Software Listing: Invisible

Invisible Secrets 4 not only encrypts your data and files for safe keeping or for secure transfer across the net, it also hides them in places that on the surface appear totally innocent, such as picture or sound files, or web pages. These types of files are a perfect disguise for sensitive information. Nobody, not even your wife, boss, or a hacker would realize that your important papers or letters are stored in your last holiday pictures, or that you use your personal web page to exchange messages or secret documents. Invisible Secrets 4 features: strong encryption algorithms; a password management solution that stores all your passwords securely and helps you create secure passwords; a shredder that helps you destroy beyond recovery files, folders and internet traces; a locker that allows you to password protect certain...

  • Platform: Win2000, WinOther

Invisible Secrets Encryption Software 4 not only encrypts your data and files for safe keeping or for secure transfer across the net, it also hides them in places that on the surface appear totally innocent, such as picture or sound files, or web pages. These types of files are a perfect disguise for sensitive information. Nobody, not even your wife, boss, or a hacker would realize that your important papers or letters are stored in your last holiday pictures, or that you use your personal web page to exchange messages or secret documents. Invisible Secrets Encryption Software 4 features: strong encryption algorithms; steganography and a library of favorite carriers locations; a password management solution that stores all your passwords securely and helps you create secure passwords, faster access to your passwords by accessing the...

  • Platform: Win2000, WinOther

Do you ever use your computer at work for playing games and then try to close it quickly every time someone approaches? Has your boss caught you looking at adult pictures? Are you afraid to enter certain websites while at work? Do you want to prevent nosy co-workers from peeking at what you are doing on your computer? In these cases and many others - Boss Invisible is what you need! Why close the game or browser window when someone comes near your PC? Simply move your mouse pointer to the bottom-right corner of the screen to HIDE the window! Move the mouse back to that corner again to bring your window back into view!.

  • Platform: Win2000, Windows Server, WinOther

Invisible Folders has the ability to make any file or folder invisible to anyone using your PC even on a network. As far as the user is concerned they don't exist. Use Invisible Folders to hide your sensitive files and folders from prying eyes. Invisible Folders runs in complete stealth so others wont know it exists..

  • Platform: Win2000, Windows Server, WinOther

Invisible Browsing suits both less experienced users and advanced users, through his manual or automatic mode. The manual mode allows you make all the settings, to choose the proxy and test it, while in the automatic mode all you have to do is a simple click on the button and you will surf anonymously. Invisible Browsing will hide, change or mask your IP address, letting you surf anonymously preventing your IP or other information to be collected without your permission. Invisible Browsing allows you to change your IP anytime by routing your Internet traffic through overseas servers. All proxies are tested in advanced providing a high speed anonymous Internet connection.

  • Publisher: Amplusnet
  • Date: 05-12-2008
  • Size: 3462 KB
  • Platform: Win2000, Windows Server, Windows Vista, WinOther

Smart invisible captcha for wordpress comments. Visitors of your website don't need to enter letters and numbers. This small plugin automatically 100% protects your website from spam in comments. . installation : 1. Upload file invisible-captcha.zip to the /wp-content/plugins/ directory and decompress all files from archive. 2. Activate the plugin through the Plugins menu in WordPress. 3. Configure settings in WordPress menu Plugins --> Invisible Captcha 4. Relax and forget about spam in your blog. NB: The Identifier (id) of the button for comment sending in your comment-page should be "submit".

  • Platform: Python, Scripts

GTalk Invisible is a plugin that enables the long-awaited Invisible status for Google Talk users.

It works with Finch, Adium-X, and other implementations of libpurple as well so give it a try and enjoy your moments of privacy.

.

  • Platform: Windows 7, WinOther, WinVista

SpyKing Invisible Spy software secretly logs Facebook activities, keystrokes, chats, emails, web sites, PC games, online searches, shopping records, webmails, documents opened, user names, passwords and more. It takes screenshots like a hidden surveillance camera. SpyKing Invisible Spy is completely invisible to computer users. People won't know its existence. However, it is easy for you to unhide its main program Control Panel with your hotkey, view logs from the CP on the monitored computer directly, or receive log reports remotely via your custom email or ftp server! The reports can be sent as often as you wish, such as every 60 minutes.

  • Platform: Win2000, Win7 x64, Windows 7, WinOther, WinServer, WinVista

Surf Spy is an invisible tool that monitors the Internet activity on your computer. It captures the link (URL) of every visited web site and stores it to an encrypted file. The log file can be sent secretly with email to a specified receiver. Surf Spy Enterprise allows logging to a centralized server. This is very useful for large companies and schools that want to monitor a large number of computers..

  • Publisher: Sureshot
  • Date: 14-07-2002
  • Size: 1100 KB
  • Platform: WinOther

Folder Shield enables you to make folders completely invisible! Folder Shield can be used to hide any folders completely and securely. Your documents are invisible, and hence no longer accessible, as soon as the relevant folders have been hidden with Folder Shield. Just specify all confidential folders, activate Folder Shield's protection and all folders will be hidden and your sensitive data will be protected against unauthorized access..

  • Platform: WinOther

Invisible Secrets 4 is now a powerful security suite that helps you solve these problems. With Invisible Secrets 4 you can hide files, encrypt files, destroy your Internet traces, shred files, make secure IP to IP password transfer and even lock any application on your computer..

  • Platform: WinOther

Save Keys 6.0 is a completely invisible key recorder that secretly records every key typed into the keyboard along with the window title of the window or program that the keys were typed into. Save Keys 6.0 makes encryption of mail, messages, and passwords completely useless because these can be saved to file before they are encrypted..

  • Platform: Win2000, Windows Server, WinOther

Anti spam software and spam filtering software by Invisible Email protects your internet privacy and stops spam and unsolicited email. Recapture your computer privacy with this anonymous email encoder software..

  • Platform: Win2000, Windows Server, WinOther

Save Keys Undetectable 6.2 is an invisible key recorder that secretly logs every key typed into the keyboard. Other information can also be recorded such as the window caption of the current window, the name and path of all programs that open and close, and text from the clipboard. Now, if one tries to copy and paste their passwords, Save Keys Undetectable will be able to display those passwords in the logfile. Version 6.2 has improved encryption for faster encoding/decoding of the log file. Save Keys Undetectable 6.2 is the latest version of the popular Save Keys, sold since 1997. Recently anti-spyware and anti-key recorders are making it easier to find programs such as Save Keys.

  • Publisher: Alpine Snow
  • Date: 19-01-2005
  • Size: 1631 KB
  • Platform: Win2000, Windows Server, WinOther

All-In-One SPY is the program that allows monitoring and recording all actions that are performed with a computer. All-In-One SPY records all keys that were pressed, remembers addresses of Internet pages that were visited, and maintains log file for applications that were run on the computer. It can create screenshots with the specified time period and record sounds from the computer's microphone to a sound file. With All-In-One SPY you can disable certain applications and web site addresses. The program runs in the stealth mode and is completely invisible on the computer. The log files with the program work results can be securely transferred to another computer over a local area network or send to a certain address via e-mail.

  • Platform: Win2000, Windows Server, WinOther

BuddyCheck will show you the real online status of your Yahoo! Messenger friends. It will regularly check to see if they are online, even if they are invisible or are using Stealth Mode. It will notify you using a tray area balloon when a contact signs on or off. It does this by sending special messages to the Yahoo! Messenger server from a separate account which you must create. You could use your regular Yahoo! Messenger account for this, but this is not recommended since only one application can be logged in at any given time into one account. You can customize the period after which each contact is checked again for change, and you can set individual checking periods for some of your contacts.

  • Publisher: Nuotex
  • Date: 03-04-2006
  • Size: 325 KB
  • Platform: Win2000, Windows Server, WinOther

Inside Website Logger is an invisible surveillance application that monitors and records all websites visited by a user or computer.The report containing all accessed websites is available in web format or can be sent to a specified email address. Stealth Website Logger is suited for both office and home use, monitoring one computer or an entire network. For enhanced security, Inside Website Logger interface is password protected and requires a hotkey combination for accessing it. When running, Inside Website Logger is not visible in Program Files and Task Manager..

  • Platform: Win2000, Windows Server, WinOther
  • Icemark
  • License: Shareware
  • Price: 49.95
  • Rating

Wish you to protect your images from illegal use? Wish you to protect your copyright to images? So, Icemark is necessary for you. Using this program you can effortlessly identify your images from many others. Icemark is necessary for everyone, who works with graphics images and wants to protect their copyright. Icemark is easy to use and has a user-friendly interface. For your copyright protection, just add your personal watermark to the image, so you always know which images are yours. The added watermark is invisible and its detection is possible only by having the key, which only you have.

  • Platform: Win2000, Windows Server, WinOther

PC Activity Monitor Professional (PC Acme Professional) is designed for monitoring user's PC activity. PC Acme Professional works under Windows 2000/XP operating systems. All the data collected while monitoring are saved to the encrypted log file located on the user's machine. The monitoring program works in the background, transparently for the user, on the level of OS kernel driver. PC Acme Professional supports UNICODE, i.e. it is able to record even the languages with hieroglyphic writing. Another strong side of PC Acme Professional is its protection measures. It is completely hidden, and even an experienced user cannot locate, stop or destroy the program.

  • Platform: Win2000, WinOther

Invisible Chat is a user-friendly real-time application for large and small office and home local networks. The main advantage of Invisible Chat is the opportunity to become "invisible". It means, that the user can use application in conditions, when the chief beside and stops any attempts to be engaged in "non-working" activity. The application can change a transparency, form, color, font and many other parameters. ..

  • Platform: Win2000, WinOther

Page: 1 | 2 | 3 | 4 | 5 | Freeware

New Reviews


Auslogics Duplicate File Finder

If you have a lot of data and perform regular backups, or are particularly bad at keeping your system clean, tidy and organized, you may find that your computer starts to get a little clogged up with duplicate files. In my case, this is most obvious ...


Coin World

Coin world is an interesting platforming demo game in which you play as “Colin the coin” as you take on the evil “bank note flash”. The premise alone is an interesting enough reason to play the game, and combined with the ...


Acebyte Utilities

Acebyte Utilities is a modern looking application, designed to help speed up your computer via system optimization and error correction. In the long run, this could help prevent freezes and slow downs, as well as the dreaded blue screen of death ...


Crash Boom Bang

Crash boom bang is a fairly interesting and unique puzzle game, which blends the elements of the pretty typical “removal” sub genre of puzzlers, with an interesting extra bit of variation added in the way the game works. This comes in ...


RomCenter

Rom centre is a very handy downloadable piece of free ware that helps greatly when it comes to finding roms for a variety of emulators, checking roms to see if they are in full working order, and fixing roms if they are not working, so you don't ...


Privacy Winner

Many computer users know that over time your computer slows down. Give it six months and if you’re unlucky enough, your brand new shiny Windows 7 computer will be running just as slow as your old XP one was, causing you no end of problems such ...


Kryptelite

Kryptelite is an application that can help you quickly and simply encrypt your files. File encryption can be very important, as its an effective way to help prevent unauthorized access to your files and their contents, and acts as a layer of ...


Alex Gordon Game

Alex Gordon game (or simply Alex Gordon) is a free ware game which appears platformer game, which is supposedly in the same vein as games such as sonic or Mario. What the game actually turns out to be, is an adventure game (with a  few elements ...


Vehicles 2

Vehicles 2 is a great example of innovation in a game, from the very beginning cut scene (which explains the general back story to the game in a very light, humorous way) to the gameplay style, it has a lot of influence from other games in the ...



New Downloads

Active Table Editor

Design Data Entry Screens and
Edit ANY table in ANY Database
with ease. Control what users
can edit and see. Design ...

CRD Crystal Reports
Scheduler

CRD is a Crystal Reports
Scheduler that saves time and
money by making it easy to
schedule & automate
Crystal Reports ...

PhotoX Batch Watermark
Creator

PhotoX software provides a
quickest and easiest way to
watermark your photo. Avoid
unauthorized use of your
product ...

Vrode Script Editor

Vrode Script Editor is an
easy-to-use, lightweight and
effective editor for
JavaScript, Python, VBScript,
HTML and CSS ...

DrawPad Plus for Mac

DrawPad Plus for Mac is an
easy-to-use image composition
and manipulation program, an
essential tool for all types
of ...

QILING Disk Master
Professional

QILING Disk Master
Professional is not only a
reliable fast backup and
recovery software solution,
but also a ramdisk and ...

DWG to SVG Converter MX

DWG To SVG Converter MX allows
you convert DWG to SVG, DXF to
SVG and DWF to SVG directly
without need of AutoCAD, it
...

Pivot Table

NeoNeuro Pivot Table. Free.
Automatic Pivot Table shows
trends and charts, reveals
leaders and outsiders in all
...

XCell Compiler

Excel workbook copy protection
tool, compiles XLS to EXE
application (which requires MS
Excel to run) with securely
...



Related Searches

Invisible Browsing Secure
Invisible Ip
Browser Invisible
Invisible Chat
Invisible Tool
Ip Invisible
Make Invisible
Invisible Surfing
Invisible Ftp Server
How I Can See My Invisible Frieds Webcam
Pg Query Invisible
Lan Invisible Browsing