conceal ip shareware downloads
Search results for «conceal ip»:
HTML Conceal 1.0
… a typical 350k HTML file to a 6k HTML file, with the same functionality, while protecting your web art work and contents from thieves.
The cost of HTML-CONCEAL is $20 US, and for this reason, it makes sense in protecting your web art work.…
Another ViewPoint 5.01
… d deleted the files they could not be restored. Any special software or hardware is powerless to restore them.
This program may be used for
In the "ViewPoint" main window the user types shortcut keys and clicks Enter. After it opens you may use…
12Ghosts JustAWindow 9.70
… o show one part of a document to someone, but not the whole document.
If you Just had A Window to place it on top! With JustAWindow you can create as many free-movable windows as necessary to cover, hide, or conceal all these areas on the screen.…
Screensaver Keeper 1.3
… which can start automatically when the mouse and keyboard have been idle for a period of time.Screen savers exist for two main reasons:
To avoid phosphor burn caused by static images on a screen ;
To conceal sensitive information left on a screen.…
AKVIS Chameleon 8.0
… //www.akvis.com) offers numerous examples and ideas on using the Chameleon Plugin application.
AKVIS Chameleon plugin is compatible with Adobe Photoshop (tested with v. 5, 6, 7, CS), Jasc Paint Shop Pro (tested with 6.02, 7.04, 8).
Limitations…
Drive Zapper Pro 9.0
…
Requirements
16 MB of Ram
3 MB of Hard Disk Space
16 Bit Graphics Card
Internet Explorer 4.01 or higher Internet Connection for Live Updates or Web updates…
Heidi R. Stealthy (TM) 2.1
… pup hints.
Fun. Inexpensive. Who's that looking over your shoulder right now?
Heidi R. Stealthy™ is one-click privacy software that lets you hide your PC desktop from the prying eyes of others.
Limitations
Only two windows can be hidden.…
CloudPHP 1.0.103
… allows you to check for updates at a moments notice and quickly patch your current install with the latest features and bug fixes as they are released.
Limitations
15 days trial…
Hermetic Stego 9.37
… a user-specified key.
After 10 days or 20 program starts, whichever comes first, it enters 'demo mode' and loses the ability to hide a file (but not the ability to extract a file).…
LockEnd 3.0
… torage.
To completely and cleanly delete uncomfortable information or data
To immediately send urgent important material to a customer company or military organization
To prevent possible pilfering of my company computer by coworkers
To check…
Related: conceal conceal ip conceal folders html conceal