Home | Submit a file  |  New  |  Categories  |  Our awards  |  Link to us  |  RSS Feeds

Utilities :: Security & Encryption
Sort by: date | product title | rating | downloads | popularity
Display: short descriptions | full descriptions
  • Extract and analyze digital evidence. The Enterprise edition of Belkasoft Evidence Center enables team work with full collaboration support, adding user and permission management to the already impressive list of features. Extracting more than 250 types of artifacts, the tool scans hard drives and analyzes page files, hibernation files and live memory dumps for IM and social communications, Web browsing activities, documents and emails.
  • Kurupira Web Filter, free parental control software: block improper websites, filter content and control the time spent on the web. Your safety in the digital jungle.
  • bio-iVault uses the well respected myBiometrix Biometric platform to deliver Finger, Face and Voice recognition to securely create and manage biometric Encrypted Virtual Drives on a computer and other external storage devices by simply scanning ones biometric. The bio-iVault drives appears just like a normal drive in Explorer, so you can create, edit and delete files and folders just as you would on a normal drive however data is encrypted
  • Keylogger Spy Monitor spy software can secretly record all keystrokes typed on your computer. It runs completely invisiblely. You can check logging reports by simply receiving emails or opening a web page. Perfect for catching cheaters, m onitoring employees, children or spouse, acquiring others' passwords and even investigating crimes. Use hotkey to unhide it from Stealth Mode and protect the program access by password.
  • Privacy Winner is the most powerful privacy software to eradicate Internet traces and program activities; it is also the easiest way to erase your Internet history, Windows history, Search history and Chat history. Just one-click erase puts your pc privacy under control.
  • Installing this program before your browsers are infected by malware or viruses gives you a free browser to surf the internet. Don't wait until your system is disabled to download this tool that is necessary to have before your browser is crippled and disabled. This rescue utility browser will run even when your system is infected. Regain the ability to surf the net and download software with this protected browser. You need this tool installed while your system is free from malware. Built in pop up blocker included kills any new window that appears. Saves you frustration by giving you access to the internet again. New app killer added that searches constantly for unauthorized applicatons and shuts them down for you to delete them. Use as a malware shield and app killer for constant protection. Saves endless hours reloading damaged programs from malware attacks. Buy any one program from our home page and get one program of equal or lesser value free!
  • Information security Keylogger NET4XT consists of Spying for users system activity module and Keylogger data Viewer module that can be installed as into the system and on a removable device(USB flash drive). Keylogger NET4XT is powered with keyboard spy logging each keystroke, the module recording all Internet sites, search queries, system applications, clipboard data. Keylogger saves and sends to Viewer the collected data as the encrypted container protected by your password that knows noone but You to encrypt data in the spy module and to decrypt the received data in Viewer. Keylogger NET4XT is the Best program for parental and employees control purposes with the function of sending all collected data to secure Viewer. All data-transfer is proceed in the encrypted mode that secures it from been watched by any third part. Keylogger Viewer shows all structured data. Viewer Calendar allows to follow data by history. The built-in search system can easily find all data You need and add it into Favorites area. ...
  • Security Tracker is a powerful and flexible employee monitoring software for the control of the staff working hours usage in a network or on a terminal servers. There are many of the software to solve a similar problem. Part from them - simply spyware programs intended first of all for capturing of user`s keystrokes, passwords and various messages.
  • SpyPal Invisible Spy secrectly records keystrokes, screenshots, websites visited, windows opened, applications, MSN, ICQ, AIM, Yahoo! IM, Skype, clipboard, passwords, emails, documents and more. In Stealth Mode, it is completely invisible to computer users. Use hotkey and password to access the program. Auto send logs to a preset email or ftp at set interval. Usages: monitors employees, children, spouse and investigate crimes.
  • SpyPal Invisible Spy secrectly records keystrokes, screenshots, websites visited, windows opened, applications, MSN, ICQ, AIM, Yahoo! IM, Skype, clipboard, passwords, emails, documents and more. In Stealth Mode, it is completely invisible to computer users. Use hotkey and password to access the program. Auto send logs to a preset email or ftp at set interval. Usages: monitors employees, children, spouse and investigate crimes.
  • Active Directory Reports enables Active Directory computer Reports Active Directory OU Reports Active Directory User Reports Active Directory Group Reports Active Directory NTFS Reports Active Directory Passwords Reports Active Directory user logon Reports Active Directory GPO Reports for account lockout policy AD Reports for Last log on
  • Free Window Sweeper is a free privacy clean-up tool that allows you to remove Internet and computer traces, browser history, cookies, index.dat files, typed URLs and more. It also offers support for many 3rd party applications, and can clean custom file, folder or registry locations. It also has a cookie keeper and secure deletion method.
  • Lock your desktop with one mouse and prevent anyone from accessing your programs and your importand data, no one can access your locked desktop without the valid password, mte desktop locker provide the following features: - lock your desktop with virtual desktop, - you must enter valid password to access the desktop, - show custom alert to any one try access your locked desktop, - you can select from many virtual desktop lockers, - mte desktop locker prevent access to task manager program in the locker mode, - mte desktop locker prevent access to the following keys: (CTRL+ALt+Del), (Alt+F4) to prevent closing the application, - you can lock your desktop with transparent desktop locker, - mte desktop locker provide log feature that enable you record all mouse clicks and invalid passwords input to know if someone try to open your protected desktop, - program allows you to set password to protect the options dialog for more security, - you can set the program to run at windows startup, - program allows you to p ...
  • PDF Encryption Software is an exigent and exemplary ?Standalone? application which is developed under and runs on Windows platform to make pdf document password protected (encrypt) from unauthorized access and allows security in two ways ?user/ owner password protection. Pdf Password protected document used to prevent pdf file from content copying, printing, merging files, changes in date and time, modification to subject, title, subtitle, and illegal signature etc. PDF Encryption software provides high security to imperious pdf file needed for discussion, conference meeting, contract papers etc. PDF Encryption Software possess high intelligent processing speed with pdf batch transformation operation to password protected pdf file (encrypt document) without distortion to source file (PDF File) which saves time and effort of professionals. Encryption Application supports all properties and settings of pdf formats and disabled action performed at time of information access without key password to ma ...
  • Hide or Encrypt any folder on your PC. With Stealth Folder, folders and files can't be deleted, viewed, modified, or run. Stealth Folder Operates in Stealth mode, special hotkey is required to pull it up. Stealth Folder is not visible in Start, Toolbar, Taskbar, Add/Remove Programs or CTL ALT DEL.
  • PC Spy Monitor secrectly records keystrokes, screenshots, websites visited, windows opened, applications run, Skype, Windows Live Messenger, MSN Messenger, ICQ, AIM / AOL, Yahoo! Messenger, passwords, emails and more. In Stealth Mode, it is completely invisible to computer users. You can use hotkey to it. Send logs to a preset email or ftp at set interval. Usages: monitors employees, children, spouse and investigate crimes.
  • SpyPal Yahoo! Messenger Spy software can secretly Secretly record all Yahoo! Messenger's incoming and outgoing chat text messages. It runs in a complete invisible mode. You can check all recorded messages by simply receiving emails or opening a web page. Perfect for catching cheaters, monitoring employees, children or spouse, and even investigating crimes.
  • Smart Password Manager is a secure password manager and intelligent form filler software, help you store and manage your passwords or other important information securely and conveniently, remember the login or form information of websites and auto-fill them in by one click. And it has built in a strong password generator that can generate random passwords for you. It supports multi-user application, can backup and restore your data easily.
  • The file-safe automatically encrypts all files in the CRYPT-folder without entering the password every time. The the one-time entry of the password is sufficient to access the saved files and unauthorized users can not open this. Changes in the files will be updateded in the encrypted files automatically and the file-based design enables simultaneous access to multiple authorized users.
  • Security Tracker computer monitoring is a powerful and flexible system for the control of the staff working hours usage in a network or on a terminal servers. There are many of the software to solve a similar problem. Part from them - simply spyware programs intended first of all for capturing of user`s keystrokes, passwords and various messages.
  • Enhanced version of invisible keystroke log monitoring tool provide facility of recording various user typed entries including email information, printing activities, chat conversations etc. With its email feature user can watch all external user activities at remote PC by capturing screenshots of all running applications including visited websites, search engine results, email information etc. Computer monitoring software sends captured screenshots at specified email address or using FTP settings at certain time intervals. Windows keystroke recording tool is very useful for monitoring work and activities of employees in office and of children by parents at home. Keystroke logging tool is extremely useful utility in case when user fails to save his important work-documents due to power failure or illogical system shut down as software is capable of restoring all previous tasks from recorded log files. Computer monitoring software has following main features: * PC surveillance software helps you to monitor a ...
  • * Find Your Computer Using Geo Location Tracking * Securely Backup Your Important Data and Files * Your Personal Data & Identity is Safe With Snuko's Heavy-Duty Data Encryption * Identify Thieves With Your Webcam * Internet Protocol address (IP address) Tracking * What Has The Unauthorised User Been Looking At on Your Computer? * Computer Lockscreen * Reporting With so much information stored on computers and laptops it is crazy not to have a secure backup and anti-theft solution. Anti-Theft software by Snuko is the perfect way to protect your data and help you recover lost or stolen equipment. Key Features * Find Computer Feature * Spy Camera * IP Address Lookup * Screenshots * Automatic secure data backup stored in the cloud * Data Recovery * Data Encryption * Lock Screen Feature * Report Generator * Wifi Hotspots Wireless Connection * User friendly mobile control panel * Finders Contact Details * Device Alert Notifications * Tamper Proof
  • Power PC Keylogger secretly logs Facebook, keystrokes, chats, IMs, emails, websites visited, microphone, video talk, logins, passwords, applications, searches, documents and more. Logs Skype, Yahoo Messenger, MSN, ICQ, AIM, etc. Takes screenshots every x seconds like a spy cam. Sends logs to your email. You can check logs on a remote PC, tablet, smart phone, or directly on the monitored PC. Perfect for monitoring employees, kids and spous
  • SpyPal Yahoo! Messenger Spy software can secretly Secretly record all Yahoo! Messenger's incoming and outgoing chat text messages. It runs in a complete invisible mode. You can check all recorded messages by simply receiving emails or opening a web page. Perfect for catching cheaters, monitoring employees, children or spouse, and even investigating crimes.
  • SecureTower is your ultimate solution for data leak protection. An advanced and extremely effective system, it will help you to monitor how the Internet resources in your company are being used. You can stay in complete control by being constantly aware of any unauthorized attempts to transfer confidential information over the Internet. It keeps track of all user activities in the network and immediately notifies you if it detects leaking data

Page 20 of 30
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30


Legal disclaimer | Privacy policy

© 2004-2020 IT Shareware