Home | Submit a file  |  New  |  Categories  |  Our awards  |  Link to us  |  RSS Feeds

Utilities :: Security & Encryption
Sort by: date | product title | rating | downloads | popularity
Display: short descriptions | full descriptions
  • Windows keylogger software is the most powerful PC surveillance application, which will record all keystrokes typed using keyboards. Best keylogger utility can obtain confidential data like login details, passwords, chat history, instant messaging emails and inserted text by intercepting keystrokes. Keystroke logging software runs hidden in the background and automatically records all keystrokes. Internet spy software offers detailed information on who uses your computer, their e-mails and chat conversations, the visited web sites. Hidden keylogger can secretly capture information on your PC without the possibility of being detected by the user. Parental control software provides the best possible solution for homes, families, small and middle offices, as well as big companies with the need to monitor hundreds of employee. Keystroke monitoring tool record not only 'simple' keystrokes, but file operations, visited web-sites, clipboard information, monitor outgoing and incoming e-mails etc. It ...
  • Professional keylogger software easily monitors each and every single typed character including Alt, Del, Tab, Ctrl, functional keys (F1-F12), special keys ( @, #, $, &, % ) and other similar characters entered by unwanted user on your computer keyboard without taking your permission. Best keylogger 2010 utility is reliable and efficient tool for business organization to closely track whole activity of employees activities executed on office PC while you are busy in meetings. Hidden Family Key logger application is used to check the online details like chatting on (Yahoo, Orkut, Face book, AIM) messenger or misusing of internet on your desktop/laptop by children, spouse, neighbor, friends and relatives in your absence. Keylogger program is versatile software and remains invisible on add/remove program menu, task manager, control panel, installation folders and on desktop so external user cannot aware of its existence in your computer system. Invisible Key logger software always set hot key combination ...
  • Advance keylogger is password protected monitoring software that records all computer activities and logs all information so that you can check later what?s been done in your absence. Keyboard surveillance tool records all keystrokes including typed Emails, Websites visited, documents, Chat records, usernames, passwords and other keyboard typing activities in an authenticated log file. Keylogger also takes screen snapshots periodically and automatically just like a secret camera directly point at the computer monitor. Keystroke recorder capable to deliver logs to remote computer via email feature or can be uploaded via FTP server without getting known by current users. Hidden keystroke recording utility is helpful for employer, teachers, parents and system administrators to trace activities of computer users. Keyboard monitoring software starts monitoring as soon as windows start or boot up. Stealth keylogger will not appear on the Desktop, Add/Remove Programs, Windows Task Bar, System Tray, MSConfig (Startup ...
  • Best Network Security is the best solution for corporations, universities, schools, public libraries, internet cafes and other applications where administrator has to secure and maintain a lot of network PC workstations located in different places. Best Network Security is intended for securing, protecting, and maintaining PC workstations within a corporate network. Supports over 600 different security restrictions.
  • Best Password Manager is a easy-to-use and very popular tool. Manage ALL Passwords with One Phrase. When you log on to Password Manager with your Master Pass Phrase you will have instant access to all of your password protected websites.
  • Best Privacy Pack provides essential tools for privacy protection, a password and sensitive info wallet, and a folder hider. Secrecy File & Folder Hider allows you to hide any folder and keep curious eyes away from your private files. Password Container keeps personal data in and hackers out - you will never lose an important password or information ever.
  • Best Spy is an extremely powerful spy software which allows you to secretly record all activities of computer, including emails sent and received, websites visited, every keystroke (including login/password of all kinds of programs and websites such as Facebook, Myspace and all webmails etc), file operations, both sides of online IM conversations such as Yahoo Messenger, MSN, ICQ, AOL, AIM, Skype, gTalk.
  • To protect your privacy, comply with regulations and prevent data breaches, BestCrypt Container Encryption delivers 'on-the-fly' data encryption that's easy to use for virtual drives and selected files or folders. BestCrypt encrypts files on Windows, Mac OS X and Linux with AES and other strong encryption algorithms. By featuring deniable encryption and dynamic containers Jetico's file encryption is the best TrueCrypt alternative. Includes BCWipe
  • BestCrypt Volume for Disk Encryption protects all data on fixed and removable disks, while also working on RAID, UEFI and GPT partitions. Jetico's encryption software provides protection from physical threats, such as lost computers and USB sticks, by utilizing a wide variety of algorithms (AES, Twofish, Serpent) and the largest possible key sizes with XTS, LRW encryption modes.
  • All-in-one Keylogger implements the state-of-art technology, and guarantees you full control over your computer. Have you ever thought what site your children are surfing when you are not at home? Who the "girlfriend" your wife is chatting with all the time really is? What your employees are doing when you are not at home? Now you can monitor chats,e-mails,keystrokes typed,desktop activities,microphone...It can even send you logs by email.
  • Beyond Keylogger implements the state-of-art technology, and guarantees you full control over your computer. Have you ever thought what site your children are surfing when you are not at home? Who the 'girlfriend' your wife is chatting with all the time really is? What your employees are doing when you are not at home? Now you can monitor chats,e-mails,keystrokes typed,desktop activities, microphone...It can even send you logs by email/FTP.
  • Beyond Keylogger implements the state-of-art technology, and guarantees you full control over your computer. Have you ever thought what site your children are surfing when you are not at home? Who the 'girlfriend' your wife is chatting with all the time really is? What your employees are doing when you are not at home? Now you can monitor chats,e-mails,keystrokes typed,desktop activities, microphone...It can even send you logs by email/FTP.
  • BigBrother Pro is the leading internet parental control software. BigBrother Pro is a PC stealth monitoring software that works in total secrecy, undetectable by computer users. Records BOTH SIDES of MSN, Yahoo, AOL Messengers, records INCOMING and OUTGOING Yahoo Mail and Hotmail. With the best cost/performance ratio yet full featured monitoring software, BigBrother Pro records all PC activities.
  • Big Crocodile is a powerful, secure password manager. Stores all your passwords, logins and hyperlinks in a securely encrypted file. Big Crocodile can automatically fill fields which require passwords. Password generator, multi file interface, password folders, backup, export and other features available. Big Crocodile is very easy to use. The software uses a powerful encryption algorithm. Big Crocodile password recovery is impossible!
  • bio-iVault uses the well respected myBiometrix Biometric platform to deliver Finger, Face and Voice recognition to securely create and manage biometric Encrypted Virtual Drives on a computer and other external storage devices by simply scanning ones biometric. The bio-iVault drives appears just like a normal drive in Explorer, so you can create, edit and delete files and folders just as you would on a normal drive however data is encrypted
  • bio-iVault uses the well respected myBiometrix Biometric platform to deliver Finger, Face and Voice verification to securely create and manage biometrically Encrypted Virtual Drives on a computer and other external storage devices by simply scanning ones biometric. The bio-iVault drives appears just like a normal drive in Explorer, so you can create, edit and delete files and folders just as you would on a normal drive however data is encrypted
  • bio-iVault uses the well respected myBiometrix Biometric platform to deliver Finger, Face and Voice recognition to securely create and manage biometric Encrypted Virtual Drives on a computer and other external storage devices by simply scanning ones biometric. The bio-iVault drives appears just like a normal drive in Explorer, so you can create, edit and delete files and folders just as you would on a normal drive however data is encrypted
  • BioKeyLogon - add keystroke dynamics authentication to standard Windows authentication procedure during logon. It is based on the fact that different people type in uniquely characteristic manners. nioKeyLogon allows you to increase Windows password protection and works in a hidden mode. With BioKeyLogon, it's very easy to create new biometric passwords and control local system users.
  • Bitcoin Find & Recover is a crypto currency recovery tool that helps the user restore access to their funds. Supports desktop and mobile wallets. Automatizes searching for wallets on the disk, both deleted and existing and guides the user in the recovery process. Allows the user to create a password list from whatever fragments he or she remembers, to try to regain access with a lost password. The recovered passwords are saved encrypted.
  • BitCrypt is a free stego encryption for Intelligence community and the like. The program allows the user to store any text message in an encrypted form which is hidden within user specified image. The text is encrypted with one of the strongest encryption algorithms in order to strengthen the level of security. The program is distributed in completely functional form as freeware.
  • Store all passwords securely in one place. Bitobit Mithril Password Manager makes password management easier and more secure by marrying a single-click user interface with secure cryptographic algorithms to protect your sensitive information. Use Bitobit Mithril Password Manager as a secure scratch book to keep sensitive information such as activation codes, product keys and credit card numbers securely protected yet easily accessible.
  • The safest and most convenient Secure Folder supports Folder lock, Folder Encrypt and Folder Hide functions. No worry about leaking own personal data to others, no worry about third party spam ware upload or steal your important files, because they cannot even find your file or only can see rubbish data. It's a safe home for your personal photos, diaries, home plans, company reports etc.
  • BizCrypto for BizTalk lets you secure the data and internet communications in your BizTalk orchestrations. The product includes SFTP, SSH, FTPS, OpenPGP, SMTP, POP3, AS2, HTTPS, S3 adapters and S/MIME, PGP, PKI, PDF, XML, ZIP pipelines.
  • A performance enhanced Tor derivative. It helps to keep your browsing habits safe and secure and protects you against monitoring. Open source and free. Features include serverless & accountless PC to PC calling via MicroSip VoIP. It integrates seamlessly into an existing Firefox installation as a new profile and it's regularly updated - we ensure you get the best out of Tor
  • BlackBox Password Manager is a free lightweight and easy-to-use password manager for Windows which will remember all your passwords. Yes, all of them. The application stores your passwords in a highly encrypted local database. This database consists of only one file, so it can be easily transferred from one computer to another. BlackBox Password Manager allows you to store your passwords grouped any way you like.

Page 14 of 30
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30


Legal disclaimer | Privacy policy

© 2004-2019 IT Shareware