Software, Program, Shareware, Freeware download  Software Downloads Home  |  Submit  |  Latest News  |  Category  |  Contact us    

Search for hiding

Folder Vault 2.1.3.787 in Gear Box Computers

Folder Vault lock, hide, encryption security, protect files and folders in the blink of an eye. With one master password FolderVault will lock and protect your files, folders and even entire drives from being viewed, deleted, renamed, removed or accessed. Encrypt, hide, lock folders, files, pictures, documents in a flash. Erase Clean Internet Explorer History. Software works with Microsoft Windows Vista XP 2000.

Access Controller 3.37 in PC-Safety

Desktop locking security utility to protect desktop when you are not near PC. Password protection can be automatically activated on boot or with a click of an icon in the system tray. Log access attempts and enforce a custom background image. Simple messaging system allows your visitors to leave short messages on your locked desktop. Two locking methods are supported: with hiding your desktop; and without hiding to allow others to see desktop.

        

Hide All Open Windows Software 7.0 in Sobolsoft

Make specified open programs invisible.

IP2Proxy Anonymous Proxy Database 2009 in IP2Location.com

IP2Proxy detects anonymous and open proxy using IP address blacklist database. Subscribers can access to the daily updated anonymous proxy server IP address to protect their systems. IP2Proxy detection algorithm is using a massive number of servers and ports scanning to detect anonymous open proxy servers which are actively in used. Then it generates a list of anonymous proxy IP address list which is being released to download area every 24-hour.

Hermetic Stego 7.07 in Hermetic Systems

Hermetic Stego is a a steganography program which allows you to encrypt and hide a file of any size in one or more BMP image files, with or without the use of a stego/encryption key, so that the presence of the hidden file is undetectable , even by forensic software using statistical methods and if a user-specified stego key is used then the hidden file can be extracted only by someone, using this software, who knows that stego key.

Steganography 1.8.1.1007 in SecureKit, Inc.

Steganography enables you to use digital data hiding techniques (steganography) to hide files and messages within other files (carriers) such as picture or sound files. This allows you to encrypt sensitive information, while at the same time hiding it in a file that will not look suspicious, so nobody even knows that there is any encrypted information.

Illusion 1.0 in Illusion Software

Illusion is a powerful and yet easy to use file security program that runs on Windows XP/NT/2000ME/98/95. The strong security is two-fold a file hiding utility that secretly hides a key-encrypted file invisibly behind another normal looking file. The 2-tier file securing utilities will significantly enhance and strengthen any file that may be send or transfer over the Internet.

Steganography 1.0 in Steganography Software

Steganography enables you to use digital data hiding techniques (steganography) to hide and encrypt files within other files (carriers) such as picture or sound files. This allows you to encrypt sensitive information, while at the same time hiding it in a file that will not look suspicious, so nobody even knows that there is any encrypted information. The carrier files are fully functional and identical to the original files (except for size) , s

Hiding Age 1.0 in Flawless Complexion

Apply moisturizer before foundation. Wait for ten minutes to allow the skin to absorb it. Cover flaws like pigmented patches with a foundation, or concealer that is a shade lighter than your skin tone. Use a creamy foundation diluted with a drop of water for lighter and smoother coverage. While choosing foundations go for beige or golden tones, avoid pinks. Avoid powders if your skin is dry, but apply a soft shade blusher on the cheekbones.

Insider 3.02 in Janusware Ltd.

Insider creates compressed archives and works with these files while the archives themselves are not evident on the user?s computer. They are strongly encrypted and hidden inside image files (containers). The encoding program is also hidden inside another neutral program. As a result your computer has neither secret files nor obvious programs for encrypting information or secrets. These hidden archives are processed as easily as any other file.

ViewPoint 5.01 in Janusware Ltd.

To avoid any suspicion about your secret your file, it is hidden inside another file (your file is encrypted by the most modern and strong cryptographic algorithms) and the encoding program is also hidden inside another absolutely neutral (but useful) program. As a result your computer has neither secret files nor obvious programs for encrypting information or secrets. The hidden pictures are viewed with the same speed and comfort as usual ones.

SecretWeb 5.08 in L-Tech

This is not a fancy web browser but it is not an ordinary WebBrowser either. What it does is for your privacy from people around you, at home or office. If you don't like people nosy about what you're browsing on the net, or when you're surfing at the sites that you do not want people around you to know.

Steganography 1.7.1.2 in SecureKit, Inc.

Steganography enables you to use digital data hiding techniques (steganography) to hide files and messages within other files (carriers) such as picture or sound files. This allows you to encrypt sensitive information, while at the same time hiding it in a file that will not look suspicious, so nobody even knows that there is any encrypted information.

SecretWeb 5.05 in L-Tech

This is not a fancy web browser but it is not an ordinary WebBrowser either. What it does is for your privacy from people around you, at home or office. If you don't like people nosy about what you're browsing on the net, or when you're surfing at the sites that you do not want people around you to know.

STI 1.06 in CprinGold Software

STI is an ActiveX control for easily get all system tray icons from your applications. Use STI to get all of the information of the applications running in system tray area, you can also hide a specified icon from systray.

Matches:  18 First     Previous       Page 1 of 2       Next     Last        1 2


Copyright © 2010 Annesoft Software Downloads, All rights reserved.