Home | Submit a file  |  New  |  Categories  |  Our awards  |  Link to us  |  RSS Feeds

Utilities :: Security & Encryption
Sort by: date | product title | rating | downloads | popularity
Display: short descriptions | full descriptions
  • Folder protect software password protects folders on hard drives and external drives with no extra software required. It doesn't matter if your folders are on hard drives, CD, flash drives, or other types of removable storage media, you can always password protect them using this folder protection software. There are no tricks to bypass security applied by folder protect software.
  • Video to EXE Converter, Pack video & codec & player, Three-In-One, Encrypt and pack your video to exe with embedding codec and player, User needn't install any codec or player to play your video. Supports various types of video or audio (e.g., wmv, avi, mpg, rm, rmvb, mp4, flv, Vob) into exe files that can only be played when a Playback Password is provided, and users can only play the encrypted media files after obtaining the Playback Password.
  • Encrypt and decrypt whole files or their parts using AES, Triple-DES (3DES), RC2, and DES symmetric algorithms. You can encrypt files with a single password or specify cryptographic keys (vectors) instead. You can change key bit length for better protection. You can select specifically which bytes in a file should be encrypted/decrypted, though by default the whole file is processed.
  • Information leakage becomes a social problem. Information leakage may be given a huge damage to a company or individual. So we need security software to protect our information (data,file). There are much security software for PC, but little security software for mobile device. USB Flash Security is security software for mobile device. It can help you to protect you mobile devices by encryption(AES256bit). AES encryption which is recognized by speedy and cipher strength of encryption algorithm has been adopted. Data will be encrypted automatically by writing in USB memory, and it will be decrypted automatically by reading from USB memory. There are five editions in 'USB Flash Security' for personal user. USB Flash Security (Free) USB Flash Security+ (Product) USB Flash Security++ (Product) USB Flash Security# (Product) USB Flash Security## (Product) Main differences of each edition are the disk capacity and the number of USB drives. USB Flash Security## can be installed to THREE USB ...
  • PC TimeWatch manages access to the computer, to the Internet and to programs on the computer. You can define a set of rules for every person who uses the computer. The idea for the utility was inspired by requests from parents wanting to manage childrens' time on the computer. PC TimeWatch allows parents to define rules that should be discussed with their children. Once the rules are accepted by everyone, PC TimeWatch enforces them automatically, thus defusing any conflict between parents and children. Most similar programs have major security holes, and are easily disabled by anyone with a moderate degree of knowledge about computers. Not PC TimeWatch, which is much safer. And you don't need to be a computer geek in order to use it. PC TimeWatch was developed in collaboration with the team that created the classic PC Magazine Utilities, and this is reflected in its carefully chosen feature set and very simple, user-friendly interface. Businesses also find it useful for preventing ...
  • SECUDRIVE Device Control Basic is the USB port security system that allows the administrator to disable USB drives connecting to the PC. It can also disable the connection of other devices such as IEEE1394, Bluetooth, CD/DVD-RW, and Serial/Parallel/IrDA ports. This program is the perfect solution to lock USB flash drives or any other devices connected to a PC without permission. Thus, eliminating every single route that can lead to data leakage.
  • PDF Protection Tool from SysInfoTools is very flexible and powerful tool that allows you to impose various security parameters to your PDF file easily. This tool allows user to encrypt (using standard 40-bit or 128-bit supported by Acrobat Reader 5.0 and up) the existing PDF documents, set permissions, add user and owner password. PDF Protection Tool from SysInfoTools is stand-alone application which means that Adobe Acrobat (or any other product) is not required. PDF Protection Tool from SysInfoTools is 100% result oriented and very fast than any other PDF protection imposer tool. It does not modify the existing content of the file and keep the document original as before. This sophisticated software tool take a simple PDF file as input and create a copy of it for user's security( users original document's accessibility is out top priority), then it perform security insertation operations on the copy of original. Within seconds this tool do all the desired operations. PDF Protection from ...
  • AthTek Keylogger secretly monitor everything - instant messages, emails, websites, internet activities, facebook and twitter, pictures, keystrokes, programs, CD-Rom, documents and files, USB drives, printers, clipboard, any website they visited, any program they run, any character they typed on the computer. With AthTek Keylogger, you can easily know that who is doing what on the computer. The logs will automatically be emailed to your
  • The version of a product of "Orion CipherBox" is intended to a demo for free downloading which gives to the customer opportunity to estimate the interface and operability of the program. All opportunities are described in http://www.oriondevteam.com/productsENG.html
  • Free App Lock is an innovative application encryptor, which allows you to lock any executable programs with password from non-authorized execution to block other clients from modifying the variables stored in the Application object to protect your privacy. Now, there is no need to worry about others will use your tax preparation software, personal finance or other programs and so on.
  • JiJi Password Expiration Notification is a simple tool to notify users, managers and administrators through e-mail before their password and account expire. Administrator can receive the summary report to the specific email ids. Administrator can define the notification task for any specified target (Domain, an OU, Group, Set of Users).
  • Invisible Spy Software, keylogger, email and messenger spy software. It records all keystrokes typed, MSN Messenger, Windows Live Messenger, ICQ messenger, AIM, Yahoo! Messenger, Windows Messenger and Skype's chat text, websites visited, emails read, documents opened, windows opened, clipboard activaties, passwords typed and applications executed. Invisible Spy Software even takes screen snapshots at your set interval.
  • SGS KeyLogger is utility that records ALL ascii keystrokes, including passwords, to special log files. Install KeyLogger and EVERY single keystroke of your computer's users type will be captured and recorded. It helps to prevent data lossing when you work with multiple programs. You can use our KeyLogger if you want to know what has been done on your PC during the time you were absent.
  • Power Spy Keylogger is a keylogger, Facebook, chat, email, video talk spying software. It logs Windows Live Messenger, Skype, yahoo Messenger and more. Runs completely invisiblely with Windows startup. You can check logs by simply receiving emails or opening a web page. Power Spy Keylogger is perfect for catching cheaters, monitoring employees, children or spouse, acquiring others'passwords and even investigating crimes.
  • Message Smuggler is the leading software on the market of its kind, which used to smuggle or hide text message into images. Create secret picture message. This software gives you: - end of censorship - absolute security - end of any suspicions - free choice of transfer method Message Smuggler is an ideal tool for individuals who share very sensitive data with colleagues, family, or friends, and require that data to remain secure.
  • PDF Encryption is very flexible and reliable software that has several features like password protection, encryption level, page restriction, high resolution as well as low resolution printing. Tool provide many options in page restriction level such as restrict document printing, restrict form filling, restrict modify contents, restrict annotations, restrict content copying, restrict content copying for accessibility and assemble documents.
  • Safe Deleter is a secure data erase tool for Windows. It completely removes sensitive data from your hard drive by overwriting it several times with military strength selected patterns.
  • A must have windows security software for information security professionals to conduct in-depth security auditing and risk assessments of network-based windows systems. Regulatory compliance and the latest network auditing tools, all come as a package with this computer security software.
  • The most advanced network security software in its domain which conducts security assessments and security auditing on Cisco firewalls, routers, and switches. This is accompanied with the most up-to-date Cisco auditing tools; it also helps in achieving network security regulatory compliance.
  • Remo File Eraser a secure data eraser application, which erases important and confidential files / folders beyond recovery. The software is also capable of wiping free disk space to erase deleted data using various shredding patterns leaving no traces of critical data. Superior drive wipe feature facilitates you to wipe entire hard drive permanently.
  • The program has been designed as general application for surveillance hybrid platforms working concurrently with wireless and wired IP webcams, TV-boards, capture cards, power-line, and USB webcams. It has web interface with the same form and functionality on the local and distant pcs. Users see MPEG-4 coded video and have complete management of the software via net that surveillance station can be operated without monitor, keyboard, and mouse attached. Software`s modular configuration significantly increases reliability because all components act as autonomous software. If one part fails, other parts continue working. For instance if the `capture` unit fails, `watchdog` restarts it right away that viewers don`t notice anything because they are watching video through a `playback` part. The software makes `repeated` recording that the `hard drive full` situation never happens. The recording can be constant or it can be activated by motion, human face recognition, or by schedule. The software has pre-alarm and ...
  • Automatically delete browser history at specified intervals while you work. This software works with Microsoft Internet Explorer and/or Mozilla Firefox. Deletion can be set to occur every 30 seconds, 1 minute, 5 minutes, 30 minutes, 1 hour, etc. This application sits in the system tray, at the bottom right corner of the screen.
  • Ax3soft Scout process activity monitor is a professional monitoring tool for Windows, it can monitor a process all-sidedly in real time, including process/thread, file system, Registry and network activity whit its powerful features. To create a detail report for process, Ax3soft Scout makes it easy to find and solve your computer problems, e.g. malware, troubleshooting. Key Features Real-time monitor and analyze Ax3soft Scout can monitor process/thread, file system, Registry and network activity (includes: IP, ICMP, TCP and UDP conversations, HTTP visit, Email transfer and FTP transfer) real-time and analyze these activities to identify security threats with different colors. Detail reports Ax3soft Scout can analyze numerous activities to create a detail report for process, the report?s content is very clear, it includes all the threats found and some key activities events. You can find and solve computer problems quickly and easily with the report, even if you don?t have extensive computer knowled ...
  • Sonar NET records in your computer system in hidden mode all audio-events inside and all that a connected microphone can hear. Sonar NET sends created audio-files to E-mail address or FTP-server. Sonar NET is smart and clever software for work space and flat area acoustic control. Sonar NET successfully works to control home employees of nanny - housemaid class. Sonar NET can easily keep under audio-control a room of 35+ square meters and neighboring apartments. Sonar NET records Skype talks and communications in other programs. Sonar NET characteristics: Acoustic apartments control Audio-monitoring of work place Sending audio-files to E-mail or FTP-server Skype talks recording Audio-events system recording Continuous audio-recording Parental audio-control purposes Audio-books creation solution A wide range of different tasks by your wish Recording quality: 16 Bit 44.1 kHz Recording formats: Wav / Wma / Mp3 Audio-records compression Hidden recording mode Invisible system regi ...
  • System monitoring software is a secure and easy to use keyboard activities monitoring tool that allows you to keep track on all activities performed on your computer. System monitoring utility captures all typed keystrokes activities including typed emails, chat details, website visited, login, password and text documents. System monitoring tool records all keyboard strokes in encrypted log file and sends the log file at user specified email address. Keylogger software runs in stealth mode to monitor your employees and kids activities when you are away from the computer. Keylogger utility does not appear on the desktop items, add remove programs, control panel, task manager and even installation folder path. System monitoring utility displays last login and start session on main window with date and time. System monitoring software supports all major Windows operating systems including Win 98, 2000, 2003 server, XP, ME, NT and Vista. System monitoring utility provides user friendly graphical user interface wi ...

Page 13 of 30
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30


Legal disclaimer | Privacy policy

© 2004-2020 IT Shareware