English version 去汉语版本 Русская версия Deutsche Version

Download software tagged by hide activity

The most popular program: Quick Slide Show 2.00
Download Quick Slide Show 2.00
more info
We recommend: SmartHide 2.4.369
Download SmartHide 2.4.369
more info
Steganography Lib 2.1 by BV-Star Development
2007-11-26
This Library gives you a unique opportunity to add steganography functions in your applications. With the help of this library you can give your applicaion ability to hide information in Jpeg, Jpeg2000, Wav, Bmp formats and so on.
Folder Shield 1.0.7 by Razazwork
2007-11-29
Folder Shield is Comprehensive Application that protects your Folders / Files and Documents from unauthorized access with as ease you can imagine. Protect your folder(s) by either hiding them completely or partial
Evidence Nuker 2008.068 by Nuker Software
2007-12-14
Almost every action you make is recorded and can be easily retrieved by anyone, not just by a computer geek but by an average computer user such as your spouse, boss, friend, or anyone who has access to your PC. Cover Your Tracks! - FREE DOWNLOAD
Swift CDA WMA Sound to MPC Ripper 1.3.62 by CDA WMA Sound to MPC Ripper
2008-08-10
Swift CDA WMA Sound to MPC Ripper - If you are a network administrator, find MP3 files that users hide on servers hogging up space.
Digital MP3 MP2 RM to MPC Manager 1.6.03 by MP3 MP2 RM to MPC Manager
2008-08-16
Digital MP3 MP2 RM to MPC Manager - If you are a network administrator, find MP3 files that users hide on servers hogging up space.
Speed CD M3U CDA to DVD-Audio Copier 1.0.64 by CD M3U CDA to DVD-Audio Copier
2008-01-25
Speed CD M3U CDA to DVD-Audio Copier - If you are a network administrator, find MP3 files that users hide on servers hogging up space.
US-State Anti-virus Adware Spyware Bot 1.4.19 by Anti-virus Adware Spyware Bot
2008-01-27
US-State Anti-virus Adware Spyware Bot - The term rootkit is used to define a Trojan (or technology) used to hide the presence of a malicious object (process, file, registry key, network port) from the computer user or administrator.
Hope CDA Sound AC3 to DVD-Audio Copying 1.1.23 by CDA Sound AC3 to DVD-Audio Copying
2008-01-30
Hope CDA Sound AC3 to DVD-Audio Copying - If you are a network administrator, find MP3 files that users hide on servers hogging up space.
Swift Anti Binder Keyloggers Spy 1.3.73 by Anti Binder Keyloggers Spy
2008-08-10
Swift Anti Binder Keyloggers Spy - The term rootkit is used to define a Trojan (or technology) used to hide the presence of a malicious object (process, file, registry key, network port) from the computer user or administrator.
0.017