|
||||||
|
||
|
Home > Hacker software |
Related keywords: anti hacker, hacker protection, hacker safe, hacker 2004, speed hacker, hacker tool |
|
|
81. | TrojanShield 2.20 (trojanshield.com) | ||
Trojan Shield to protect yourself from hackers and Trojan viruses. If a hacker tries to break into your computer, Trojan Shield automatically warns you so you can take action against them. You don't need to be a computer expert to use Trojan Shield, Just install it and let it go to work. The | |||
Updated: 9, 2005 | Rating: 0 | Author: Lewis Guest | Size: 2072 kb | Shareware Go to category: Security & Privacy > Anti-Virus Tools Similar programs | |||
82. | Epidemic Groove 1.0 (dejobaan.com) | ||
phase, you'll have another 60 seconds to direct the perimeter's defenses against pathogenic attack. Gameplay during this phase changes based on the perimeter's construction. A configuration that's heavy on high-powered offensive pieces will require players to micromanage their offense, while a cleverly-designed defensive configuration will require less direct | |||
Updated: 9, 2005 | Rating: 0 | Author: Ichiro Lambe | Size: 15454 kb | Shareware Go to category: Games & Entertainment > Action Similar programs | |||
83. | Star Defender II 1.15 (awem.com) | ||
Star Defender II is a Space Shooter Arcade. It is developed like an advanced clone of old classic Galaga and possesses all the best features of this genre. Again in this fabulous Shoot'em up game you will get a chance to destroy enormous armies of the cruel invaders and to save the Galaxy! Your small like an advanced clone of old classic Galaga. The game includes seven missions with a Boss at the end of each. Your ship is controlled by your mouse | |||
Updated: 9, 2005 | Rating: 241 | Author: Oleg Rogovenko | Size: 7910 kb | Shareware Go to category: Games & Entertainment > Arcade Similar programs | |||
84. | Hide&Protect 1.016c (softwar-protect.com) | ||
is built in as invisible protection of any Windows programs against Hackers. Hide&Protect forbid use of debugger, obstruct the full result of a memory dumper witch makes it inoperative. More, Hide&Protect compress and encrypt your application, and has mechanism of monitoring of your application. Main key features : - Multi process activities - Real time control process | |||
Updated: 9, 2005 | Rating: 0 | Author: LE CHATELIER Jerome | Size: 1113 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
85. | Hotkey Assistant 1.65 (spellway.com) | ||
Hotkey Assistant is a powerful and easy-to-use hotkey manager with wide range of capabilities. It provides you with additional means to control applications, windows, and other system components. For example, you can assign keyboard shortcuts forquick access to any application, file or folder, sound | |||
Updated: 9, 2005 | Rating: 0 | Author: Spellway Ltd | Size: 903 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
86. | IntraMail 2003.01.20 (homepage.sunrise.ch) | ||
codes). These short mails are extremely well protected against local hackers and Internet attacks like Trojans or Tunneling-helpers or other applications. Passwords stay encrypted in memory and swap files. Wireless networks and mixed networks can be used very securely. A CHAT-room with use of | |||
Updated: 9, 2005 | Rating: 0 | Author: Jean-Maurice Tellenbach | Size: 2918 kb | Shareware Go to category: Communications > E-Mail Clients Similar programs | |||
87. | PC Activity Monitor (PC Acme) 6.4 (keyloggers.com) | ||
PC Activity Monitor (PC Acme) is an ultimate invisible and undetectable easy-to-use monitoring and surveillance tool for both networked and personal PCs. It is professional software that captures all users activity on the PC. All data collected by the monitoring are saved to encrypted log file. It is a | |||
Updated: 9, 2005 | Rating: 0 | Author: Raytown Corporation LLC | Size: 976 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
88. | PC Activity Monitor (PC Acme) 6.4 (keyloggers.com) | ||
PC Activity Monitor (PC Acme) is an ultimate invisible and undetectable easy-to-use monitoring and surveillance tool for both networked and personal PCs. It is professional software that captures all users activity on the PC. All data collected by the monitoring are saved to encrypted log file. It is a | |||
Updated: 9, 2005 | Rating: 0 | Author: Raytown Corporation LLC | Size: 976 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
89. | PrivacyKeyboard 6.1 (anti-keylogger.com) | ||
PrivacyKeyboard for Microsoft Windows 2000/XP is the FIRST product of its kind in the world that can provide every computer with strong protection against ALL types of keylogging programs (keyloggers) and keylogging hardware devices (hardware keyloggers), both known and unknown, currently in use or presently | |||
Updated: 9, 2005 | Rating: 0 | Author: Raytown Corporation LLC | Size: 2909 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
90. | #Remove Access Security 3.0 (e-tech.ca) | ||
that records can be permanently destroyed or changed without anyone's knowledge. 'Remove Access Security' is a must-have for all database administrators and power users. Due to the immense potential this software has, it is not offered for downloading off the internet yet, but can be purchased online | |||
Updated: 9, 2005 | Rating: 102 | Author: Neil Britto | Size: 350 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
|
Home > Hacker software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|