|
||||||
|
||
|
Home > Mute software |
Related keywords: mute sound card |
|
|
71. | TrojanShield 2.20 (trojanshield.com) | ||
Use Trojan Shield to protect yourself from hackers and Trojan viruses. If a hacker tries to break into your computer, Trojan Shield automatically warns you so you can take action against them. You don't need to be a computer expert to use Trojan Shield, Just install it and let it go to work. The trial | |||
Updated: 9, 2005 | Rating: 0 | Author: Lewis Guest | Size: 2072 kb | Shareware Go to category: Security & Privacy > Anti-Virus Tools Similar programs | |||
72. | Hide&Protect 1.016c (softwar-protect.com) | ||
Hide&Protect is built in as invisible protection of any Windows programs against Hackers. Hide&Protect forbid use of debugger, obstruct the full result of a memory dumper witch makes it inoperative. More, Hide&Protect compress and encrypt your application, and has mechanism of monitoring of your application | |||
Updated: 9, 2005 | Rating: 0 | Author: LE CHATELIER Jerome | Size: 1113 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
73. | Hotkey Assistant 1.65 (spellway.com) | ||
to assign separate hotkeys to control volume up, volume down, select/mute for each playback or recording device. All operations that manage power supply and logon are made available from keyboard. Moreover, window manipulations are easier as you can configure additional functions for mouse buttons | |||
Updated: 9, 2005 | Rating: 0 | Author: Spellway Ltd | Size: 903 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
74. | IntraMail 2003.01.20 (homepage.sunrise.ch) | ||
Secure exchange of messages in a local network Intranet (Windows 95, 98, Me, NT, 2000, XP). The mail (or Email) can be written or read from any PC easily. Every mail-account can be protected by a password. The personal messages are always strongly encrypted (with 3 adaptive codes). These short mails are Every mail-account can be protected by a password. Personal messages are strongly encrypted | |||
Updated: 9, 2005 | Rating: 0 | Author: Jean-Maurice Tellenbach | Size: 2918 kb | Shareware Go to category: Communications > E-Mail Clients Similar programs | |||
75. | PC Activity Monitor (PC Acme) 6.4 (keyloggers.com) | ||
PC Activity Monitor (PC Acme) is an ultimate invisible and undetectable easy-to-use monitoring and surveillance tool for both networked and personal PCs. It is professional software that captures all users activity on the PC. All data collected by the monitoring are saved to encrypted log file. It is a | |||
Updated: 9, 2005 | Rating: 0 | Author: Raytown Corporation LLC | Size: 976 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
76. | PC Activity Monitor (PC Acme) 6.4 (keyloggers.com) | ||
PC Activity Monitor (PC Acme) is an ultimate invisible and undetectable easy-to-use monitoring and surveillance tool for both networked and personal PCs. It is professional software that captures all users activity on the PC. All data collected by the monitoring are saved to encrypted log file. It is a | |||
Updated: 9, 2005 | Rating: 0 | Author: Raytown Corporation LLC | Size: 976 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
77. | PrivacyKeyboard 6.1 (anti-keylogger.com) | ||
PrivacyKeyboard for Microsoft Windows 2000/XP is the FIRST product of its kind in the world that can provide every computer with strong protection against ALL types of keylogging programs (keyloggers) and keylogging hardware devices (hardware keyloggers), both known and unknown, currently in use or presently | |||
Updated: 9, 2005 | Rating: 0 | Author: Raytown Corporation LLC | Size: 2909 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
78. | #Remove Access Security 3.0 (e-tech.ca) | ||
'Remove Access Security 3.0' is the ultimate tool concerning security for Access databases. 'Remove Access Security' can reveal passwords, reset passwords and remove user-level security for secured and non-secured database (.MDB) files. This software is simple to use, and can be a real life-saver in a variety | |||
Updated: 9, 2005 | Rating: 102 | Author: Neil Britto | Size: 350 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
79. | Stealth Keyboard Interceptor for Win NT/2000/XP 6.0.1 (keylogger.biz) | ||
Stealth Keyboard Interceptor for Windows NT/2000/ XP (SKIn2000) is a monitoring program which allows to intercept all keystrokes, mouse clicks, captions of active windows, static text and other. It has a unique set of features that makes SKIn2000 the powerful program, suitable for perfect monitoring of user's | |||
Updated: 9, 2005 | Rating: 0 | Author: Raytown Corporation | Size: 467 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
80. | Tweak Manager 2.12 (winguides.com) | ||
WinGuides Tweak Manager enables casual and experienced computer users alike to effortlessly make their computer systems faster, more efficient and more secure! With just a few mouse clicks you can customize virtually every aspect of your computer, including tweaks for popular software like Microsoft Office | |||
Updated: 9, 2005 | Rating: 42 | Author: WinGuides Software | Size: 1721 kb | Shareware Go to category: System Utilities > System Maintenance Similar programs | |||
|
Home > Mute software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|