|
||||||
|
||
|
Home > Invisible software |
Related keywords: invisible keylogger, invisible surf, invisible key logger, invisible keylogger 97, make folders invisible, invisible secret, invisible and undetectable |
|
|
71. | WinTasks 5 Professional 5.03 (lidownloads.com) | ||
number of tasks, in the background and behind the scenes. These "invisible" tasks or processes often reduce the processing power of your computer consuming large amounts of memory. Booting time becomes longer and performance degrades to the point where your computer becomes extremely sluggish. Other | |||
Updated: 9, 2005 | Rating: 42 | Author: Johan Malmberg | Size: 3697 kb | Demo Go to category: Security & Privacy > Anti-Spam & Anti-Spy Tools Similar programs | |||
72. | SpyCapture 1.4.5 (tsm-soft.com) | ||
detected or terminate (even by pressing Ctrl-Alt-Delete), it's invisible! Only you will know how to terminate it, if you want. SpyCapture is an excellent PC Surveillance Software. Features: 1. High Invisibility, Password Protected, Encryption enabled and File Manager. 2. Capture all the keystrokes in all of the Windows environment, as long as the user use the keyboard, it will | |||
Updated: 9, 2005 | Rating: 0 | Author: Tan Sun Min | Size: 428 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
73. | SpyMyPC 2.0 (benutec.com) | ||
passwords, chat conversations. Install SpyMyPC, set options "Run in Invisible Mode", so that it makes itself invisible to anyone. Shortcut keys helps you fast access to Log View and Unhide Mode. Typical uses for SpyMyPC : Monitor Your Children's Activity ( Statistics : With an estimated 24 million children now online, one out of five have been solicited for sex in the last | |||
Updated: 9, 2005 | Rating: 0 | Author: Benutec Software | Size: 580 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
74. | Startup Control Center 2.11 (sureshotsoftware.com) | ||
interface. Find and remove any installed spyware, keylogger or other invisible monitoring applications. Startup Control Center allows you to add, edit, disable, move or delete startup entries. You can also change the loading order of the startup entries. Startup Control Center lets you control which | |||
Updated: 9, 2005 | Rating: 16 | Author: Jon Kagstrom | Size: 800 kb | Freeware Go to category: System Utilities > Other Similar programs | |||
75. | Surf Spy 2.10 (bysoft.se) | ||
Spy is an invisible tool that monitors the Internet activity on your computer. It captures the link (URL) of every visited web site and stores it to a password protected encrypted file. For remote surveillance of networked PCs the log file can be sent secretly with email to a specified receiver. Ideal for parents who want to monitor their children while they are away. In the stealth | |||
Updated: 9, 2005 | Rating: 0 | Author: Jon Kagstrom | Size: 1100 kb | Demo Go to category: Servers > Other Server Applications Similar programs | |||
76. | SC-KeyLog Free 2.25 (soft-central.net) | ||
is a powerful, invisible keylogger that captures all users activity and saves it to an encrypted logfile. The software logs all typed keystrokes, button mouse-clicks, window titles, the date and time of entered characters/mouse-clicks, system information and logged on usernames in stealth. An optional mailing feature allows you to automatically send the logfile to a specified | |||
Updated: 9, 2005 | Rating: 7925 | Author: Alexander van Trijffel | Size: 407 kb | Freeware Go to category: System Utilities > Other Similar programs | |||
77. | Screen Privacy 1.2 (pictures-soft.com) | ||
and system tray, stop WinAMP and more. Using of this program is invisible for another persons. You can select the list of private applications, list of public application and black list. Besides, you can terminate all black-list-application by single key stroke. You can customize your secret hot keys and work with your lists using drag and drop interface. This program is very easy to | |||
Updated: 9, 2005 | Rating: 0 | Author: Alex Shubin | Size: 851 kb | Shareware Go to category: Desktop > Other Similar programs | |||
78. | Password Officer DeLuxe 5.0 (compelson.com) | ||
-Trojan horse protection -dictionary attack protection -invisible keybord inputs -smart-card support Ultimate Web Engine The new Password Officer has a powerful engine with web-content scanner. It starts Internet Explorer, fills in the URL, waits until the page is loaded, fills in all fields, and finally clicks the proper button. -web-content scanner -automatic | |||
Updated: 9, 2005 | Rating: 0 | Author: COMPELSON Laboratories | Size: 934 kb | Commercial Go to category: System Utilities > Other Similar programs | |||
79. | PC Activity Monitor Lite 7.3 (spy-soft.biz) | ||
viewing in browser. PC Activity Monitor Lite is an ultimate invisible and undetectable easy-to-use monitoring and surveillance tool for personal PCs. The monitoring program works in the background, transparent for the user, on the level of OS kernel | |||
Updated: 9, 2005 | Rating: 139 | Author: Dmitry Bulat | Size: 2888 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
80. | Perfect Privacy 2.0 (blumentals.net) | ||
to execute automatically * Protect your privacy silently using invisible mode * Eliminate custom files and registry traces * Prevent deleted files from being recovered * Remove temporary files and junk items * Improve system performance and free up hard drive space Protect your privacy by eliminating your Internet and offline computer usage traces, such as history lists | |||
Updated: 9, 2005 | Rating: 16 | Author: Karlis Blumentals | Size: 955 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
|
Home > Invisible software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|