Home | Submit a file  |  New  |  Categories  |  Our awards  |  Link to us  |  RSS Feeds

Utilities :: Security & Encryption
Sort by: date | product title | rating | downloads | popularity
Display: short descriptions | full descriptions
  • Fleet tracking software by RedBrickSecurity uses GPS signals and manages the data as per the required rule set. Fleet tracking software module will upload data, convert into encoded text and send the coordinate via a data bearer such as SMS, Email and Byte array to any desired location. Obtains GPS Data in NMEA format. Can handle data as per defined rule sets. Data can be logged on local device for delayed analysis or retrieved real time mapping.
  • cBlasterPRO is the Best Cell Phone Surveillance Software which provide monitoring child/Employee communication, ensure security and location, corporate Reporting Available, Remote server to handle requests. cBlaster provides SMS/Text Message, Web History/BBM, Location, Voice Call Log, Remote control for parents and employers and Photo clicked by your Child's Camera.
  • cBlaster is the Best Cell Phone Surveillance Software which provide monitoring child/Employee communication, ensure security and location, corporate Reporting Available, Remote server to handle requests. cBlaster provides SMS/Text Message, Web History/BBM, Location, Voice Call Log, Remote control for parents and employers and Photo clicked by your Child's Camera.
  • cBlasterPRO is the Best Cell Phone Surveillance Software which provide monitoring child/Employee communication, ensure security and location, corporate Reporting Available, Remote server to handle requests. cBlaster provides SMS/Text Message, Web History/BBM, Location, Voice Call Log, Remote control for parents and employers and Photo clicked by your Child's Camera.
  • Hauberk Parental Control - complete control of the kid in the Internet: Protect your kids from pornography, vulgar words and unwanted contacts in Internet; Monitor how long and when your kid uses the Internet; Know what web resources your kids visit; Manage Parental Control remotely.
  • With the Security Setting function of PDFCool, you can control who can access to your documents and what actions they can perform once they have the password. Depending on your needs and the intended audience, you can choose between 128-bit RC4, and 128-bit AES encryption.
  • SPYERA- PHONE version is software that you install on a mobile phone. After installation, SPYERA secretly records events that happen on the phone and delivers this information to a web account, where you can view these reports 24x7 from any Internet enabled computer or mobile phone. SPYERA PHONE version also allows you to listen live calls, listen surroundings of the target mobile, and to know the location of the device.
  • CopySafe PDF provides the most secure copy protection for eBook and PDF documents and it is the only solution that can protect from all avenues of copy including Print Screen and screen capture. When applying DRM you can also prevent sharing with total control over print, password, and expiry protection down to the hour or day from first use. Ideal for secure distribution by email, download, on CD or displayed online from your web page.
  • Dump Truck for Windows is an application that allows you to securely store, sync and share all your photos, files and documents online and access them anywhere. Dump Truck doesn't rely on 3rd parties to store your data or use data deduplication to inspect your data. We own our storage infrastructure and store 3 copies of each file using 256-bit encryption. Android, iOS & Mac apps are also available. Download Dump Truck and get a free 5GB account!
  • Supports Adobe Standard 40-bit Encryption and Adobe Advanced 128-bit Encryption. Supports AES encryption. Password protect opening of the document. Supports user password and owner password. Prevent printing of the document. Prevent copying of text/graphics. Prevent changes to the document. Supports add printing, copying and changing permissions to an encrypted PDF file. Set the document title,subject,author,keywords,creator,producer to the encrypted PDF file(s). Supports PDF1.8 protocol . Adobe Acrobat doesn?t need to be installed. Convert without any software support. Support Batch convert. Fast speed conversion. FREE upgrade.
  • PassMem is one of the latest solutions created for secure password storage and a reliable and easy way of safely managing passwords, sensitive data, access codes, crucial dates, figures, numbers, and more. This application is the perfect tool to manage your passwords, secret IDs, PINs, TANs, etc. PassMem stores your passwords in a strongly encrypted local database consisting of a single file allowing easy transfer from one device to another
  • Extremely easy to use, safe and reliable way of keeping your PC clean. It's loaded with some excellent features, such as File Shredder and Cookie Browser, that will assist you to maintain your PC strictly Private as well as clean.
  • True System Security Tweaker is a freeware security utility for tweaking and optimizing Windows operating system. It can simply be used as a portable application to customize and secure your PC to meet your safety requirements. You can define access level to lots of Control Panel applet functions. Use it to disable system features for certain user profiles. The Delphi source code is available too.
  • Password Generator is designed to create a much securer passwords for either important data saving or privacy protection. It can generate highly secure random passwords that are almost impossible to crack. This tool allows you to make case sensitive passwords or include numbers. It also shows odds of guessing the password you generate. This tool is safe, secure, and free!
  • Advanced PDF Protector automates the task of protecting PDF documents with user (document open) password, owner (permissions) password and various PDF security permissions. The application automatically imports all unsecured PDF documents from a specific directory and all of its subdirectories. Alternatively, users can manually import PDF documents that need to be secured.
  • PC Security tweaking software to tweak Windows-based computers. Tweak access to lots of Control Panel applet functions, enforce users to use separate system profile folders, disable selected Start Menu items, lock and protect disk drives in My Computer, disable the DOS and command prompt, interruption boot keys, real DOS mode, Registry editing, taskbar, task manager, and network access, hide desktop icons, and much more.
  • Desktop security solution for personal or publicly accessible computers. It disallows unauthorized changes to various settings of the Windows system, such as Control Panel, Desktop, Local Security Policies, Outlook Express account settings, etc. Disable access to local hard disks, Floppy, CDROM, and removable drives or make them read-only. By locking and hiding or making read-only of programs, files, and folders.
  • Password-protect and hide your files and folders with a click of mouse. The program will always prompt to enter your access password when protection is enabled and a user is trying to access a protected file or folder. The protected file or folder will become accessible only is a valid password is entered. Windows Explorer integration is supported and upon installation the program creates convenient items in the context menu of Windows Explorer.
  • Protect your files from being executed, viewed, changed and deleted. It will automatically enable a chosen protection based on currently logged-in user, current time and the schedule you specify. Disable Internet access, certain games and other software applications during certain periods of time (working hours, for example). Use different sets of applications in different time windows for different users.
  • Encrypt My Information allows you to hide folders and encrypt files with on-the-fly AES encryption. Just create one or more encrypted secure folders from local folders and move your sensitive files into these specified folders and they will be encrypted/decrypted in real-time. You can work with the files as usual, and when you finish, lock the secure folder, which will store the files securely and also hide the entire folder from view.
  • Hide or restrict access to removable media devices such as CD, DVD, floppy, flash and USB drives, and deny access to partitions of your hard disk drives with the program. Stop copying data between removable media and hard disk drives, deny access to removable media, protect your PC against unauthorized software installations and prevent data leaks through removable media.
  • Comprehensive solution to produce public PC and kiosk desktop terminals that are intended to work without supervision. Disable access to the local files and give the full access to the necessary applications only. Allow using Internet Explorer and disable all other software. Bulletproof Public PC is good for public libraries, Internet cafes, online terminals and in-store kiosks. User profiles and time-locked codes are also supported.
  • Desktop locking security utility to protect desktop when you are not near PC. Password protection can be automatically activated on boot or with a click of an icon in the system tray. Log access attempts and enforce a custom background image. Simple messaging system allows your visitors to leave short messages on your locked desktop. Two locking methods are supported: with hiding your desktop; and without hiding to allow others to see desktop.
  • Free Cleaner is PC-Cleaning software. It protects your privacy online and makes your computer faster and more secure. It will safely clean Windows temporary files with a few clicks and enable you to enjoy a cleaner and more efficient PC.
  • Virtual Machine's emulates all aspects of an actual computer and creates a separate environment for running operating system. Each operating system is logically isolated with host server and also multiple such VMs running simultaneously on the same host physical server. Virtual servers provide great cost benefits as opposed to real physical server. This encourages people to run many applications and services on these virtual servers. The application, that is running within the virtual servers need to be running all the time. Any outage or performance degradation in the virtual servers, will affect the applications and services running on them, resulting in a bad user-experience. Hence it becomes imperative to monitor and manage those virtual servers continuously at all times so that you know early enough about a possible problem, before it translates into substantial loss of revenue. The "ManageEngine HyperV Configuration Tool" free tool addresses this requirement. The ManageEngi ...

Page 18 of 30
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30


Legal disclaimer | Privacy policy

© 2004-2020 IT Shareware