tamper resistant free software


Search results for tag «tamper resistant»:

Tamper Data 9.8.1 Tamper Data 9.8.1
… onse/requests. Security test web applications by modifying POST parameters. FYI current version of Google Web Accelerator is incompatible with the tampering function of TamperData. Your browser will crash. Requirements Firefox 1.0 - 2.0.0.*… 

Sleepy 6.2.406 Sleepy 6.2.406
… ents into a log file Tray icon: Provides quick access to status and settings Auto-update: Ensures you always have the most recent version of Sleepy Limitations 30 day trial… 

Revolver Mail 6.4 r2 Revolver Mail 6.4 r2
… rsions. Without a license key some functions are limited: For example you can only store up to 1 documents and positions. No time limit exists. In case you require a full version later you can unlock you test version and continue using the same data.… 

Always Current Business Card 3.0 Always Current Business Card 3.0
… use people are swamped with spam and viruses, but we should not shun the benefits of digital communication just because we are under attack by cyber-terrorists. We must retain control of email for legitimate business and personal uses. Limitations… 

Revolver Mail Pro 6.4 r2 Revolver Mail Pro 6.4 r2
… rsions. Without a license key some functions are limited: For example you can only store up to 1 documents and positions. No time limit exists. In case you require a full version later you can unlock you test version and continue using the same data.… 

CKDS Browser 1.0n CKDS Browser 1.0n
… ound our network with ease these are. This download is marked as adware because it displays advertisement banners or other type of commercials while running. C… 

WIDO Logbook 1.3 WIDO Logbook 1.3
… s on your computer Inclusion of the time of boot up, shut down and user logins and logoffs Resistant to manipulations (except Administrator) Reports for users grouped by day, week, month, quarter and year For self-control and children-control… 

Deltacrypt OneClick Public Key File Encryption 2.1 Deltacrypt OneClick Public Key File Encryption 2.1
… by simulating decryption process in real decryption time when used with a false private key. It encrypts binary units of information, therefore it can cipher any file formats with its 768-character key and has no encryption volume limitation.… 

Omniquad Messenger Chat Recorder 1.0 Omniquad Messenger Chat Recorder 1.0
… kes it easy for users who wish to maintain a record of their own conversations to easily work with the program. The covert or stealth mode is ideal for restricting access to the program.In stealth mode, the application cannot be located in the Pr… 

TeamTalk 3.2 TeamTalk 3.2
… Low lag by using audio broadcasting and no buffering. Throughput between 450 bytes/sec. and 7500 bytes/sec. per user. Packetloss resistant. Hotkeys and voice activation. Supports channels with passwords. Positioning of participants using 3D… 


Related: