BlindBossKey History

Version history for BlindBossKey shows you how often it was updated over the past months (starting Nov 11, 2008) as well as 'what is new' information for each update (if available, since this information provided by the author).

Version: 2.0.1
Size: 3593 KB
OS: Windows
Description:   Hide specified windows or windows of specified process. You can hide any visible window on your desktop, hide all the windows of specified processes or executable-files. You can select a window which will be shown onto the top after hidding.

v 2.0.1 updated on Nov 30, 2014

Add an option to enable/disable automatic update check. Optimize to reduce the resource consumption.

v 1.3.0 updated on Sep 20, 2010

Unknown changes

v 1.2.0 updated on Jul 27, 2010

Unknown changes

v 1.1.3 updated on Sep 10, 2009

Unknown changes

v 1.1.1 updated on Jun 17, 2009

Unknown changes

v 1.1 updated on May 13, 2009

Unknown changes

v 1.0 updated on Nov 11, 2008

Unknown changes

Go back to the BlindBossKey review

More Downloads

  • Eproxy Proxy Server

    Proxy Server - HTTP, HTTPS, cache, FTP, FTP-GATE, SOCKS4, 5, MAIL(pop3proxy), mapping (TCP / UDP), traffic control, AntiVirus, statistics, unlimited domains and users number (auth AD, ODBC, txt)

  • Win Clear (erase Windows history)

    Clear computer and Internet history with Win Clear. Protect your privacy by cleaning up all tracks of your Internet and computer activity. Improve the speed of your computer and free valuable space, cleaning computers history files.

  • SecuWipe for Pocket PC

    Protect your privacy and your identity with automatic wiping of sensitive information. Wipe contacts, email, SMS, temporary files, browsing history, files and memory cards.

  • iMonitorPC Business Online Monitoring

    iMonitorPC is the most easy-to-use tool to monitor and record all system usage secretly, such as all applications loaded, Internet chats, web sites visited.It can be used in a network or with online monitoring.

  • Desktop Spy X

    Desktop Spy X allows you to secretly monitor desktop activity on a PC and view these logs remotely over a network in real-time. This includes application usage, web sites, chats, e-mails, keystrokes, files created, and screenshots.