When.com Web Search

  1. Ads

    related to: hidden file finder free download

Search results

  1. Results From The WOW.Com Content Network
  2. Fast Duplicate File Finder - Wikipedia

    en.wikipedia.org/wiki/Fast_Duplicate_File_Finder

    Fast Duplicate File Finder is a Windows tool developed by MindGems Inc, available as a freeware version and a full commercial version. It is intended to scan a user's computer for duplicate files, display a list of such files and let the user delete unneeded copies with the purpose of freeing up hard drive space.

  3. Locate32 - Wikipedia

    en.wikipedia.org/wiki/Locate32

    Locate32 is a file finder for Microsoft Windows (98/NT 4.0 and later). It works by indexing the files on the user's hard drives, thus making searches faster. [1] Removable or remote drives can also be indexed. [2] Installation is not required. One unpacks the program files anywhere on the hard disk and runs the executable directly.

  4. Recuva - Wikipedia

    en.wikipedia.org/wiki/Recuva

    Recuva can recover files deleted from internal and external hard disk drives, USB flash drives, memory cards, portable media players or all random-access storage mediums with a supported file system. The program works on FAT , exFAT and NTFS file systems of Windows, [ 4 ] and as of version 1.5.3 it can also recover files from Ext2 , Ext3 and ...

  5. Browse Speed & Security Utilities - AOL

    www.aol.com/products/utilities

    Get the tools you need to help boost internet speed, send email safely and security from any device, find lost computer files and folders and monitor your credit. ... Get it free ; Enjoy your AOL ...

  6. Everything (software) - Wikipedia

    en.wikipedia.org/wiki/Everything_(software)

    Everything is a freeware desktop search utility for Windows that can rapidly find files and folders by name. While the binaries are licensed under a permissive licence identical to the MIT License , [ 2 ] it is not open-source .

  7. OpenPuff - Wikipedia

    en.wikipedia.org/wiki/OpenPuff

    the sender hides a hidden stream inside some public available carrier files (password + carrier files + carrier order are the secret key) the receiver unhides the hidden stream knowing the secret key; The advantage of steganography, over cryptography alone, is that messages do not attract attention to themselves. Plainly visible encrypted ...