Home | Submit a file  |  New  |  Categories  |  Our awards  |  Link to us  |  RSS Feeds

Utilities :: Security & Encryption
Sort by: date | product title | rating | downloads | popularity
Display: short descriptions | full descriptions
  • Invisible messenger spy software that records all Yahoo! Messenger incoming and outgoing chat text. Send reports to your custom email address or ftp. You can check all recorded messages by simply receiving emails or opening a web page. Use hotkey to unhide it from Stealth Mode and protect program access by password. Perfect for catching cheaters, monitoring employees, children or spouse, and even investigating crimes.
  • Have you ever wondered exactly what Svchost.exe is? The Svchost.exe process is part of the Windows operating system. It has become well-known because many trojans secretly latch onto the Svchost process to evade security software and firewalls. The free Svchost Process Analyzer tells you in seconds whether unwanted programs or trojans are misusing your Svchost process.
  • Hide or Encrypt any folder on your PC. With Stealth Folder, folders and files can't be deleted, viewed, modified, or run. Stealth Folder Operates in Stealth mode, special hotkey is required to pull it up. Stealth Folder is not visible in Start, Toolbar, Taskbar, Add/Remove Programs or CTL ALT DEL.
  • SpyPal secrectly records keystrokes, screenshots, websites visited, windows opened, applications, MSN, ICQ, AIM, Yahoo! IM, Skype, clipboard, passwords, emails, documents and more. In Stealth Mode, it is completely invisible to computer users. Use hotkey and password to access the program. Auto send logs to a preset email or ftp at set interval. Possible usages: monitors employees, children, spouse and investigate crimes.
  • Spy software that runs invisible and records how computer has been used. SoftActivity Keylogger records to an encrypted log file Internet history with web page titles, received and sent email (POP3/SMTP), IM chats, typed keystrokes and passwords, programs that user runs and work duration in every application. It can take screenshots of every action, working like video surveillance camera. Captured snapshots can be viewed later as a slide show.
  • SpyPal Yahoo! Messenger Spy software can secretly Secretly record all Yahoo! Messenger's incoming and outgoing chat text messages. It runs in a complete invisible mode. You can check all recorded messages by simply receiving emails or opening a web page. Perfect for catching cheaters, monitoring employees, children or spouse, and even investigating crimes.
  • The Flash Antidecompiler is a new generation of the flash obfuscators. It is very simple and at the same time secure enough. All Windows, Mac OS X, and Linux platforms are supported. All Flash, Flex, and ActionScripts versions supported. The commercial version supports all SWF standard web applications. The Flash Antidecompiler protects both ActionScript source code and multimedia content (images, audio, video, etc.) embedded in SWF file.
  • HomeGuard is an advanced parental control and activity monitoring tool for family and child safety online and offline. Once installed HomeGuard will silently and automatically block all pornographic and inappropriate content online and record detailed website activity including time of visit and time spent on each website. Plus a built in keylogger, activity based screenshots, chat and email monitoring and filtering, program/games blocking and time restrictions, Internet and computer usage time restrictions, email notifications and more. HomeGuard is virtually impossible to tamper with, it cannot be bypassed using proxy servers and is unclosable and uninstallable unless the administrative password (provided during installation) is used.
  • PCMate Free Keylogger is a free keylogger that records all keyboard actions, the exact words typed, the applications used & even the websites visited. With this easy-to-use surveillance tool, it is better to track activities of other people using your keyboard without your permission in your absence. Furthermore, it runs completely invisible and the continuous log report helps find out what other users do on your computer.
  • Remote Keylogger lets you monitor and record all activities on your computer, including:screenshots, web sites surfed, all keystrokes, clipboard copyed and pasted,password,application used,IM chatting(MSN,Skype,AIM,Yahoo messenger,ICQ), Facebook and Myspace used,USB Drive,CDRom,Documents printed, Microphone voice.It runs in background in totally stealth mode and send logs timely to your email in html format with image & audio embedded.
  • Ez PC Lock allows you to remotely control the PC access time of any computer that you allow your employees or contractors access to, anywhere in the World. You can Lock, Restart, turn the power off on any PC. Automatic PC Power OFF, Lock Down or Reboot, Separate time schedule for each day of the week, Works on any network and behind firewalls and proxies Communications between the server and clients secure and encrypted, Much more.....
  • Active Keylogger Home Pro - This is the best choice for you if you think that others are using your computer when you are not home or away from your working place. After you install Active Keylogger Home Pro on your computer, it will allow you to make program settings for tracking activities on your computer.If you enable "Run Active Keylogger Home Pro in Stealth Mode" then the program will run by full stealth for others, no one will even think t
  • Encrypt and convert word to exe with password protected, Support doc, docx, docm, The encrypted document can prevent from editing and copying. You can set whether or not allow your users to print document. You can also set multiple encryption modes. Easily distribute your files and protect it, only you can create open password for your users.
  • Free Key Log is free keylogger to record all keyboard actions, the exact words typed, the applications used and even the websites visited. It can run in hidden mode with no trace of the software, seemingly invisible to anyone and secretly monitor email, chats, internet navigation and all other behaviors of your employees, children, spouse, etc. Besides, it can backup the text you type, generate a log of entire keystroke activities automatically.
  • Can't you remember all your passwords and write them on slips of paper? The alternative solution is the software abylon LOGON SSO Home. During the Windows login you must insert only a smart card, a CD or a USB flash drive and an optional password. The windows login and all further password and user-name inputs will be done automatically by the software. And when you remove your key, the computer will be logoff or shutdown immediately.
  • Free Kids Keylogger is the most powerful surveillance keylogger for monitoring and recording every detail of PC and Internet activity at home and in the office. Additionally, it's a totally invisible keystroke recorder! While the demo version might be detected by some antiviruses, all registered clients get the special version of iSafe Keylogger which cannot be detected and is daily updated for them.
  • The free product can hide and protect folders on your computer to ensure security of your privacy. It is very useful if you want to keep your files away from peoples's prying eyes. The hidden folders are invisible in Windows Explorer and can not be found by Windows Search. Absolute Folder Hider is very easy to understand and use. Lauch the program, add folders and click Hide button. Done! You can protect your folders with just these 1-2-3
  • PowerCryptor Free Edition is a program to password protects your documents, photos, music, videos and other. Just right-click on file or folder in windows explorer and choose Encrypt. PowerCryptor Free Edition makes it as easy to open, edit and save encrypted files, as it is to work with unencrypted files. This way, your privacy protection is ensured and no one will be able to access your confidential data.
  • Pdf encryption software is devised to lock pdf documents pdf password protection and various user level restrictions. Pdf encryption software is Windows based advanced utility lets users to protect pdf files with two types of password user password and owner password. Protect pdf document with open password security by locking it with user password i.e. only targeted users can open and view pdf content after supplying correct open password. Pdf author can also protect document for various restrictions like disabled pdf printing, disallow pdf editing, denied pdf form filling, locked pdf content copying etc. Owner/master password is required to apply these restrictions on document. Locking document with user password and owner password ensures that only targeted authorized users can use this pdf document for view, edit, print and copy. Encrypt pdf document with 128 bit and 40 bit RC4 encryption level security. User can disable pdf print, edit, copy, form fill, sign, comment, copy for accessibility and page extr ...
  • Spy Camera Software secretly logs all their Facebook activity, chats & IMs, emails, web visits, web cam images, applications use, documents opend, online searches, user names and passwords. Logs will be sent to your email and you can check it no matter where you are. It runs secretly with Windows startup. Users won't know it is running. However, the software's administrator can bring it back with hotkey and change settings or check logs.
  • PC Spy Monitor secrectly records keystrokes, screenshots, websites visited, windows opened, applications run, Skype, Windows Live Messenger, MSN Messenger, ICQ, AIM / AOL, Yahoo! Messenger, passwords, emails and more. In Stealth Mode, it is completely invisible to computer users. You can use hotkey to it. Send logs to a preset email or ftp at set interval. Usages: monitors employees, children, spouse and investigate crimes.
  • As we know, employees often do not use all their time on the job for work related activities. They chat with their friends, watch movies, take away company's secret and confidential data via flash drives. Employer Surveillance helps in improving the productivity of your employees by blocking activities that are not work related such as instant messengers, entertainment content, social networks. It helps in protecting your company's security.
  • SpyPal Email Spy software secretly monitors and records all emails opened in popular email clients, such as Microsoft Outlook 2000/XP/2003/2007, Microsoft Outlook Express 5/6, Windows Vista WinMail and IncrediMail. It runs in a complete invisible mode. You can check all recorded messages by simply receiving emails or opening a web page.
  • Have you ever wished that you can keep praying eyes away from your private files? With this File and Folder Hider, you can easily protect private data on your computer that you don't want anyone to see. You can lock and hide any files and folder on your system by just a few simple clicks, and the locked files will no longer be accessible by anyone but YOU. Lab Loveholic's file and folder hider is used to protect any files and folders.
  • Kernel for Access Password Recovery is a competent Access password recovery tool that restores the actual password of protected Access database file. Since Access database files (.MDB files) are protected using strong encryption algorithms, software for recovering password of such files should be highly efficient. Access password recovery software restores the password of such files without considering length and complexity. Moreover, the software supports recovery of multilingual passwords, so that Access database files that are protected with multilingual passwords can be accessed easily. Access password recovery software supports password recovery for Access database files created using Microsoft Access 2003, XP, 2000, and 97. The password recovery capabilities of the software can analyzed with demo version. The demo version is available for free download and enables the user to recover first two characters of the selected Access file. For recovering the complete password, full version of Access password r ...

Page 21 of 30
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30


Legal disclaimer | Privacy policy

© 2004-2020 IT Shareware