Home | Submit a file  |  New  |  Categories  |  Our awards  |  Link to us  |  RSS Feeds

Utilities :: Security & Encryption
Sort by: date | product title | rating | downloads | popularity
Display: short descriptions | full descriptions
  • Computer Spy Pro software secrectly logs all keystrokes, web sites, emails, chats & IMs: MSN Messenger, Windows Live Messenger, ICQ, AOL / AIM, Yahoo! Messenger, Windows Messenger and Skype. Takes screen snapshots at every X seconds like a surveillance camera. Displays exact activities, like MySpace, Facebook, PC games, online searches & shopping, file transfers and webmails. You can receive reports remotely via emails or ftp.
  • Computer Spy Pro software secrectly logs all keystrokes, web sites, emails, chats & IMs: MSN Messenger, Windows Live Messenger, ICQ, AOL / AIM, Yahoo! Messenger, Windows Messenger and Skype. Takes screen snapshots at every X seconds like a surveillance camera. Displays exact activities, like MySpace, Facebook, PC games, online searches & shopping, file transfers and webmails. You can receive reports remotely via emails or ftp.
  • Computer Spy Pro software secrectly logs all keystrokes, web sites, emails, chats & IMs: MSN Messenger, Windows Live Messenger, ICQ, AOL / AIM, Yahoo! Messenger, Windows Messenger and Skype. Takes screen snapshots at every X seconds like a surveillance camera. Displays exact activities, like MySpace, Facebook, PC games, online searches & shopping, file transfers and webmails. You can receive reports remotely via emails or ftp.
  • Computer Spy Pro software secrectly logs all keystrokes, web sites, emails, chats & IMs: MSN Messenger, Windows Live Messenger, ICQ, AOL / AIM, Yahoo! Messenger, Windows Messenger and Skype. Takes screen snapshots at every X seconds like a surveillance camera. Displays exact activities, like MySpace, Facebook, PC games, online searches & shopping, file transfers and webmails. You can receive reports remotely via emails or ftp.
  • Advanced keylogger application is an undetectable keyboard monitoring tool that records the real time keystrokes activities used for various windows application (word, excel, notepad and many more) and visited websites in password protected log file with date, time and session. Keylogger is a stealth PC monitoring software which is helpful for various companies to track all activities of their employees in total invisible mode such as typed website URL, records clipboard contents, online audio chat conversations, every keystroke with special keys and automatically deliver log file to specified email address. Advance keylogger is the best parental monitoring software as it helps parents to track child PC activities through what was typed, sent, received and visited. Keystroke surveillance utility not only monitors keystroke activities but also document printed, text and images sent to the clipboard, online voice chat conversations, system login sessions and even capture desktop screenshots at definite time int ...
  • Computer Spy Software monitors others' PC usage when you're away. It secretly logs all keystokes, online chats, instant messages, emails, web sites visited, applications run and more. It is a great tool to monitor activities about MSN Messenger, Yahoo! Messenger, ICQ, Skype, AIM, MySpace, Facebook, etc. Computer Spy Software takes screenshots like a spy camera. You can receive reports remotely via emails.
  • Computer Spy Software monitors others' PC usage when you're away. It secretly logs all keystokes, online chats, instant messages, emails, web sites visited, applications run and more. It is a great tool to monitor activities about MSN Messenger, Yahoo! Messenger, ICQ, Skype, AIM, MySpace, Facebook, etc. Computer Spy Software takes screenshots like a spy camera. You can receive reports remotely via emails.
  • Computer Spy tool is the best solution for monitoring as many computers in an organization from a centralized location. It helps in increasing work efficiency of employees and overall productivity plus profits of the organization. With deployment of Computer Spy tool, an employer comes to know how much time an employee works, spends his time in chatting, personal emails, reads online newspapers, busy in online shopping, etc. All the computer activities immediately come under scanner as tool gives LIVE preview of the ongoing activities. Not only monitoring you can perform various administrative operations on monitored computers using Computer Spy tool like Lock Computers, Restart Computers, Shut down Computers, Log Off Computers, Start Screen Saver, Remove Wallpaper. Online and Offline recordings are distinguished features of this marvelous Spy Tool. Free demo version of Computer Spy tool monitors 1 computer for 7 days. But once you purchase the licenses of software, you can monitor any number of co ...
  • Monitor other computer users activity without their knowledge. Computer Spying Keylogger utilizes state of the art tracking to secretly monitor children, spouse, employees and more.
  • Special Limited Offers available - See Web Site for Details As its name suggests, ComputerSafeTM provides an internal Safe inside your computer where you can store your vital information and protect yourself against identity theft and data security breaches. ComputerSafe safeguards a virtually unlimited number of files. Its unique combination of file protection, event recording, and notification messaging guards critical programs and data to protect against loss, corruption and unwanted access. File and Folder Locking, Hiding and/or File Encryption Select the protection you desire with a few mouse clicks, assuring your files and other assets are kept safe from any attempt to compromise your privacy. Violations are Tracked and Stored ComputerSafe records unauthorized access violations in a protected event-log file with a time and date stamped description of the threat. The system records key stroke activity that may provide clues as to the intruder's intentions or their identity. Notifica ...
  • Computer Monitoring Spy secrectly logs all keystrokes, web visits, emails, chats & IMs: MSN Messenger, Windows Live Messenger, ICQ, AOL/AIM, Yahoo! Messenger and Skype. It displays exact activities, like MySpace, Facebook, PC games, online searches & shopping, file transfers and webmails. It takes screenshots every X seconds like a spy cam. You can receive reports remotely via emails or ftp.
  • 100% Safe internet for kids! The Content Advisor Express Button will enable you to control the Content Advisor in order to block unwanted content and chats access in the fastest way possible while you are browsing the internet! The Content Advisor Express Button is smart and simple to use since you can see it on your Internet Explorer toolbar. You are more than welcome to watch our demonstration video at: www.keyds.com
  • Set time range for the computer to be used. Computer will be locked with username and password during unusable times.
  • Protect your media files from being illegally copied. Copy Protect offers copy protection of your personal files such as presentations, photos, audios and much more. You can highlight your talent by restricting anyone from copying your idea or invention using Copy Protect and have a complete peace of mind. This copy protection tool works on 32-bit and 64-bit versions of Windows 10/ 8/ 7/ XP and more.
  • CopySafe PDF provides the most secure copy protection for eBook and PDF documents and it is the only solution that can protect from all avenues of copy including Print Screen and screen capture. When applying DRM you can also prevent sharing with total control over print, password, and expiry protection down to the hour or day from first use. Ideal for secure distribution by email, download, on CD or displayed online from your web page.
  • Copysafe Web is the most secure solution available for copy protection of web pages and images from all methods of copying including Printscreen and screen capture. Copysafe includes all of the features found in Secure Image plus the Copysafe Web plugin to trap capture methods. Copysafe Web images and pages can be easily incorporated into all web projects for online catalogues, galleries, surveys, e-commerce and banking.
  • Network-based security software used for protecting PC workstations over a network. Impose access restrictions to network PC workstations, execute patches remotely, and schedule reboots, shutdowns, and Windows Explorer restarts. The software supports over 600 different security restrictions and tweaks that let you restrict access to almost every corner of Windows.
  • Wipe your web surfing and computer use activity permanently! Many programs and web browsers log data of which programs you run, which videos you watch, and which websites you visit. Easily and safely clean this saved data so the next person using your computer will never know your computer activity. Wipe activity history of dozens of programs such as FireFox, Internet Explorer, Windows Media Player, Yahoo, MSN, and Google.
  • CovertMail for Outlook Express helps keep your emails private. It provides complete privacy of your message store, protecting it from anyone who may want to access your correspondence without authorization. CovertMail hides the identity you specify (it won't be visible through Outlook Express anymore) and encrypts message store. You can get yourself two identities, a usual one and a secret one - the latter totally hidden from anyone.
  • Free for home and office use, Crawler Parental Control controls user activity on your computer. Easy to use, you can control children's or users' Web browsing, set access rights to software, hide folder content, schedule time limits for Internet and computer use and much more. It comes with free Web Security Guard to prevent entering potentially dangerous websites. Get comprehensive control of your computer and enhance its protection!
  • Crisystec Sentry takes care of all of your privacy concerns. With state of the art multiple auto stealth, only you would know Crisystec Sentry is working in the background collecting sensitive data and destroying it LIVE while still maintaining your privacy. You can also use the advanced settings to discover powerful additional cleaning facilities. Crisystec Sentry comes with a very attractive, XP style interface and is very simple to use
  • CrisysTec Sentry takes care of all of your privacy concerns. With state of the art multiple auto stealth, only you would know CrisysTec Sentry is working in the background collecting sensitive data and destroying it LIVE while still maintaining your privacy. You can also use the advanced settings to discover powerful additional cleaning facilities. CrisystTec Sentry comes with a very attractive, XP style interface and is very simple to use.
  • CrococryptMirror is an encryption tool which mirrors complete folders to encrypted folders. The encryption algorithms that are used are AES and Twofish (256 bits, cascading). The keyfile is secured by a password using PKCS #5 (PBKDF2) with a SHA512/Whirlpool based HMAC using 100000 iterations and also AES and Twofish. Mirroring can be done manually (on-demand) or by using the sync service which detects directory changes on the fly.
  • With Cryper you can encrypt single files or even complete directories. An easy workflow with a maximum of security, that what Cryper offers. Only a few clicks are necessary to feel save and the best, you can test it for free.
  • Crypt-o is a Client/Server password manager with many advanced features like strong data encryption, customizable databases, multi-user access, flexible permissions system, form filling, portable mode, Web access. Crypt-o is a secure Client/Server solution for creating custom databases, which is designed for use in enterprise networks. The data is reliably stored in Firebird SQL Server database and encrypted using AES algorithm with 256-bit key.

Page 19 of 30
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30


Legal disclaimer | Privacy policy

© 2004-2019 IT Shareware