Home | Submit a file  |  New  |  Categories  |  Our awards  |  Link to us  |  RSS Feeds

Utilities :: Security & Encryption
Sort by: date | product title | rating | downloads | popularity
Display: short descriptions | full descriptions
  • Power Spy software secrectly logs all keystrokes, web sites, emails, chats & IMs: MSN Messenger, Windows Live Messenger, ICQ, AOL / AIM, Yahoo! Messenger, Windows Messenger and Skype. Takes screen snapshots at every X seconds like a surveillance camera. Displays exact activities, like MySpace, Facebook, PC games, online searches & shopping, file transfers and webmails. You can receive reports remotely via emails or ftp.
  • SpyPal Yahoo! Messenger Spy software can secretly Secretly record all Yahoo! Messenger's incoming and outgoing chat text messages. It runs in a complete invisible mode. You can check all recorded messages by simply receiving emails or opening a web page. Perfect for catching cheaters, monitoring employees, children or spouse, and even investigating crimes.
  • Watch N Catch, provides a full range of network video solutions for a broad spectrum of industry segment and home. We provide industry's best solutions for all your security requirements.Experience the world's most advanced and reliable security system on affordable price. Solutions by Category Home Security Office Security Parking Security Retail Security Banking Security Industrial Security
  • SpyPal Invisible Spy secrectly records keystrokes, screenshots, websites visited, windows opened, applications, MSN, ICQ, AIM, Yahoo! IM, Skype, clipboard, passwords, emails, documents and more. In Stealth Mode, it is completely invisible to computer users. Use hotkey and password to access the program. Auto send logs to a preset email or ftp at set interval. Usages: monitors employees, children, spouse and investigate crimes.
  • Fire up our free Permissions Analyzer for Active Directory and get complete visibility into the effective permissions and access rights for a specific file folder or share drive all from a totally cool desktop dashboard! That's right, now you can quickly see WHO has permission to do WHAT and answer the questions that suck up your time and your patience
  • If you are facing errors while accessing Notes .NSF files due to local security applied, then NSF local security removal helps you in removing the security and hence provides access to the file. Errors ?You are not authorized to perform that action? and ?You are not authorized to access that database? prevents you from opening the NSF file. Administrator applies various access rules for preventing unauthorized usage of .NSF file. But with Notes local security removal tool this restriction is overcome and you can access the file easily, in times of urgency or when admin is not available to provide you with access rights. This software also gives provision of re-applying the security once you are done with nsf file work. Using the software, user just needs to select the NSF file for removing security and then click on the ?Remove security from selected database? button. Unlimited .NSF files can be freed from local security with the help of Local Security Removal software. Software supports all version ...
  • WinTweakz PasswordSafe stores all your passwords and access codes on one digital key ring. You just need to remember a single password to access all this informaton.
  • Cute Password Manager logs you into Web sites and fills forms faster, easier, and more securely. Cute Password Manager memorizes each user ID and password the first time you log into a site and automatically supplies them when you return. Cute Password Manager can help you secure your passwords from spyware, trojans, and Phishing. It's easy-to-use, fast, and efficient. Save yourself some time and give Cute Password Manager a try!
  • Free File Lock is a safe file encrypter program that can protect your important or sensitive files with uncrackable encryption algorithms. You can lock your files like images, music, movies as well as executable files & compressed files. It makes sure that no one can mess with your files without your authorization. Variety of cipher-methods make the encryption far more secure that nobody can decrypt it without the original password.
  • Real System Spy software is a smart PC surveillance software that lets you know exactly what people do on a PC. It secretly logs all PC and Internet activity, including Facebook, typed keystrokes (keylogger), chats & IMs, emails, website visits, games, online shopping, searches, video talk, web cam, documents, clipboard and more. It sends log reports to your email or ftp. Use it to monitor your kids on Facebook, monitor your spouse and employees.
  • Facebook Activity Spy secrectly logs all Facebook use, keystrokes, web visits, emails, chats & IMs: Windows Live Messenger, Yahoo Messenger, Skype and other IMs. It logs applications, documents, clipboard, user names, passwords, video talk, video played and more. It also takes screenshots at every X seconds like a surveillance camera. It runs invisibly so that monitored users won't know it. You can receive log reports remotely via emails
  • SpyPal secrectly records keystrokes, screenshots, websites visited, windows opened, applications, MSN, ICQ, AIM, Yahoo! IM, Skype, My Space, Facebook, clipboard, passwords, emails, documents and more. In Stealth Mode, it is completely invisible to computer users. Use hotkey and password to access the program. Auto send logs to a preset email or ftp at set interval. Possible usages: monitors employees, children, spouse and investigate cr
  • A powerful and fast dwg tools, Protecting drawing file, Keep others from modifying/copying your design.DWGLock is a stand-alone application, no AutoCAD required; Supports AutoCAD R2.9 thru 2011 drawings. Features: Powerful encryption, secure the entities in the drawing, they can not copy nor change it ; Recipients can open up protected drawing, and add lines etc to the drawing file;
  • Invisible messenger spy software that records all Yahoo! Messenger incoming and outgoing chat text. Send reports to your custom email address or ftp. You can check all recorded messages by simply receiving emails or opening a web page. Use hotkey to unhide it from Stealth Mode and protect program access by password. Perfect for catching cheaters, monitoring employees, children or spouse, and even investigating crimes.
  • Secure your computer by Password protecting, or locking, your Windows programs and EXE files for Free. Plus encryption for your files, folders and drives - direct from Windows Explorer. Extra features allow you to disable Task Keys, Software Installation, Internet Explorer, Mozilla FireFox, Downloading Files, Zip and Self Extracting Files and the Boot Keys (F8).
  • Keep your operating system stable and protect important programs, documents and files. System Protect software was designed to be an easy-to-use application that will help you keep your operating system stable and protect important programs, documents and files from deletion caused by viruses, other users on your computer such as your kids, or even by your own mistake.
  • OnlineVNC Server-64 bit is a quality and easy-to-use program that allows you to control your desktop from the web-browser from Windows, Linux or Mac OS X. Viewer for the server is written using Adobe Flash technology and requires no installation at all. With this solution you can use your desktop from anywhere - from home, from work, from Internet cafes, hotels, everywhere where there is Internet and a Web Browser.
  • HidEM is a safe, fast and easy Security Solution Software that can protect your private data - in just seconds. Simply drag and drop files, folders, pictures, videos, drives, and even programs to the HidEM DropZone, then click "Lock" and have peace of mind that only you, have total access. HidEM will help you safeguard those data from unwanted access by both hiding and locking. Also HidEM protects data from viruses, trojans, worms and spywares because once protected, it can not be opened, modified, deleted, moved nor copied. Also you can delete all traces such as internet history, cookies, recent documents, etc. in your computer with just one click.
  • Rising PC Doctor, professional and smart security tool to computer users. With its seven key functions of automatic malware analysis, immunization of USB storage devices, ability to repair Microsoft Internet Explorer Windows, Trojan Behavior Detector Blocker, protection against malicious websites, Internet Explorer protection and Trojan Download blocker, Rising PC Doctor will greatly enhance your protection against malware and cyberthreats. Hightlights: Trojan Behavior Detector Blocker; Trojan Download Blocker; Automatic Malware Analysis; Key Features: 1. Completely Redesigned Vulnerability Scan; 2. Strong Ability to Repair Microsoft Internet Explorer Windows; 3. Powerful Process and Startup Management; 4. Advanced Tools for Experienced Users. 5. Spyware Scan Removal; 6. Strong Protection against Current Trojans; 7. Privacy Protection.
  • Cryptainer LE totally free 128 bit disk encryption software. Simple, easy to use encryption application that creates encrypted "vaults". One can store any kind of data in them. Cryptainer LE allows you to encrypt any file or folder on any Windows PC. Protects all types of Media and any type of data. Password protect any file or folder with strong Encryption. Send secure e-mail. Protects data on USB Drives, Flash Drives, CDs and HDDs. Freeware.
  • SL Password Generator is a program designed to generate random passwords. Program is fast, small and easy to use. SL Password Generator can create alphabetic, digits, alphadigits or all keyboard character passwords. Passwords list can be printed or saved.
  • Free invisible web browsing and keyboard activity logger. Record which websites are visited and which keys are typed on your computer. Monitor your spouse or child's computer usage activity or see if anyone has been using your computer while you are away. Compatible with all web browsers. One-click installer for easy deployment.
  • Data wiping tool wipe data from USB-flash drives, flash memory cards, picture cards and other storage devices. It also wipe the previously deleted file. It can clean deleted files, internet activities, recently opened documents like Microsoft PowerPoint, Word, Excel, Access, WordPad, Windows media player files etc. Software cleans unused disk space, internet history, cookies, cache documents, deleted private content, visited websites etc. It can increases computer performance and disk space of the system by eliminating all useless data stored on hard disk. It can remove sensitive data from your hard drive by overwriting it several times. Improve the speed of your computer, laptop, notebook and free valuable space taken by your computers history files. Program allows users to clean their drives from unnecessary and temporary files, including your browser cache, cookies, history, recent document list, temporary files etc. Data Wiping Software Features:- protect confidential data from misuse. ? Data wiping s ...
  • Protect your PDF files with passwords and prevent PDF files from being printed, changed, copied, extracted, signed, filled, assembled and/or merged. To decrypt PDF won't be difficult with this utility.
  • Windows keylogger monitoring software covertly capture and record visited web URL, username, chat conversation, passwords, copy or paste operation and all performed activities on your computer when you are gone away or busy. Undetectable keylogger utility is capable to run in hidden mode after this no one track its location on your hard drive. Advance keystroke monitoring program silently records every keystroke of keyboard along with date and time to their performing. Undetectable keylogger recording software can be used at home as well as in office to monitor the online/offline activities of children, spouse, employee and friend. Advance Keylogger application generates the reports of recorded data in text or html formats and invisibly delivers logs to your mailbox. Keystroke surveillance utility runs invisibly in your system background and records all typed keystrokes such as system keys, functional keys, alpha numeric keys etc in encrypted or hidden log file. Advance Keylogger recording tool is fully comp ...

Page 30 of 30
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30


Legal disclaimer | Privacy policy

© 2004-2020 IT Shareware