Software Downloads | Home | Submit | Latest News | Category | Contact us |
Search for stealth BitCrypt 3.1 in Moshe Szweizer BitCrypt is a state of the art text to image encryption allowing for storage of text within an image. It is designed for persons who wish to store or communicate information in an invisible manner. The main strength of the program is the ability to hide the information from any unauthorized observer. The encryption is not visible, and the encoded text does not seem to be present in a seemingly unchanged image.SystemSleuth 1.0 in SystemSleuth SystemSleuth is a feature rich computer surveillance program that secretly monitors all activity on your computer. You can view the encrypted logs locally or have them sent to any email account. SystemSleuth allows you to view emails, passwords, instant messages, webcam images, printer activity, visited websites, microphone sounds, keyboard activity, and much more. Find out what your loved ones do on the computer when you are not around.Invisible Keylogger 3.7 in Invisible Keylogger, LLC. Do you need to find out what someone is doing online? Is your spouse, child, or someone you know using your pc and hiding secrets from you? If so Invisble Keylogger is the perfect solution for anyone that needs this information quickly and secretly. Now you can use the same spy software professionals use to find out the information you need in total privacy. Keylogger offers powerful features at an affordable price!Lugaru v1.03 in Wolfire Software In Lugaru, you control Turner, an anthropomorphic rebel bunny rabbit with impressive combat skills. In his quest to find those responsible for slaughtering his village, he uncovers a far-reaching conspiracy involving the corrupt leaders of the Rabbit Republic and the starving wolves from a nearby den. Turner takes it upon himself to fight against their plot and save his fellow rabbits from slavery!Save Keys Undetectable 6.2 in Alpine Snow Save Keys Undetectable 6.2 is an invisible key recorder that secretly logs every key typed into the keyboard. Other information such as window titles, program names and paths, and clipboard text can also be recorded. This new version has improved encryption for faster encoding/decoding of the log file. At the time of release on the first of January, 2005, no known anti-spyware or anti-keylogger was able to detect Save Keys Undetectable 6.2.NetChatSpy 2.5.0 in Computer Home Help Remotely monitor Instant Messenger chat sessions in complete anonymity. Absolutely no software needs to be installed on computers being monitored, as long as all computers are on the same local area network.NetChatSpy 2.5.0 in Computer Home Help Remotely monitor Instant Messenger chat sessions in complete anonymity. Absolutely no software needs to be installed on computers being monitored, as long as all computers are on the same local area network.Sentinel Professional 4.0 in Horizon Software Co. Complete System Monitoring: Sentinel Takeover all the control of Windows based Computers Sentinel captures screenshots in scheduled time and stores them in a secure area for your later review captures screenshots System Watch Files and Folders Monitoring Software Record Web Site Record Keyboard Record Chat Record Reporting and Exporting Reports Exporting reports into xml, html, xls formats provides you analyzing .Stealth Web Page Recorder 1.1 in BlazingTools Software Stealth Web Page Recorder is a simple spy software utility for web page recording. This program will be useful if you want to record e-mail messages of any Web Mail service. Also it can record contents of password protected pages and web pages which use secure HTTPS connection. The new version also captures logins and passwords for the sites. It is absolutely undetectable after the installation.Spy4PC 3.0.0 in Spy4PC software Spy4PC is the most affordable and powerful spy software for windows, monitor all computer activity and Internet use. It can automatically track visited website addresses, and log work time on each application. * Application usage recording * Keystroke recording * Screenshot recording * Email recording * Chat/Instant Messaging recording * Website Recording * Totally Stealth in windowsSC-KeyLog Free 2.25 in Soft-Central SC-KeyLog is a powerful, invisible keylogger that captures all users activity and saves it to an encrypted logfile. The software logs all typed keystrokes, button mouse-clicks, window titles, the date and time of entered characters/mouse-clicks, system information and logged on usernames in stealth. It has mailing capabilities and custom keylogger engines (of only 33 KB!) can be deployed on remote systems with ease.Stealth Storage 1.2 in SoftCab Inc Stealth Storage is a small and powerful file encryption tool. It encrypts files on-the-fly using well-known strong ciphers like BLOWFISH, RIJNDAEL etc. It is totaly invisible when installed. Nobody will even notice there are encrypted files on a computer.Stealth Files 4.0 in Froebis Interactive Stealth Files hides any type of file in almost any other type of file. This is called steganography. This is a way of encrypting data so that it is hard to find. You can not decrypt something unless you know what to decrypt. Using steganography, Stealth Files compresses, encrypts, and then hides any type of file inside many other types of files...Win-Spy Software 8.0 8.0 in BC COMPUTING Win-Spy is a complete monitoring system that captures anything the user sees or types on the keyboard. Win-Spy operates in stealth mode. A special hot key and login is necessary to invoke the program. Users are unable to terminate or uninstall the program. Win-Spy comes with a screen-capture utility with idle detect, a key recorder, an auto e-mailer, a keyword alerter by e-mail, a folder hider, monitoring across networks.Stealth Privacy Protector 1.2 in Array Software Systems Pvt Ltd. Stealth Privacy Protector is the most reliable and effective evidence eliminator and internet washer available. Clean out all your secrets/files of your browser's cache, cookies, sites visited, urls visited, images viewed, media files played and forms files. System and application software also store information like applications used, files opened, games played, and more. Stealth Privacy Protector can erase all this information easily.
|