Home | Submit a file  |  New  |  Categories  |  Our awards  |  Link to us  |  RSS Feeds

Utilities :: Security & Encryption
Sort by: date | product title | rating | downloads | popularity
Display: short descriptions | full descriptions
  • Security Tracker activity monitor is a powerful and flexible system for the control of the staff working hours usage in a network or on a terminal servers. There are many of the software to solve a similar problem. Part from them - simply spyware programs intended first of all for capturing of user`s keystrokes, passwords and various messages.
  • Security Tracker employee monitoring is a powerful and flexible system for the control of the staff working hours usage in a network or on a terminal servers. There are many of the software to solve a similar problem. Part from them - simply spyware programs intended first of all for capturing of user`s keystrokes, passwords and various messages.
  • Looking to remove or shred files permanently from your computer system, then without any second opinion file shredder is the most appropriate application that you can rely on. Perhaps, the key aspect that makes it quite appropriate for secure file deletion is its ability of rewriting the file with random series of binary data multiple times. This way, the original content of the file that was present initially gets overwritten and finally reduces the possibility of restoring a shredded file completely. Besides this, the tool also facilitates its user to make a proper selection between different shredding algorithms depending upon the sensitivity of data. What makes it more special is its unique aptitude to shred the files in any format. Besides this, the software also supports all versions of Windows operating systems. Perhaps, this software can make you free from the misuse of any vital information. Moreover, this software is also available in a free trial version and so a user can easily analyze it performa ...
  • Break Access Security is one of the most practical or helpful software to Break Access Security. Break Access Security is designed for those people who have problem with Access Security. Users can Break Access Security by using Break Access Security program. The software also recovers lost, disappear or vanished access Security Password.
  • Active Keylogger Home - This is the best choice for you if you think that others are using your computer when you are not home or away from your working place. After you install Active Keylogger Home on your computer, it will allow you to make program settings for tracking activities on your computer.If you enable "Run Active Keylogger Home in Stealth Mode" ...
  • See what happens on your PC when you're away. Protect your kids or catch cheating spouses by logging chats and instant messenger conversations. Email or FTP the results automatically to anywhere in the world. Active Key Logger Pro is user-friendly and designed to be conveniently used at home allowing you to see typical user activities such as chats and instant messages sent or received in AOL AIM, ICQ, MSN and Yahoo messengers.
  • Invisible Keylogger Lite is the most powerful stealth keylogger offered Toolsanywhere Software! This is the best choice for you if you think that others are using your computer when you are not home or away from your working place. Invisible Keylogger Lite runs silently at the lowest level of windows capturing every keystroke typed including usernames and windows log-on passwords. Invisible Keylogger Lite can also capture active window text, text
  • Active Invisible Keylogger Home - This is the best choice for you if you think that others are using your computer when you are not home or away from your working place. After you install Active Invisible Keylogger Home on your computer, it will allow you to make program settings for tracking activities on your computer.If you enable "Run Active Invisible Keylogger Home in Stealth Mode" then the program will run by full stealth for others, no one
  • Personal Invisible Keylogger is the most powerful stealth spy software offered by ToolAnywhere! Personal Invisible Keylogger runs silently at the lowest level of Windows capturing every keystroke including usernames and windows log-on passwords. Personal Invisible Keylogger can also capture active window text, text typed in all popular instant messengers including AOL, YAHOO, ICQ, MSN and AIM. All Desktop activity will be recorded through Person
  • Highly secure email with encrypted hosted storage. Integrated secure chat, instant messaging and collaboration for individuals and groups. Works across networks and firewalls without a need for expensive VPN, PKI or complicated network setup, administration, or maintenance. Includes anonymous email options.
  • Protect PDF Printing by unwanted person or for illegitimate task. The Restrict PDF software would put an end to all those attempts just by putting in few syllables as user password or the owner password. With either one of the password you would be able to disable the option of copy, print and edit in the PDF files.
  • Advanced Tracks Cleaner Pro is a powerful porn tool for your protection. Every day when you work on a computer, Windows keeps track of your activities on the computer, when you are connected to the Internet, the web browser you are using leaves many traces of your activity on the Internet, even software you use also leaves traces. All these traces after your work on the computer might be used by other people against you. Therefore Advanced Tracks
  • Information security Keylogger NET system consists of Spying for users system activity module sending collected data in XLS format to your E-mail address. Keylogger NET is powered with the keyboard spy logging each keystroke, the module recording all Internet sites, search queries, system applications, clipboard. Keylogger saves collected data in encrypted mode and sends them to your E-mail address as a simple XLS file that You can easily open with MS Excel, OpenOffice and other applications. KeyLogger NET is the software product suitable first of all for people whose work is connected with huge data amount that can be restored anyway regardless of whether it was saved or just typed. You will not loose data typed on your computer keyboard. It is the good program for parental control and employees control purposes with the function of sending all collected data to your E-mail address. The software records each application start, remembers passwords, Internet addresses and search engines' queries ...
  • Information leakage becomes a social problem. Information leakage may be given a huge damage to a company or individual. So we need security software to protect our information (data,file). There are much security software for PC, but little security software for mobile device. USB Flash Security is security software for mobile device. It can help you to protect you mobile devices by encryption(AES256bit). AES encryption which is recognized by speedy and cipher strength of encryption algorithm has been adopted. Data will be encrypted automatically by writing in USB memory, and it will be decrypted automatically by reading from USB memory. USB Flash Security##g can be installed to five USB drives up to 2TB in trail period. If uninstall USB Flash Security##g from one USB drive, it can be installed to the other one. USB Flash Security##g is for group user, so the number of USB drive that can be protected by USB Flash Security##g will be set by the order of license. About encryption of USB Flash Security##g, a ...
  • Information leakage becomes a social problem. Information leakage may be given a huge damage to a company or individual. So we need security software to protect our information (data,file). There are much security software for PC, but little security software for mobile device. USB Flash Security is security software for mobile device. It can help you to protect you mobile devices by encryption(AES256bit). AES encryption which is recognized by speedy and cipher strength of encryption algorithm has been adopted. Data will be encrypted automatically by writing in USB memory, and it will be decrypted automatically by reading from USB memory. USB Flash Security#g can be installed to five USB drives up to 16GB in trail period. If uninstall USB Flash Security#g from one USB drive, it can be installed to the other one. USB Flash Security#g is for group user, so the number of USB drive that can be protected by USB Flash Security#g will be set by the order of license. About encryption of USB Flash Security#g, all o ...
  • Information leakage becomes a social problem. Information leakage may be given a huge damage to a company or individual. So we need security software to protect our information (data,file). There are much security software for PC, but little security software for mobile device. USB Flash Security is security software for mobile device. It can help you to protect you mobile devices by encryption(AES256bit). AES encryption which is recognized by speedy and cipher strength of encryption algorithm has been adopted. Data will be encrypted automatically by writing in USB memory, and it will be decrypted automatically by reading from USB memory. USB Flash Security++g can be installed to five USB drives up to 8GB in trail period. If uninstall USB Flash Security++g from one USB drive, it can be installed to the other one. USB Flash Security++g is for group user, so the number of USB drive that can be protected by USB Flash Security++g will be set by the order of license. About encryption of USB Flash Security++g, a ...
  • Information leakage becomes a social problem. Information leakage may be given a huge damage to a company or individual. So we need security software to protect our information (data,file). There are much security software for PC, but little security software for mobile device. USB Flash Security is security software for mobile device. It can help you to protect you mobile devices by encryption(AES256bit). AES encryption which is recognized by speedy and cipher strength of encryption algorithm has been adopted. Data will be encrypted automatically by writing in USB memory, and it will be decrypted automatically by reading from USB memory. USB Flash Security+g can be installed to five USB drives up to 4GB in trail period. If uninstall USB Flash Security+g from one USB drive, it can be installed to the other one. USB Flash Security+g is for group user, so the number of USB drive that can be protected by USB Flash Security+g will be set by the order of license. About encryption of USB Flash Security+g, all of ...
  • Information leakage becomes a social problem. Information leakage may be given a huge damage to a company or individual. So we need security software to protect our information (data,file). There are much security software for PC, but little security software for mobile device. USB Flash Security is security software for mobile device. It can help you to protect you mobile devices by encryption(AES256bit). AES encryption which is recognized by speedy and cipher strength of encryption algorithm has been adopted. Data will be encrypted automatically by writing in USB memory, and it will be decrypted automatically by reading from USB memory. There are five editions in 'USB Flash Security' for personal user. USB Flash Security (Free) USB Flash Security+ (Product) USB Flash Security++ (Product) USB Flash Security# (Product) USB Flash Security## (Product) Main differences of each edition are the disk capacity and the number of USB drives. USB Flash Security++ can be installed to TWO USB ...
  • Password Genie is a password manager that works across multiple computers and users and is designed for both security and convenience. You can easily save all of your usernames and passwords in one location which is securely protected and can only be accessed by you. Features include: Smart and Complex Logins, Password Generator, Bookmarks, Organized Folders, Safe and Secure Encryption, Automated Backups, 24/7 Support and a Browser Button.
  • Keylogger Software is an advanced monitoring software used track & record all events executed on computer systems, PCs, laptops in nonexistence of users. Keylogger tracks each and every moment carried out on desktops, Laptops etc such as all chat talks, visited videos, installed applications, downloaded files and many more. Keylogger Software is an advanced activity watcher utility allowing tracing sounds produced during PC microphone conversations. Keylogger performs complete controlling over PC actions and events by capturing screenshots on each mouse click and typed keystroke. Keylogger Software is efficient software capable of generating HTML reports containing records of all events operated on PCs, computers in user absence. Keylogger Software is keyboard activity controlling tool able to observe all voice chats of both sides operated on multiple chat programs such as Yahoo Messenger, ICQ, QIP, MSN, Miranda etc. Keylogger begins sound recording when the sound level is above the definite thres ...
  • Protect PDF copying software secures PDF with user password as well as owner password. Download free evaluation version of PDF encryption program to lock PDF document. Protecting PDF with open password ensures that only intended recipients will be able to open and view PDF files. Securing PDF with owner password ensures that only allowed permissions will be accessed by the user. PDF password encryptor tool works as file protector and restrictor utility which allow security encryption. PDF protector tool restrict permission such as PDF printing, content copying, form filling, document modifying, page extraction, commenting, signing and copying content for accessibility. If you know more knowledge to this software go link www.unprotectpdf.com to read and download trail version of software. Encrypt PDF content stream with strong RC4 40 bits & 128 bits and AES 128 bits strength security level. Software runs on several windows operating system such as Win2000, Win7 x32, Win7 x64, Win98, Win Vista, Win Vista x6 ...
  • Keystroke logger free is advanced computer monitoring software to monitor & record every moment performed on PCs, computers, desktops, laptops in non existence of authorized users. Keystroke recorder tracks each voice chat, installed programs, visited websites, downloaded files, username, passwords, sending and receiving electronic mails and many more. Keystroke logger free is keyboard activity watcher program observes each key pressed through keyboard by other users. Keystroke logger free records all sounds generated via PC microphone operated on computer system. Keystroke logger free is invisible software capturing screenshots on indication of any mouse click and typed keystroke. Keystroke logger free is surveillance software enables to stop taking screenshots throughout inactive hours of computer and pick up visual surveillance on further observation of any mouse click or key press event. Keystroke logger free creates HTML reports including descriptions of all records processed on PCs. Keystrok ...
  • iSafe Employee Monitoring Software records and monitors your employee's activities and provides you on-site and remote access to employee's logs and computer screens in real time. About computer monitoring software.Best WorldClass monitoring software - iSafe Employee Monitoring Protect your company's assets with employee monitoring. Install iSafe Employee Monitor and forget it, and it keeps monitoring for you!
  • There are times when users need to delete their important files and folders, so as to protect the stealing of their confidential data. Simply deleting files does not actually works to protect your data because even if they are deleted permanently from Recycle Bin, they still remain somewhere in the computer. This issue can be resolved using Kernel File Shredder. It is professionally designed file shredder Windows 7, which works in such a way that no other data recovery tool or software could retrieve and restore those files ever. The software is integrated with powerful algorithm for impeccable performance. Those algorithms are US Army AR380-19 (3 passes), Peter Gutmann (35 Passes), DoD 5220 + Peter Gutmann, and German VSITR (7 Passes). Kernel File Shredder can only work if the files are stored on the computer?s hard disk because the software does not allow shredding files and folders stored on network drive, pen drive, or any other storage media. The file shredder windows 7 software provides multiple options ...
  • PDF Encrypt Tool V4.0 can be used to protect your PDF files with 128-bit strength user and owner passwords, set all permissions(such as coping, editing, printing, selecting text and graphics, fill in etc), and prevent PDF files from being printed, changed, copied, extracted, signed, filled, assembled and/or merged. It is the fast, affordable way to encrypt a lot of pdf files to encrypted pdf files once time for saving your time! Its easy-to-use i It is very powerful and easy-to-use! PDF Encrypt Tool supports batch Encrypt mode. PDF Encrypt Tool supports all popular PDF formats. PDF Encrypt Tool supports 40-bit Encryption and Adobe Advanced 128-bit Encryption. PDF Encrypt Tool can be run independently,does not need Adobe Acrobat.

Page 6 of 30
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30


Legal disclaimer | Privacy policy

© 2004-2015 IT Shareware