|
||||||
|
||
|
Home > Security software |
|
|
851. | Invisible CHAOS 5.1 (safechaos.net) | ||
Stego product for Windows with a CHAOS interface and a very large hiding capacity (~100% of carrier file). Includes built-in encryption and ability to hide data within specific sub-areas of the image. Chaos uses the newest chaos logic and stream cipher. It has high speed and allows variable-length keys | |||
Updated: 9, 2005 | Rating: 56 | Size: 350 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
852. | Invisible Secrets Encryption Software 4.4 (neobytesolutions.com) | ||
Invisible Secrets Encryption Software 4 not only encrypts your data and files for safe keeping or for secure transfer across the net, it also hides them in places that on the surface appear totally innocent, such as picture or sound files, or web pages. These types of files are a perfect disguise for | |||
Updated: 2, 2006 | Rating: 0 | Author: NeoByte Solutions | Size: 2740 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
853. | ActMon Password Recovery XP 4.03 (iopus.com) | ||
upgrade to Windows XP they realize that Microsoft increased the security of the password boxes and all old password recovery tools no longer work. However, with the new iOpus Password Recovery XP users can reveal their forgotten passwords on Windows XP and Windows 2000 as easily as they did on Windows 98 or Windows ME. Limitations: This utility works well with most password | |||
Updated: 9, 2005 | Rating: 685 | Author: Team ActMon | Size: 315 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
854. | Jetico Personal Firewall 1.0.1.61 (jetico.com) | ||
that comes in or out of your computer. Using configuration sets for Security Policy you define how your computer is connected to the local network and the whole Internet. Your computer may be completely hidden from any unfriendly attempts to access your hard drive while you are able to access any web | |||
Updated: 9, 2005 | Rating: 42 | Author: Jetico Inc. | Size: 2744 kb | Freeware Go to category: System Utilities > Other Similar programs | |||
855. | JvCrypt 1.0 (vandaveer.com) | ||
JvCrypt is a powerful encryption and compression utility that allows you to create encrypted files and text messages with up to 448-bit encryption using the advanced Blowfish encryption algorithm. Some of JvCrypt's key features include: (1) Ability to protect your files with powerful encryption. With JvCrypt | |||
Updated: 9, 2005 | Rating: 42 | Author: John Vandaveer | Size: 3124 kb | Shareware Go to category: Security & Privacy > Anti-Virus Tools Similar programs | |||
856. | Keep It (a) Secret! 2002B (amateur-invest.com) | ||
Keep all your passwords, userid's, codes, etc. safe and secure in just one place. - In todays world there are so many codes, that you have to remembers - now you just have to remember one, and all the other will be revealed. Use "Keep It (a) Secret". Keep all your passwords, userid's, codes, etc. safe and | |||
Updated: 3, 2005 | Rating: 0 | Author: R. Michael | Size: 390 kb | Freeware Go to category: Home & Hobby > Other Similar programs | |||
857. | KGB Free Key Logger 1.93 (refog.com) | ||
(a.k.a. key logger) that is widely used by both regular users and IT security specialists. The reason for such popularity is that this program does not just record keystrokes; it is capable of recording language specific characters (ex. umlauts), date and time certain window was initiated as well as | |||
Updated: 2, 2006 | Rating: 2482 | Author: ReFog Software | Size: 1477 kb | Freeware Go to category: System Utilities > Other Similar programs | |||
858. | KGB Spy 3.93 (refog.com) | ||
(a.k.a. key logger) that is widely used by both regular users and IT security specialists. The reason for such popularity is that this program does not just record keystrokes; it is capable of recording language specific characters (ex. umlauts), date and time certain window was initiated as well as | |||
Updated: 2, 2006 | Rating: 132 | Author: ReFog Software | Size: 1481 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
859. | Keylogger Hunter 2.1 (styopkin.com) | ||
which would play a role of a “second echelon” for your data security. Utility for blocking the activity of keyboard monitoring programs presumably running on your PC. Neutralizes up to 90% of keyloggers, depriving them of information about the pressed | |||
Updated: 2, 2006 | Rating: 0 | Author: Alexander Styopkin | Size: 611 kb | Shareware Go to category: Network & Internet > Other Similar programs | |||
860. | Keyring 1.0.1 (morello.co.uk) | ||
Morello KeyRing is the easy and secure way to manage all your passwords, PIN's and other account information. These days it is almost impossible to keep track of all the different passwords you use in your day to day life. It is easy to fall into bad habits - using easily guessable passwords, using | |||
Updated: 9, 2005 | Rating: 0 | Author: Tom Duncan | Size: 178 kb | Demo Go to category: System Utilities > Other Similar programs | |||
|
Home > Security software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|