Home | Submit a file  |  New  |  Categories  |  Our awards  |  Link to us  |  RSS Feeds

Utilities :: Security & Encryption
Sort by: date | product title | rating | downloads | popularity
Display: short descriptions | full descriptions
  • Employee ID Cards utility provides facility to create Identity cards for professional users like company employee, security, visitors, staffs and other office members in efficient and organized way. Comprehensive card maker software offers easily adjustable font, image, color and style settings to build customized identity cards in easiest manner. Software offers password setting features to protect ID card maker utility from unauthorized users during designing process. Business oriented ID card maker application facilitates to modify existing card or create new card from scratch as per user requirements. Highly reliable ID card generator program offers wide range of designing tools such as pencil, arc, text, line, image, ellipse, picture, star and many more to built preferred style ID cards according to business needs. Users can generate stylish and innovative ID cards in different shapes like rectangle, ellipse, circle, triangle and rounded rectangle format. Versatile card designing application facilitates ...
  • Most technically powerful spyware on Mac software allows user to take a complete records of all visited data in hidden mode and save them at safe place in system or at user defined location. Amazing Macintosh Os X based monitoring application allows both technical and non-technical user to operate such type software without taking extra expertise classes in efficient manner. Expertise Mac key logger software is able to record all actions like insertions and removal of different USB media such as pen drive, thumb drive, micro drive, flash drive, digital camera, jump drive, key chain drive, flash drive and many others. Best and easy to understand Mac keylogger software is used widely in different fields like university, colleges, schools, cyber café, hospitals, shipping, police forces, investigation sector and many other fields at reasonable cost. Cost-effective and affordable spyware on Macintosh application is coming in market with extraordinary features that is very helpful for parents so that user is able t ...
  • CryptDecrypt provides an easy way to protect your sensitive information. CryptDecrypt securely encrypts your data with a password that you select. CryptDecrypt includes several encryption algorithms to protect your data: AES (USA Government Standard) Triple-DES, GOST, RC2, RC4 and Windows Data Protection API.
  • Sonar Lite is easy and smart in use software for work space and flat area acoustic control. Successfully works to control home employees of nanny housemaid class. Sonar Lite can easily keep under audio-control a room of 35+ square meters and neighboring apartments. Easy and quality records multi-parts' Skype and same software call dialogs without any computer stressing. Counts its time of possible unstoppable work, offers microphones sensitivity settings, time-period parameters and formats for output files. The inner software audio-player allows to work with recorded files easy and fast. Sonar Lite is protected from any direct access to the software interface and is equipped with hidden mode inside the system. Sonar is the multifunctional software that is useful for parental control purposes, as spy audio-recorder for Skype dialogs, as alarm-system solution or just for apartment monitoring. Sonar usage: - Acoustic apartments control - Audio-monitoring of work place - Skype dialogs recording - ...
  • Web Patrol software provides a customizable approach to filter your children online activities so that you can keep them safe in an increasingly dangerous online world. Our software allows you to block your child?s unsafe activities from instant messengers to games and even chats. You can use website filters to restrict access to age appropriate sites, block online applications and also receive reports on your child?s online activities remotely. One other great feature is time controls. With time controls you specify which hours of the day for each day of the week your child is allowed Internet access. This feature can be used to block your child from being online when you are not available to monitor his activities. By using Web Patrol on your computer you can rest assured that your child is using the Internet in a safe and appropriate environment.
  • The Internet is a dangerous place to your kids. With JuniorWatch you may have the peace of mind. You will sure your kids are safe. After you sign up the service, and install the client software on your junior's computer, the client software will consistently report locations, screen and webcam shots, and even key strokes from the computer. You can access the reports from any computer.
  • Event Track makes it easy for you to register, badge and track your attendees. Register attendees online or on-site at reception desks and self-registration kiosks. Design and print plastic ID cards or paper badges using the included industry-leading ID Flow badge design software. Check in and record attendance using networked check in stations or handheld scanners. Secure network data-sharing and reporting allows for centralized management.
  • School Track is a robust solution for managing student attendance on school campuses. Track student attendance and tardiness, issue tardy slips and hall passes, assign warnings and detention. Parents can receive e-mail notification of any infraction occurred. Process late students quickly and automatically assign and manage detention for repeat offenders. Produce professional photo ID cards and paper badges. Easily deploys campus-wide.
  • Kernel file shredder is a professional tool that acts as a data privacy tool as it ensures that organization sensitive information is not been misused by any malicious users. It ensures this as it permanently deletes or removes crucial files and folders from your computer system after use. The free file shredder software performs efficient as well as impeccable file shredding in such a manner that once the files and folders are shred, they cannot be recovered back using any powerful data recovery tool. Kernel file shredder offers multiple file shredding options to the users. Moreover, it also enables you to create a list of files that you want to permanently remove from your computer system. This file has a .cfs format. Kernel file shredder comes with a free evaluation or free trial version which enables you to shred files on one hand and on the other hand lets you evaluate the features as well as performance of the tool. However, the limitation of this free trial version is that it is available for a time ...
  • Invisibe Keylogger will let you monitor what people you share your computer with type when you are away. Working in the background, Invisible Keylogger will record every keystroke a user makes in every application and save it to a text file. In Stealth mode, the program is totally invisible to other people who are not aware their computer activity is monitored.
  • Pdf encryption software lock pdf data with strong 128 bit encryption security level protection. Program is responsible for protecting batch pdf documents with open password security and owner password restrictions. Pdf encryption software facilitates to restrict desired function in any pdf file i.e. you can enable or disable pdf printing, copying, form filling, signing, commenting, editing, modifying etc permissions according to requirement. Application is Windows compatible, support RC4 40 bit & 128 bit encryption protection. In fact, you can secure bulk pdf documents only with open (user) password without applying any restrictions. This easy to use and awesome utility has inbuilt user help manual and does not require any extra technical skills for operating. Download free evaluation version of pdf security software, protect your private and confidential data from un-authorized access, prevent piracy & fraudulent. Program prompt for open password once set into the pdf and only intended person ...
  • SafeDeleter is a secure data removal tool for Windows. It completely removes sensitive data from your hard drive by overwriting it several times with military strength selected patterns.
  • Secure Image Pro is recommended image protection for photographers and advertising professionals. Pro supports Mac as well as PC visitors. Options include Domain Lock, targeted hyperlink on the image, and several display options, status messages, picture frames, batch file import and processing, multi-registry for use on several domains. Pro will encrypt 1,000's of images on a single click.
  • Security Tracker activity monitor is a powerful and flexible system for the control of the staff working hours usage in a network or on a terminal servers. There are many of the software to solve a similar problem. Part from them - simply spyware programs intended first of all for capturing of user`s keystrokes, passwords and various messages.
  • Security Tracker employee monitoring is a powerful and flexible system for the control of the staff working hours usage in a network or on a terminal servers. There are many of the software to solve a similar problem. Part from them - simply spyware programs intended first of all for capturing of user`s keystrokes, passwords and various messages.
  • Looking to remove or shred files permanently from your computer system, then without any second opinion file shredder is the most appropriate application that you can rely on. Perhaps, the key aspect that makes it quite appropriate for secure file deletion is its ability of rewriting the file with random series of binary data multiple times. This way, the original content of the file that was present initially gets overwritten and finally reduces the possibility of restoring a shredded file completely. Besides this, the tool also facilitates its user to make a proper selection between different shredding algorithms depending upon the sensitivity of data. What makes it more special is its unique aptitude to shred the files in any format. Besides this, the software also supports all versions of Windows operating systems. Perhaps, this software can make you free from the misuse of any vital information. Moreover, this software is also available in a free trial version and so a user can easily analyze it performa ...
  • ArtistScope DRM is a total control solution for the Document Rights Management of documents, images and web pages where an author can assign different permissions per user or group of users. When DRM rights are assigned the document becomes "for their eyes only" and any copies of that document forwarded on cannot be viewed by others unless they also have rights of view. Tokens cannot be forged and certificates cannot be copied or redistributed.
  • iSafe Keystroke Recorder is the most powerful surveillance keylogger for monitoring and recording every detail of PC and Internet activity at home and in the office. Additionally, it's a totally invisible keystroke recorder! While the demo version might be detected by some antiviruses, all registered clients get the special version of iSafe Keylogger which cannot be detected and is daily updated for them.
  • Break Access Security is one of the most practical or helpful software to Break Access Security. Break Access Security is designed for those people who have problem with Access Security. Users can Break Access Security by using Break Access Security program. The software also recovers lost, disappear or vanished access Security Password.
  • Active Keylogger Home - This is the best choice for you if you think that others are using your computer when you are not home or away from your working place. After you install Active Keylogger Home on your computer, it will allow you to make program settings for tracking activities on your computer.If you enable "Run Active Keylogger Home in Stealth Mode" ...
  • See what happens on your PC when you're away. Protect your kids or catch cheating spouses by logging chats and instant messenger conversations. Email or FTP the results automatically to anywhere in the world. Active Key Logger Pro is user-friendly and designed to be conveniently used at home allowing you to see typical user activities such as chats and instant messages sent or received in AOL AIM, ICQ, MSN and Yahoo messengers.
  • Invisible Keylogger Lite is the most powerful stealth keylogger offered Toolsanywhere Software! This is the best choice for you if you think that others are using your computer when you are not home or away from your working place. Invisible Keylogger Lite runs silently at the lowest level of windows capturing every keystroke typed including usernames and windows log-on passwords. Invisible Keylogger Lite can also capture active window text, text
  • Active Invisible Keylogger Home - This is the best choice for you if you think that others are using your computer when you are not home or away from your working place. After you install Active Invisible Keylogger Home on your computer, it will allow you to make program settings for tracking activities on your computer.If you enable "Run Active Invisible Keylogger Home in Stealth Mode" then the program will run by full stealth for others, no one
  • Personal Invisible Keylogger is the most powerful stealth spy software offered by ToolAnywhere! Personal Invisible Keylogger runs silently at the lowest level of Windows capturing every keystroke including usernames and windows log-on passwords. Personal Invisible Keylogger can also capture active window text, text typed in all popular instant messengers including AOL, YAHOO, ICQ, MSN and AIM. All Desktop activity will be recorded through Person
  • Highly secure email with encrypted hosted storage. Integrated secure chat, instant messaging and collaboration for individuals and groups. Works across networks and firewalls without a need for expensive VPN, PKI or complicated network setup, administration, or maintenance. Includes anonymous email options.

Page 6 of 30
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30


Legal disclaimer | Privacy policy

© 2004-2014 IT Shareware