Home | Submit a file  |  New  |  Categories  |  Our awards  |  Link to us  |  RSS Feeds

Utilities :: Security & Encryption
Sort by: date | product title | rating | downloads | popularity
Display: short descriptions | full descriptions
  • Effective Filtering algorithm to block unwanted websites and filter porn websites : Aobo Website Blocker - Porn Filter uses unique content filtering algorithm to block pornographic websites, games. It also supports url filtering technology . With this advanced algorithm and technology, you can completely rely on Aobo Porn Filter to keep your family safe from pornography.
  • PDF Encrypt software is a very flexible and powerful program, PDF Encrypt software allows you to encrypt (using standard 40-bit or 128-bit or AES encryption ) existing PDFs, set permissions, add user and owner password. For example you can encrypt a PDF without to allow to print it. The button to print the file will be disabled in Acrobat Reader application, you also can encrypt a PDF allowing the user to read it only if he know the correct password. Note, The source PDF must be an unencrypted PDF. Acrobat Reader will show a key in the bottom status bar if the PDF is encrypted. There two passwords you can apply to a PDF. The first is the owner password. Opening a PDF with this password will allow you full access to the PDF when a user password has been assigned as well. This means that even if printing was disabled you will still be able to print the PDF when using this password. No password will be prompted for when opening the PDF if you secure it with only an owner password. The second is the use ...
  • APassword allows you to generate either single or batches of random passwords. You can select from a range of character options including: Letters, Numbers, Symbols, Case Selection and more. These passwords can then be saved to disk in CSV or one per line format. At the click of a button the password is displayed in HUGE characters to make it easy to read out to customers or users. The ideal application for Help Desks, ISPs, System Administrators and anyone needing a large number of passwords!
  • PDF Encryption is very flexible and reliable software that has several features like password protection, encryption level, page restriction, high resolution as well as low resolution printing. Tool provide many options in page restriction level such as restrict document printing, restrict form filling, restrict modify contents, restrict annotations, restrict content copying, restrict content copying for accessibility and assemble documents.
  • PDF encryption software protect your PDF document from harmful user those defect your valuable document. PDF file encrypted application support most of all required option those able to protect your PDF document. Tool permitted you to set password on PDF file, use PDF encryption technique like 128 bit and 40 bits. You can restrict PDF page by locking PDF printing, content copying, content editing, form-filling, annotation, page extraction and document assembling etc. program authorize you to select page resolution values like high resolution and low resolution. Features: * Software Protect your PDF document from illegal user. * Set password on PDF file. * User encryption technique like 128 bit and 40 bit. * Restrict page permissions values like print, copy, edit, extract, annotation etc. * Choose page resolution setting like low and high. * Create efficient resultant file name. * Perform operation into batch style. * Work with 32 and 64 bit operating system. * Work with all Window oper ...
  • PDF Security application is design for protection point of view with the help of this software you can safe own valuable file for unauthorized user but here you can only apply restriction you are unable to unrestrict document. In this tool user has choice to place user oriented password on PDF file. It protects several operations like copy, edit, modify content, print document, assemble document, annotation, document extraction etc.
  • Reverse phone search displays a numbers owner using 6 sites at once, this tool is fast easy and free. See a strange number on your caller ID and want to know who it is or perhaps some one is selling some thing in the newspaper you want to know who it is, this free tool is for you
  • Spyware, backdoors, BHO, dialers, hijackers, key loggers, trojans, tracking cookies, worms, ANSI Bombs, AOL Pest, droppers, nukers etc. These are all malware that put your computer to risk. Defending against all of them can sometimes be extremely difficult. Malware is used to steal the financial data, identity theft, generate frequent popup advertisements, redirect the homepage to unfamiliar websites, degrade your computer's performance, cause computer errors, browser crashes, etc. But there is solution that brags to eliminate all these problems. It is called SpyNoMore AntiSpyware, ultimate spyware remover software. -Huge AntiSpyware Database that guarantees removal of existing infections -Active Protection to block new spyware BEFORE they infect your computer -Host Blocking ensures that known spyware-spawning websites are always blocked -Vaccination feature inoculates your system against inbound threats -Ticket-Based HelpDesk solves your issues timely and professional -Custo ...
  • App-Nanny enables parents to control when, where and what kids can access via computers. It can block digital distractions while allowing access to always-allowed-sites such as online references, courseware, online textbooks etc. It blocks online contents and sites unfit for kids. It records internet browsing history. Use App-Nanny to protect kids from computer addictions. Use App-Nanny to protect your kids 's mental and physical health.
  • ArchiCrypt Live offers real-time encryption and protection for sensitive private or business data. ArchiCrypt Live lets you encrypt all types of files on your PC, laptop or network. That way only you will be able to access your confidential information. ArchiCrypt Live is extremely easy to use. Even at this simplicity ArchiCrypt Live gives you state-of-the-art protection. The technology used is also used by government agencies for data protectio
  • Ardamax Free Keylogger supports several levels of user activity monitoring and saves recorded data to an encrypted log file only viewable through a proprietary tool. The program can be configured to constantly capture different types of data, from simple keystrokes to audio and photos, and offers a simple, self-explanatory interface. The product supports all known languages and remains invisible to users being monitored.
  • Ardamax Keylogger is a small, easy-to-use keylogger that captures user activity and saves it to a logfile. The logfile can be viewed as a text or web page. Use this tool to find out what is happening on your computer while you're away, maintain a backup of your typed data automatically or use it to monitor your kids.
  • A suite of tools which ensure your privacy and keep sensitive information secure. Armor Tools will let you work on the computer without leaving traces of your activities - deleting documents, programs, and other files without the possibility to restore them and contains a set of additional adjustments related to safety, system capacity and user preferences.
  • Business, or Network version of innovative password management software Arovax TraySafe allows to forget password problems of small offices or whole corporations. There are a lot of password keeping solutions nowadays, however none of them can be compared to TraySafe password manager in terms of safety and convenience. Network password management meets the requirements of any corporate network security policy. This program shares common passwords between users; it is able to specify access permission for each password per each user. Also, users can save their personal passwords on the server and protect them even for case of disaster. They can forget passwords and they will not lose them. There is no other password management tool, which could compete to TraySafe in security level. Arovax TraySafe offers a wide choice of world's most secure encryption and hash algorithms, like 3DES, Blowfish, SHA, MD5. Currently it supports 19 encryption algorithms to protect password files and 10 hash algorithms to ge ...
  • Password Manager TraySafe allows you to forget security problems. In addition to a variety of encryption and hashing algorithms, it features a unique hardware ID. It means, if someone hacks your PC or makes a copy of your hard-drive, they won't be able to crack the program because it works only with your PC and no other. TraySafe is so convenient to use that you will be undoubtedly surprised by its work. Full-featured 21-days free trial download is available.
  • ArtistScope DRM is a total control solution for the Document Rights Management of documents, images and web pages where an author can assign different permissions per user or group of users. When DRM rights are assigned the document becomes "for their eyes only" and any copies of that document forwarded on cannot be viewed by others unless they also have rights of view. Tokens cannot be forged and certificates cannot be copied or redistributed.
  • Free download for web reader to view copy protected web pages and media. ArtistScope Web Reader (ArtisReader) is the only web reader designed for and dedicated to the copy protection of web pages and embedded media. Protect images, web pages, source code, Flash, movies, PDF, database records and other Internet content without data leakage and other exploits enabled by modern web browsers. Fully compatible with all web applications and programming languages. Whether you intend to add copy protection to new or existing web pages, all you need to do is provide a link to the web page, then as it loads in ArtisReader it will automatically be copy protected. No special treatment is required of the page, however you may want to moderate the level of security employed, in which case all you have to do then is to add a new meta tag in between the page's head tags, or alternatively, set a policy in your DRM control panel. Today we have numerous brands of free web browsers all designed with the same goal in ...
  • Program allows vastly to accelerate the process of the recovering the password to some protected by password objects to account of the use any available to information on it. You visual define the crude structure of the password, will assign the characteristic separate blocks password and program on the base of this information generates the list of the passwords, which use as dictionary for program selecting password to your object then.
  • Arusoft Password Generator is a program designed for generating strong passwords easily and quickly. Using Arusoft Password Generator, you can easily create extremely strong passwords any length. It is powerful, but very fast, small and easy to use. Arusoft Password Generator is a program that can be used by regular users who care about their informational security both on the Internet and at work and by those who often create and use passwords.
  • Program multiple accelerate recovery of password to any object protected with password by minimization of passwords amount for selecting on basis of any possessed or suggested information. Visually assigning common passwords structure composed from discrete blocks with their own flexible adjusted features. Generated list of passwords can be used as dictionary to any program selecting passwords to the object.
  • AS3 Personal Firewall is device designed to prevent outsiders from accessing your network. The unit serves as the single entry point to your network and evaluate all TCP connections requests as they are received comparing them with each rule in the policy. This is advanced easy to use software with ability to watch for all ports on your system without listening. Activity provides a real-time view of the open connections through the firewall. The rules editor is used to define a security policy where connections requests from unauthorized ip addresses and ports are rejected. The log viewer provides data connection notes that can be used for prosecuting the potential attackers. Use the rules editor to specify the destination and service for each rule with the required action. For example, if you don't want someone connecting to your network, you can bar his access by blocking connection request from his ip address or port number. On his end, he see a message that responds "Connection failed&qu ...
  • The official successor of Ashampoo AntiSpyWare and Ashampoo AntiVirus has been developed from scratch and combines the best of both technologies all in one solution. The comprehensive security solution protects your PC and your data from external threats and blocks viruses, trojans, worms, malware, rootkits, bots, spyware and adware efficiently without putting so much as a strain on your computer`s performance. In addition, the software offers a variety of Windows 7 compatible security tools (e.g. File Wiper, Internet Cleaner, Startup Tuner etc.) based on our price winning Ashampoo WinOptimizer series. Thanks to its innovative design and intuitive GUI, Ashampoo Anti-Malware is very easy to operate. Core Features: - Two integrated engines of renowned software producers offer advanced protection from: viruses, trojans, worms, malware, rootkits, bots, spyware and adware - During file execution and file copying, the onAccess guard offers maximum protection against all kind of threats before they can affect ...

Page 11 of 30
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30


Legal disclaimer | Privacy policy

© 2004-2019 IT Shareware