|
||||||
|
||
|
Home > Stealth software |
Related keywords: stealth mode, stealth browser, Stealth Fighters |
|
|
61. | Ultimate Spy Personal 1.5 (raheel.yi.org) | ||
all the keystrokes, with advanced filter settings. Runs in super stealth mode. Auto starts with windows. Not even visible in Run registry. Includes Log Analyser to view log. Home Edition is also available which is best suited for parents to monitor whom their children talking to & what they're | |||
Updated: 9, 2005 | Rating: 0 | Author: Raheel Hameed | Size: 1156 kb | Freeware Go to category: System Utilities > Other Similar programs | |||
62. | Universal Shield 4.0 (everstrike.com) | ||
folders without actually running the program. Or, run the program in Stealth mode so that other users do not know about it. Set trusted processes, which will not be under protection; for example, some program will work with the hidden data, but users are unable to access that data. The new Universal | |||
Updated: 9, 2005 | Rating: 212 | Author: Richards Davids | Size: 1759 kb | Shareware Go to category: Security & Privacy > Access Control Similar programs | |||
63. | UserMonitor for Classroom or Computer Lab 1.7 (neuber.com) | ||
Ideal for teachers, instructors, or administrators. Monitoring: UserMonitor shows you what other network computer users see on their display screen. All programs being used are also listed (with path detail) in real time. A history and warning function is included. Demonstrating: UserMonitor is brilliant for | |||
Updated: 9, 2005 | Rating: 39 | Author: Alexander Neuber | Size: 1881 kb | Shareware Go to category: Network & Internet > Network Monitoring Similar programs | |||
64. | SC-KeyLog Free 2.25 (soft-central.net) | ||
system information and logged on usernames in stealth. An optional mailing feature allows you to automatically send the logfile to a specified email address on a user defined interval. Use this tool to: Find out what is happening on your computer while you are away, to maintain a backup of your typed data automatically, to spy on others or use it to monitor your | |||
Updated: 9, 2005 | Rating: 7925 | Author: Alexander van Trijffel | Size: 407 kb | Freeware Go to category: System Utilities > Other Similar programs | |||
65. | Security Folder 2.0 (everstrike.com) | ||
power of industry-standard strong encryption algorithms with unique stealth technologies to protect your data from both unauthorized access and modification/destruction by malicious programs. Unlike other security software, available on the market, Security Folder was designed with user convenience in mind, which ensures even the newbie computer users can learn operating it within | |||
Updated: 9, 2005 | Rating: 0 | Author: Richard Davids | Size: 534 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
66. | Security Task Manager 1.6f (neuber.com) | ||
viewer recognizes virtual driver software, services, BHOs and stealth processes hidden from the Windows Task Manager. You can choose to terminate any process, delete it, or alternately quarantine it, which will disable it from running again without actually deleting it. Additional information is provided via context sensitive Google results, and you can customize risk ratings by | |||
Updated: 9, 2005 | Rating: 101 | Author: Alexander Neuber | Size: 1467 kb | Shareware Go to category: Security & Privacy > Anti-Virus Tools Similar programs | |||
67. | PAL PC Tracker Lite 1.01 (palsol.com) | ||
your computer and have an Internet connection, PC Tracker sends a stealth e-mail message containing its exact location to a pre-determined e-mail address set by the customer. Additionally, it will post a second message on to our servers containing the exact location for extra protection in the case you are unable to check your email. PAL PC Tracker runs hidden in your system and is | |||
Updated: 9, 2005 | Rating: 0 | Author: Christian Champion | Size: 1200 kb | Freeware Go to category: System Utilities > Other Similar programs | |||
68. | PalmTree 3.3 (clickok.co.uk) | ||
Encrypt files with BLOWFISH, CryptAPI. Hide messages in photograph. Stealth email. Encrypt password files and bank. Prevent unauthorised access by other computer users, friends, family,co-workers. Ban intruders. Guard against access without permission. No encryption. Full version has enhanced security | |||
Updated: 9, 2005 | Rating: 0 | Author: Kal Bashir | Size: 1700 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
69. | PC On/Off Time tracking 2.0 (neuber.com) | ||
PC On/Off Time graphically shows the working time on your computer of the last 3 weeks without logging your computer before. PC On/Off Time works with Windows NT,2000,XP. The software doesn't record activities, doesn't require runtimes, doesn't require installation, doesn't write to the registry, doesn't | |||
Updated: 9, 2005 | Rating: 0 | Author: Alexander Neuber | Size: 277 kb | Freeware Go to category: Network & Internet > Timers & Time Synch Similar programs | |||
70. | PC PhoneHome 3.0 (pcphonehome.com) | ||
PhoneHome is a stealth computer security program that tracks the location of your computer every time it makes an Internet connection. When you boot your computer and go online, PC PhoneHome sends a stealth e-mail message containing its exact location to a pre-determined e-mail address set by | |||
Updated: 9, 2005 | Rating: 0 | Author: Martin Moran | Size: 1602 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
|
Home > Stealth software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|