Home | Submit a file  |  New  |  Categories  |  Our awards  |  Link to us  |  RSS Feeds

Utilities :: Security & Encryption
Sort by: date | product title | rating | downloads | popularity
Display: short descriptions | full descriptions
  • Software secretly monitors every keystroke on your computer, active window titles, and Internet URLs. The program can secretly email the captured information to user. KEY FEATURES: Detects when predefined or custom trigger words are typed in any program and automatically emails and/or saves the information to an encrypted file for the user to view anytime. The ability to monitor EVERY keystroke. Virtually undetectable when running.
  • Active Keylogger Home - This is the best choice for you if you think that others are using your computer when you are not home or away from your working place. After you install Active Keylogger Home on your computer, it will allow you to make program settings for tracking activities on your computer.If you enable "Run Active Keylogger Home in Stealth Mode" ...
  • SkyCrypt is a FIPS 140-2 validated Cloud Encryption Gateway. It allows users to add 256 bit AES encryption to local drives, Google Drive, Dropbox, Bitcasa, SkyDrive or most any other cloud storage service. SkyCrypt features include : NIST FIPS 140-2 validation, AES 256 bit encryption, optional 2 factor authentication via Google Authenticator for IOS or Android, and encrypted file names
  • The notes nsf local security software enables the user to access that NSF database which is under local security. That is, by using the notes nsf local security removal tool the user can remove local security which is set on the NSF database. It is susceptible of handling the numerous error messages which the user face while accessing the unauthorized NSF database such as "You are not authorized to access that database" and "You are not authorized to perform that operation". Despite of having such a wondrous capability to solve such complicated errors, this software is extremely simple to use and does not require much technical efficiency to get operated by the user. Moreover, it provides quick access to the NSF database and is available at a really affordable price. Furthermore, the notes nsf local security removal tool is compatible to use with almost all versions of Lotus notes. For more information please visit www.nucleusdatarecovery.org
  • Data Shredder literally destroys files, free space and your Recycle Bin contents instead of only deleting them. That means your data contents once overwritten and destroyed It can't be recovered. The user therefore should be sure of the files, folders .etc. he/she wants to shred.There are many safeguards built into the Data Shredder program to warn the user.
  • Password management with synchronization. SecuStar administrates your passwords safely and clearly. Furthermore SecuStar can synchronize between several PCs, so you have access to your passwords from all the devices you are working with. SecuStar stores your password data using the AES-256 algorithm, which is approved in the U.S. for state documents classified top secret.
  • Secret File Messenger is a steganography software and you can easily encrypt file or text message and hide it in a picture. Once a file is hidden in an image the saved picture is still a picture, it will load just like any other image and appear as it did before, the only difference will be that it contains hidden file. The image can be saved, emailed, uploaded to the web as before the only difference will be that it contains hidden data. You can also decrypt and extract your hidden file or message. It is extremely user-friendly tool and help you step by step with its wizard. File security and integrity are currently the most important issues in the world of information technology. Keep your private data safe with the help of Secret File Messenger. Key Features : Hide Secret and Confidential File into an Image. Support JPG/PNG/BMP/GIF/TIF Image format. Support ALL Major File Format like (DOC/DOCX/XLS/XLSX/PPT/PPTX/TXT/INI/RTF/PDF) Encrypt File Before Hiding. Extract & Decrypt Hidden File ...
  • Nowadays, USB drives are inevitable carrier of information for work and personal uses. However, many of us witness privacy disasters caused by unlucky handling of USB drives, typically losing them. xcept.me is invented to overcome this. It protects secret inside USB drives by pairing them with authorized computers. I shall no longer worry to lose my secret. Even the password is cracked, no one could access the information inside, except me.
  • Estelar Lock a Folder Tool is a powerful file and folder password protection software that offers advanced security solution to take control on your private files, folders, and other Windows resources. This file and folder password protection software can be used to protect your data and stops other unwanted users accessing your data. Using the folder security system you can also protect your data on other removal storage devices such as pen drive external portable hard drive. Once your files or folder are protected using Estelar Lock A Folder software then no one can access such folder and files with knowing the correct password. How to Use this advanced File and folder Password Protection Software? Step One: Run Lock a Folder - After installing the software go to 'Start menu > Programs > Estelar Lock a Folder from there choose Lock Files & Folders Step Two: Browse a Folder or File - Click on the "Add Folder or File" icon to import the folder ...
  • AnyPassword Pro is an advanced password guarding solution, which stores passwords in systematized folders and protects all data with a strong encryption method. Database synchronization and an ability to attach files to password records will be very precious for experienced users. File data compression saves space, which is quite important while installing the program onto a portable device. The program supports several languages.
  • Key logger software captures all types of computer activities like typed documents, text chats, user name, password, emails and secures your PC. Key logger software does not appear as desktop icons and other users can not identify about system monitoring. Easy graphical user interface of the software allows user to easily operate and understand all features of the software. Brilliant key logger software is capable of monitoring all user activities to protect your computer. Amazing key logger monitoring software produce all records in text or html files format & allows sending via email. Company offers best Key logger software that allows monitoring computer system by recording all keystrokes of PC. Easy to download key logger software is more popular among parents, cyber cafe, school and college for monitoring computer systems. Innovative key logger software is very easy to install and gives much protected solution to monitor computer system in effective manner. Website www.passwordrecovery.in provide ...
  • AutoRun Disable is a free tool that helps you secure your PC. With it you can easily disable the possibly dangerous AutoRun feature of Windows (XP, Vista, 7). You can disable the auto-run feature based on device types (USB and other removable devices, CD/DVD, internal or network drives) or specific drive letters. Disabling auto-run will protect your PC against auto-run based malware like Stuxnet, Conficker, Downadup and others threats. To further protect your PC, we recommend to use Endpoint Protector Basic to monitor and control ports and interfaces such as USB, FireWire, card reader, CD / DVD, etc on your PC. This will protect them against unwanted use of portable storage devices like USB sticks, SD cards or portable hard drives to prevent data theft or data leaks.
  • Secrecy File & Folder Hider allows you to hide any folder and keep curious eyes away from your private files. Have you ever wished there was some way you could protect your files & folders and private information from the nosy eyes of "others" who use your computer? With Secrecy File & Folder Hider you can lock folder, BLOCK & HIDE any file or folder you do not want accessible to others.
  • IP Hider Ever is a professional software used to hide your IP address so that you can hide your internet traffic and the real location while surfing the web. This best IP hider software provides government-level safety protection, makes nobody know what you do on the internet. So you can surf wherever you want on the web without worrying about any of the information leaked. With a very friendly and simple-to-use user interface, an affordable and attractive price, as well as the best customer service, IP Hider Ever now has more then 23 thousands subscription users all over the world. We promise to continuously improve our technology and our service to meet the demands of all users, give them the best user experience ever. IP Hider Ever is a super easy program to hide your ip. Dozens of IP address from all countries available to be your choice. One-click to make connection anonymously. Government-level encrypted transmission, impeccable. Reconnect automatically when dropped , all-round protection of your privac ...
  • Trustworthy keyboard monitoring program includes uncomplicated installation process along with best aspect which hides from desktop, control panel, add/remove programs, installation files/folders also has handy capability to get customized for specific functions. Interactive Free Spy Software for windows operating system can be straightforwardly downloaded from www.freespysoftware.mobi which is superlative and proper program for administrating system, employer, office managers, parents and many more. Reliable activity monitor application efficiently supervise online transactions of spouse and builds report in format of txt or html file according to user necessity moreover uses hot key combination or run command settings to unhide the software at the time of running mode. Pioneering Free Spy Software proffers potential to system administrator to supervise each executed activity through family members, friends or company employees on your private computer at your absence. Consistent Free Spy Software encloses a ...
  • SpyPal Home PC Spy secrectly records Facebook, keystrokes, screenshots, websites visited, windows opened, applications, MSN, ICQ, AIM, Yahoo! IM, Skype, clipboard, passwords, emails, documents and more. In Stealth Mode, it is completely invisible to computer users. Use hotkey and password to access the program. Auto send logs to a preset email or ftp at set interval. Usages: monitors employees, children, spouse and investigate crimes.
  • HidEM is a safe, fast and easy Security Solution Software that can protect your private data - in just seconds. Simply drag and drop files, folders, pictures, videos, drives, and even programs to the HidEM DropZone, then click "Lock" and have peace of mind that only you, have total access. HidEM will help you safeguard those data from unwanted access by both hiding and locking. Also HidEM protects data from viruses, trojans, worms and spywares because once protected, it can not be opened, modified, deleted, moved nor copied. Also you can delete all traces such as internet history, cookies, recent documents, etc. in your computer with just one click.
  • SpyPal Keylogger Spy software can secretly record all keystrokes typed on your computer. This may include chats, emails, user names, passwords, online searches, myspace, facebook activities and more.It runs in a complete invisible mode. You can check logging reports by simply receiving emails or opening a web page.Perfect for catching cheaters, monitoring employees, children or spouse.
  • Hide Secret Files is a security product based on an unequalled data hiding method. It is an easy and user-friendly tool to hide and safely protect your private information from erasure and unauthorized access.
  • School Track is a robust solution for managing student attendance on school campuses. Track student attendance and tardiness, issue tardy slips and hall passes, assign warnings and detention. Parents can receive e-mail notification of any infraction occurred. Process late students quickly and automatically assign and manage detention for repeat offenders. Produce professional photo ID cards and paper badges. Easily deploys campus-wide.
  • Purpose of NotRun: - prevent start selected programs ( is working with more programs). - provide you a user-friendly interface - be simple and easy to operate Customized capabilities of NotRun software. - run NotRun when started Windows (this function is active by default) - password protected access to NotRun (this function is not active by default) - when NotRun is started, it minimized to system tray
  • Kruptos 2 Professional is a powerful and easy to use program that password protects your photos, movies, music, documents or any other file using proven and unbroken 256-bit encryption. There are no complex options or settings. Once installed, all you need is a good password and a few clicks!
  • PortableSafe keeps all your passwords and other private information locked in a secure encrypted file. Included within the program is a configurable password generator. You can carry PortableSafe around with you on a USB key, as strong encryption keeps your information completely secure. No installation required. The more you use PortableSafe the more the program learns about what type of information you like to store for each record type.
  • Generate many passwords with uppercase, lowercase, numbers and/or specified characters. Save results as Excel or text files.
  • Invisible Spy Software secretly logs Facebook, keystrokes, chats, IMs, emails, websites visited, microphone, video talk, logins, passwords, applications, searches, documents and more. Logs Skype, Yahoo Messenger, MSN, ICQ, AIM, etc. Takes screenshots every x seconds like a spy cam. Sends logs to your email. You can check logs on a remote PC, tablet, smart phone, or directly on the monitored PC. Perfect for monitoring employees, kids and s

Page 16 of 30
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30


Legal disclaimer | Privacy policy

© 2004-2020 IT Shareware