|
||||||
|
||
|
Home > Hidden password software |
Related keywords: password, Password, password manager, hidden, password protection, password recovery, password generator, password keeper, lost password, password protect |
|
|
71. | Access Denied 3.40 (johnru.com) | ||
program requests username and password or simple password upon boot-up and locks desktop by one mouse click. It can't be bypassed on Windows 95/98/ME. All unwanted people are kept out to your PC. Very flexible use: multi-user support(up to 450 users), password encryption, integration with your favorite screensaver, color's highlight log files with | |||
Updated: 9, 2005 | Rating: 58 | Author: Ivan Mayrakov | Size: 536 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
72. | Advanced Hide Folders 4.6 (hide-folders.biz) | ||
you to completely hide folders and files on your computer. The hidden files cannot be accessed unless the folders are unlocked with a password from within the program. You can simple drag and drop folders from Windows or add files by mask (e.g hide all .jpg files). In addition, as an added security measure, you can also lock the hidden files. Advanced Hide Folders also | |||
Updated: 9, 2005 | Rating: 81 | Author: Otto Schulz | Size: 258 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
73. | Advanced Keylogger 1.7 (eltima.com) | ||
the clipboard. Whenever whereever whatever is typed - it cannot be hidden from Advanced Keylogger! Advanced Keylogger is a powerful invisible surveillance tool that records every keystroke to encrypted user-friendly easy-to-understand logs. Logs can also be automatically sent to any number of specified | |||
Updated: 9, 2005 | Rating: 242 | Author: SoftInfinity | Size: 1146 kb | Shareware Go to category: Security & Privacy > Password Managers Similar programs | |||
74. | DB query 1.3 (svap.pp.ru) | ||
and remote server. Db Query client is installed on the end user's computer. It is a simple and not demanding to resource program (thin client), running under Windows systems, has a friendly interface and allows to make database search requests quite simply. For searching in databases the access schemes are used. These schemes are clear for perception information model of the related | |||
Updated: 9, 2005 | Rating: 0 | Author: Sergey Apollonov | Size: 6011 kb | Shareware Go to category: Business > Databases & Tools Similar programs | |||
75. | TZ Privacy Guard 3.1.0.0 (trackzapper.com) | ||
History, favorite's folders and private information: passwords, credit card numbers, social security number etc. ; can expose a lot of your private information that you would like to protect. Also, Personal interests sites, banking information, stocks you monitor on line bidding, and aucations you are tracking, your surfing habits both on and off the web. this information can | |||
Updated: 9, 2005 | Rating: 0 | Author: Ahmad Ayman | Size: 4266 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
76. | WebSurveyor 4.117 (websurveyor.com) | ||
data piping, data validation, required responses, matrix formats, hidden data fields and inserting HTML snippets. Once created, publish your survey to WebSurveyor's secure hosting service with the press of one button. Use WebSurveyor's Email Notification Manager to announce your | |||
Updated: 9, 2005 | Rating: 16 | Author: John Smith | Size: 4813 kb | Commercial Go to category: Web Development > HTML Tools Similar programs | |||
77. | Site Entry Professional 1.17 (webgenie.com) | ||
to your customers? Using Site*Entry you can issue each customer with password access to your newsletters. Its easy to use and professional. Financial service companies can use Site*Entry to manage newsletter access for their clients. > Delivering valuable content to consumers and business customers is | |||
Updated: 9, 2005 | Rating: 0 | Author: Arapaut Sivaprasad | Size: 2222 kb | Commercial Go to category: Network & Internet > Other Similar programs | |||
78. | Parent Tools for AIM 2.0.1 (parent-tools.com) | ||
from any screen name on your computer. Saved conversations are hidden, compressed, and encrypted for maximum security. Limit online time to a certain number of hours per day: Set online time limits for all screen names or create different limits for each different screen name on your computer. Create an online schedule to limit times per day online: Create schedules where | |||
Updated: 9, 2005 | Rating: 0 | Author: Joe Jordan | Size: 3760 kb | Shareware Go to category: Communications > Chat & Instant Messaging Similar programs | |||
79. | CovertMail 1.5.380 (lastbit.com) | ||
two identities, a usual one and a secret one -- the latter totally hidden from anyone. Hide your mail from prying eyes using CovertMail! CovertMail for Outlook Express helps keep your emails private. It provides complete privacy of your message store. CovertMail hides the identity you specify (it won't be visible through Outlook Express anymore) and encrypts message | |||
Updated: 9, 2005 | Rating: 0 | Author: Vitas Ramanchauskas | Size: 176 kb | Shareware Go to category: Communications > E-Mail Clients Similar programs | |||
80. | 4t Explorer Sweeper 2.0 (4t-niagara.com) | ||
temporary Internet files, index files, recently accessed files, URL's, search terms, passwords, etc. It also speeds up PC performance, increases free disks space and improves security by clearing the content of various Explorer and Netscape folders. In its "System Tray" mode it runs in system Tray as icons and helps to free up space on your taskbar. In "Invisible" mode | |||
Updated: 9, 2005 | Rating: 0 | Author: 4t Niagara Software | Size: 943 kb | Shareware Go to category: Network & Internet > Other Similar programs | |||
|
Home > Hidden password software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|