Activity Monitor (PC Acme) 6.4 (keyloggers.com) | ||
installation/uninstallation - Putting programs in Startup folder - Visiting web sites. Log files are converted to HTML format for more convenient viewing in browser (Internet Explorer 4.0 or higher is recommended). PC Activity Monitor (PC Acme) is an ultimate invisible and undetectable easy-to-use monitoring and surveillance tool for both networked and personal PCs. It is | |||
Updated: 9, 2005 | Rating: 0 | Author: Raytown Corporation LLC | Size: 976 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
605. | PC Activity Monitor Net (PC Acme Net) 6.4.1 (keyloggers.com) | ||
installation/uninstallation - Putting programs in Startup folder - Visiting web sites. Log files are converted to HTML format for more convenient viewing in browser (Internet Explorer 4.0 or higher is recommended). Log file can be optionally sent via e-mail to specified address (or saved to specified shared resource in LAN environment) for further inspection and analysis | |||
Updated: 3, 2006 | Rating: 0 | Author: Raytown Corporation LLC | Size: 980 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
606. | PC Activity Monitor Pro (PC Acme Pro) 6.4.1 (keyloggers.com) | ||
installation/uninstallation - Putting programs in Startup folder - Visiting web sites. Log files are converted to HTML format for more convenient viewing in browser (Internet Explorer 4.0 or higher is recommended). Log file can be optionally sent via e-mail to specified address (or saved to specified shared resource in LAN environment) for further inspection and analysis | |||
Updated: 3, 2006 | Rating: 0 | Author: Raytown Corporation | Size: 1192 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
607. | PC Activity Monitor Pro (PC Acme Pro) 6.4.1 (softsecurity.com) | ||
installation/uninstallation - Putting programs in Startup folder - Visiting web sites. Log files are converted to HTML format for more convenient viewing in browser (Internet Explorer 4.0 or higher is recommended). Log file can be optionally sent via e-mail to specified address (or saved to specified shared resource in LAN environment) for further inspection and analysis | |||
Updated: 3, 2006 | Rating: 0 | Author: Raytown Corporation | Size: 1192 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
608. | 2Bitmap 5.2 (fcoder.net) | ||
2Bitmap is the best solution. You need only to point the program to folder with files you want to convert and specify folder for storing converted bitmaps. The program will scan subfolders for image files, create report and delete input files - if you want it to. 2Bitmap is not only bitmap | |||
Updated: 9, 2005 | Rating: 0 | Author: Laisan Shafikova | Size: 3219 kb | Demo Go to category: Graphic Apps > CAD Similar programs | |||
609. | PowerGREP 3.2.2 (jgsoft.com) | ||
find information in files and folders across your computer or network, even if you do not know in advance exactly what you are looking for. PowerGREP's rich Perl-compatible regular expression support allows you to search for virtually anything by specifying the form of what you want, and let PowerGREP find the actual text matching that form. PowerGREP's documentation includes a | |||
Updated: 2, 2006 | Rating: 16 | Author: Jan Goyvaerts | Size: 3705 kb | Shareware Go to category: Network & Internet > Search/Lookup Tools Similar programs | |||
610. | PowerKey 2.11.01.22 (elcor.net) | ||
you to download and try it! Using PowerKey you're keeping your private information in safety forcing crackers to surrender. PowerKey is an advanced encryption toolkit with many unique features which you won't come across in other products of such a kind available online. It allows you to perform block encryption of files and folders, wipe and | |||
Updated: 2, 2006 | Rating: 0 | Author: Nick Nifontov | Size: 1029 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
|
Home > Private folder software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|