|
||||||
|
||
|
Home > Hide files software |
Related keywords: files, hide, Files, hide folder, hide folders, PDF files, compare files, protect files, duplicate files, delete files |
|
|
71. | HiProxy 2.3 (hiproxy.com) | ||
support for IE,Firefox,Opera,Mozilla * import proxy lists from text files or web pages automatically * verify HTTP/HTTPS/SOCKS/tunnel proxy servers worldwide for anonymity and speed * build and maintain proxy server lists (sorting,coloring,country,comments,etc.) * user can define an exclusion list of | |||
Updated: 9, 2005 | Rating: 105 | Author: Hiproxy Team | Size: 3147 kb | Shareware Go to category: Servers > Other Server Applications Similar programs | |||
72. | hopster 1.0.16 (hopster.com) | ||
firewalls to chat with your friends and download files. Works with Kazaa, iMesh, Messenger, ICQ and any other application that supports the SOCKS protocol. No configuration hassles, no techie-talk or geek-speak. Not only does hopster configure itself, it even knows how to configure Kazaa, MSN Messenger and many others - so you don't need to. Once installed, hopster operates | |||
Updated: 3, 2005 | Rating: 23123 | Author: Andreas Pizsa | Size: 1100 kb | Freeware Go to category: Network & Internet > Other Similar programs | |||
73. | HTML Guardian 7.2.9 (protware.com) | ||
HTML, SHTML, JavaScript, VBScript, PHP and ASP files. Hide HTML source code from web site thieves. HTML Guardian is a solution for total Web site protection -it will make impossible stealing and re-using your source code in other websites.. Image protection add-on [Image Guardian] is especially designed to protect images on your website. Additional protection options | |||
Updated: 2, 2006 | Rating: 0 | Author: Ivan Ned | Size: 7563 kb | Demo Go to category: Web Development > HTML Tools Similar programs | |||
74. | HTML Password Encryption 4.20.02 (htmlguardian.org) | ||
password protection, encrypt HTML files with 448 bit keys. Hide html source code. Image protection - protect images on your web site. Protect web page or entire website with a password. Encryption algorithm used is much stronger than the 128 bit cipher used in todays browsers and considered secure enough for online credit card payments. Option to enter the password only once | |||
Updated: 9, 2005 | Rating: 0 | Author: Roger Crain | Size: 3348 kb | Demo Go to category: Servers > Other Server Applications Similar programs | |||
75. | IEMonitor 2.4 (quicksitebuilder.cnet.com) | ||
* Delete IE Tracks:History, Cookies, Temporary Internet Files and Typed URLs * Monitor IE Browser:List all the browser window's Title, URL, Status and Duration * Click to activate browser window: In the window list, you can click one item to activate this window to browse * Right-Click to close browser window * Shortcut to Web sites: You can add your | |||
Updated: 3, 2005 | Rating: 0 | Author: Zhang Ming | Size: 1388 kb | Shareware Go to category: Network & Internet > Other Similar programs | |||
76. | IMSpeak! 3.8 (eastbaytech.com) | ||
text from Clipboard (or any copy command). Speaks text documents (files). Optional display will display text as it speaks to you. (Adjustable font/size for the vision impaired). Speech translation dictionaries allow you to have IM Speak! translate incoming text to different words. Speaks time | |||
Updated: 9, 2005 | Rating: 0 | Author: East Bay Technologies Inc. East Bay Technologies Inc. | Size: 5110 kb | Shareware Go to category: Communications > Chat & Instant Messaging Similar programs | |||
77. | Internet Secure Tunneling 2.0.0.228 (han-soft.biz) | ||
employees to access their email, company intraweb pages and shared files securely by even when working from home or on the road. Tunneling makes it possible to access email from any type of Internet service (whether accessed via modem, a DSL line or a cable connection, or a hotel Internet service). As long as the user has an IP connection to the Internet she can get her mail and | |||
Updated: 2, 2006 | Rating: 0 | Author: JING YU HAN | Size: 927 kb | Shareware Go to category: Network & Internet > Other Similar programs | |||
78. | Internet Timer 3 3.0.348 (internet-timer.co.uk) | ||
and hidden states. Strong security features such as task list hiding, process protection, directory protection, DOS program hiding, application restrictions (based on path or titlebar, supporting wildcards) guarantee the integrity of iT3 tracked data. Network features include real-time TCP/IP transmission of log data between iT3 clients/servers, automatic log data emailing | |||
Updated: 9, 2005 | Rating: 39 | Author: Peter Chamberlin | Size: 4332 kb | Shareware Go to category: Network & Internet > Other Similar programs | |||
79. | IPalt 2.0 LITE/PRO 2.0.0.5 (ffh-lab.com) | ||
vice-versa. In intranet, member area or extranet, it makes sense to hide the client's IP in different log files at server side, client side or on the route (ISP, Gateway, etc), whatever be the protocol in use (HTTP, FTP, NNTP, Telnet, etc.). For this, use of a dotless IP makes things less directly readable than using a dotted one or an explicit domain name. E.G | |||
Updated: 6, 2005 | Rating: 0 | Author: Eric LEQUIEN | Size: 193 kb | Commercial Go to category: Network & Internet > Other Similar programs | |||
80. | MailSend 7.30 (radiks.net) | ||
including return-receipt processing, stdin filtering, console window hiding, custom SMTP headers, non-standard SMTP port usage, HTML files, and pager support. Options can be specified in external files to save command-line space. MailSend is a Win32 command-line SMTP e-mail sender supporting attachments and carbon-copy lists. Many other options are | |||
Updated: 9, 2005 | Rating: 0 | Author: Jim Lawless | Size: 142 kb | Shareware Go to category: Communications > E-Mail Clients Similar programs | |||
|
Home > Hide files software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|