Home | Submit a file  |  New  |  Categories  |  Our awards  |  Link to us  |  RSS Feeds

Utilities :: Security & Encryption
Sort by: date | product title | rating | downloads | popularity
Display: short descriptions | full descriptions
  • Sonar Lite is easy and smart in use software for work space and flat area acoustic control. Successfully works to control home employees of nanny housemaid class. Sonar Lite can easily keep under audio-control a room of 35+ square meters and neighboring apartments. Easy and quality records multi-parts' Skype and same software call dialogs without any computer stressing. Counts its time of possible unstoppable work, offers microphones sensitivity settings, time-period parameters and formats for output files. The inner software audio-player allows to work with recorded files easy and fast. Sonar Lite is protected from any direct access to the software interface and is equipped with hidden mode inside the system. Sonar is the multifunctional software that is useful for parental control purposes, as spy audio-recorder for Skype dialogs, as alarm-system solution or just for apartment monitoring. Sonar usage: - Acoustic apartments control - Audio-monitoring of work place - Skype dialogs recording - ...
  • If you share your computer with others, you may want some extra security for your personal files and folders. Folder Password Expert is the answer. This security software program allows you to put different passwords on folders of your choice so that other users cannot read your diary, examine financial documents or mess up with your work files. Folder Password Expert was successfully tested on Windows 7, Windows Vista, and Windows XP.
  • Security Tracker employee monitoring is a powerful and flexible system for the control of the staff working hours usage in a network or on a terminal servers. There are many of the software to solve a similar problem. Part from them - simply spyware programs intended first of all for capturing of user`s keystrokes, passwords and various messages.
  • Best Password Manager is a easy-to-use and very popular tool. Manage ALL Passwords with One Phrase. When you log on to Password Manager with your Master Pass Phrase you will have instant access to all of your password protected websites.
  • Installing this program before your browsers are infected by malware or viruses gives you a free browser to surf the internet. Don't wait until your system is disabled to download this tool that is necessary to have before your browser is crippled and disabled. This rescue utility browser will run even when your system is infected. Regain the ability to surf the net and download software with this protected browser. You need this tool installed while your system is free from malware. Built in pop up blocker included kills any new window that appears. Saves you frustration by giving you access to the internet again. New app killer added that searches constantly for unauthorized applicatons and shuts them down for you to delete them. Use as a malware shield and app killer for constant protection. Saves endless hours reloading damaged programs from malware attacks. Buy any one program from our home page and get one program of equal or lesser value free!
  • Invisible Spy Software secretly logs Facebook, keystrokes, chats, IMs, emails, websites visited, microphone, video talk, logins, passwords, applications, searches, documents and more. Logs Skype, Yahoo Messenger, MSN, ICQ, AIM, etc. Takes screenshots every x seconds like a spy cam. Sends logs to your email. You can check logs on a remote PC, tablet, smart phone, or directly on the monitored PC. Perfect for monitoring employees, kids and s
  • PC Spy Software logs all Facebook, PC & internet use and emails log reports to you. PC Spy Software logs all keystrokes, chats & IMs, emails, web sites visited, applications, usernames, passwords, documents opened, online searches...takes screenshots like a spy cam. PC Spy Software runs invisibly and PC users won't know its existence. Great for monitoring employees, children, spouse and investigating crimes.
  • Information security Keylogger NET Plus system consists of Spying for users system activity module sending collected data in XLS format to your E-mail address 4 times a day. Keylogger NET Plus is powered with the keyboard spy logging each keystroke, the module recording all Internet sites, search queries, system applications, clipboard. Keylogger saves collected data in encrypted mode and sends them to your E-mail address as a simple XLS file that You can easily open with MS Excel, OpenOffice and other applications. Keylogger NET Plus is the software product suitable first of all for people whose work is connected with huge data amount that can be restored anyway regardless of whether it was saved or just typed. You will not loose data typed on your computer keyboard. It is the good program for parental control and employees control purposes with the function of sending all collected data to your E-mail address. The software records each application start, remembers passwords, Internet addresses and sea ...
  • Skype Spy Monitor secretly record Skype's incoming and outgoing chat messages. It runs completely invisibly so that Skype users won't know its existence. Skype Spy Monitor send log reports to your email or ftp periodically. You can also check logs directly on the monitored PC. It is a small but powerful program that consumes very little system resource. Perfect for monitoring employees, children or spouse, and even investigating crimes.
  • Employees PC Monitor allows you invisibly monitor your entire network from one contralized position, such as instant message, Files operation, websites visited, applications used, etc. Employees PC Monitor also can log file operations on employee's computer, such as copy, delete, print,create, rename, open, copy file to removable disk, etc.
  • PDF Decrypt is a perfect tool that lets you to decrypt protected Adobe Acrobat PDF files, which have "owner" password set, preventing the file from editing(changing), printing, selecting text and graphics(and copying them into the Clipboard), or adding/changing annotations and form fields. Decrypted file can be opened in any PDF viewer(e.g. Adobe Acrobat Reader)without any restrictions -- i.e. with edit/copy/print functions enabled. All versions of Adobe Acrobat are supported. The standard security provided by PDF consists of two different methods and two different passwords. A PDF document may be protected by password for opening ('user' password) and the document may also specify operations that should be restricted even when the document is decrypted: printing; copying text and graphics out of the document; modifying the document; and adding or modifying text notes and AcroForm fields (using 'owner' password).
  • Facebook Activity Spy secrectly logs all Facebook use, keystrokes, web visits, emails, chats & IMs: Windows Live Messenger, Yahoo Messenger, Skype and other IMs. It logs applications, documents, clipboard, user names, passwords, video talk, video played and more. It also takes screenshots at every X seconds like a surveillance camera. It runs invisibly so that monitored users won't know it. You can receive log reports remotely via email
  • Power Spy Keylogger spy software can secretly record all keystrokes typed on your computer. It runs completely invisiblely. You can check log reports by simply receiving emails or opening a web page. Power Spy Keylogger is perfect for catching cheaters, monitoring employees, children or spouse, acquiring others' passwords and even investigating crimes. Use hotkey to unhide it from Stealth Mode and protect the program access by password.
  • Keylogger Spy Software can secretly record all keystrokes typed on your computer. It runs completely invisiblely. You can check log reports by simply receiving emails or opening a web page. Keylogger Spy Software is perfect for catching cheaters, monitoring employees, children or spouse, acquiring others' passwords and even investigating crimes. Use hotkey to unhide it from Stealth Mode and protect the program access by password.
  • Folder Protector is the software that can hide the folders.This ensures the privacy and security of the private data.It comes with strong password protection so that no other person could change its settings.Any number of folders can be hidden by this software.Hiding a folder is very simple process.Just add the folders to the protected folder's list and click on button "Hide the folders".Once hidden,folders wll not appear in the pc.
  • SpyPal secrectly records keystrokes, screenshots, websites visited, windows opened, applications, MSN, ICQ, AIM, Yahoo! IM, Skype, clipboard, passwords, emails, documents and more. In Stealth Mode, it is completely invisible to computer users. Use hotkey and password to access the program. Auto send logs to a preset email or ftp at set interval. Possible usages: monitors employees, children, spouse and investigate crimes.
  • Lazesoft Recover My Password Home Edition is a very easy to use Windows password recovery freeware. With its simple sleek interface, novice users can enjoy the step-by-step wizard in recovering Windows password job. It allows home users to reset their lost Windows logon password easy and instantly. It allows users to retrieve product keys from unbootable Windows installations. It creates a Windows password recovery CD. And most of all, it's the most popular and safe solution for recovering your Windows password until now. New Features: * Resets passwords with a bootable USB drive. * Retrieve product keys from unbootable Windows installations! * WinPE Recovery CD Builder! Main Features of Lazesoft Recover My Password Home Edition: * 100% recovery rate. * Let you recover your administrator's password with a few clicks. * Easy to install and use with a very handy and clear user interface. * Automatically detects several operating systems installed on t ...
  • Aobo Keylogger for Mac Professional is one of the most professional keystroke logger for Mac that records keystrokes and passwords typed, websites visited, instant messenger chat conversations, posts on social networks, captures screenshots and so on. To make sure that users can check logs remotely, the logs will be secretly sent to your email or FTP. You can use it to monitor home computers, supervise your employees and get your stolen Mac back.
  • www.freewarekeylogger.us offers best solution for all small and large business industries to record workers activity in minimum cost and time. Computer monitoring program provides complete solution to trace user activities including both side chat conversation, compose emails, clipboard action, internet surfing history, user name and time spent on computer, accessed websites, type keyboards, online search or similar type of activity on system. Freeware Key logger easily runs in hidden so other external user does not know about any program installation on computer system. Keystroke recorder program provides detail monitoring about single pressed keystroke activity even if you are many miles away from your system. PC monitoring program helps organization to improve their business productivity on checking regular employees activity performed on office system. Freeware Key logger software is beneficial to record all search engines activities like Google, MSN or Yahoo. Visual surveillance Key logger tool facilitat ...
  • Extract and analyze digital evidence. The Enterprise edition of Belkasoft Evidence Center enables team work with full collaboration support, adding user and permission management to the already impressive list of features. Extracting more than 250 types of artifacts, the tool scans hard drives and analyzes page files, hibernation files and live memory dumps for IM and social communications, Web browsing activities, documents and emails.
  • Invisible messenger spy software that records all Yahoo! Messenger incoming and outgoing chat text. Send reports to your custom email address or ftp. You can check all recorded messages by simply receiving emails or opening a web page. Use hotkey to unhide it from Stealth Mode and protect program access by password. Perfect for catching cheaters, monitoring employees, children or spouse, and even investigating crimes.
  • The program locks desktop Windows on the lock. After you have closed the program on the lock, on a desktop cockroaches will run, they can be pressed which cursor of the mouse they are afraid, and also it is possible to choose in program adjustment an electronic eye or cockroaches.
  • An all-in-one ID and link management system for online marketers. You can save more than 10 different details, including the login name, password, login link, cloaked link, tracking link and payout info. The software comes with a powerful search and organization feature that allow you to easily organize and search for the info that you want. The software is protected by a Master Login Password so that no one will have access to your details.
  • Quickly secure your computer with the built-in functionality of Windows. Useful for protecting your desktop while stepping away, and is different from other utilities because no screen saver is required.

Page 18 of 30
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30


Legal disclaimer | Privacy policy

© 2004-2020 IT Shareware