Home | Submit a file  |  New  |  Categories  |  Our awards  |  Link to us  |  RSS Feeds

Utilities :: Security & Encryption
Sort by: date | product title | rating | downloads | popularity
Display: short descriptions | full descriptions
  • Data Eraser v1.5 is the tool for erasing or deleting data and files from hard drive completely that can never be recovered again. Generally when you delete a file from harddrive, that file can be recovered by any data recovery softwares but it erases all the content of data clusters of files and directories so that erased files and directories can never be recovered. it works for windows operating system.
  • PC James Bond 007 secretly logs Facebook, keystrokes, chats, IMs, emails, websites visited, microphone, video talk, logins, passwords, applications, searches, documents and more. Logs Skype, Yahoo Messenger, MSN, ICQ, AIM, etc. Takes screenshots every x seconds like a spy cam. Sends logs to your email. You can check logs on a remote PC, tablet, smart phone, or directly on the monitored PC. Perfect for monitoring employees, kids and spouse
  • We offer real-time video monitoring on your mobile phone. You can view live images from your cameras on cell phone using any kind of internet connection from any location in the world. In case of invasion, a real picture helps prevent false alarm and cancel police dispatches to avoid the fines.
  • With Cryper you can encrypt single files or even complete directories. An easy workflow with a maximum of security, that what Cryper offers. Only a few clicks are necessary to feel save and the best, you can test it for free.
  • Many people believe that passwords are all that's needed to keep pirating eyes away from the data stored on their computers. But if that were true, there'd be no such thing as a "hacker." While passwords are certainly helpful, it takes a lot more than that to protect the information on your computer. With malicious malware products lurking about on the Internet, it's worth having extra layers of data security on your side. Sometimes an innocent-looking website can be a hacker in disguise. Nosey coworkers, bosses, friends, and even spouses can also pose a threat to our privacy. With A+ Folder Locker, you can store files, folders, drives, and even complete software programs in special data storage "lockers." Not only do these lockers keep the names of the files and folders you store in them from being viewed, the robust level of security of the lockers make them virtually impossible to break into. A+ Folder Locker also includes a variety ...
  • If you need an easy way to send private email messages from Microsoft Outlook that will not inconvenience the recipient, then download PDF Postman. This add-in for MS Outlook will encrypt email messages and file attachments using the PDF envelope AES-256 bit encryption. More info at http://www.encryptomatic.com/pdfpostman PDF Postman is an easy way to send email messages securely by email using PDF documents.
  • The generation of cryptographic keys and certificate requests X.509, and other service functions associated with the formation and maintenance of key systems of the carriers in PKI (Public Key Infrastructure - PKI), supporting secure applications built on the basis 2-keys cryptographic algorithms. Support: GOST R34.10-2001, RSA, DSA, eToken, Rutoken EDS, KRYPTON, Accord-AMDZ, Sobol...
  • zebNet Windows Keyfinder 2012 is a utility that retrieves your Windows Product Key used to install Windows from your registry. Another feature is the ability to save your Windows Product Key in a text file.
  • Effective and Cost effective Mac Monitoring Utility downloads trail demo from www.macmonitoring.net and you can monitors all internet, USB insertion or removal activities from your Mac system which are performed by other person on your computer machine without your permission. Time saving Internet recording application captures keystrokes, clipboard activities and voice chat conversation along with accessed desktop screenshots at regular interval of time. Comprehensive computer monitoring utility provides best methodology to monitors all USB mass storage devices insertion and removal activities from your Mac machine when you not available on your system which are performed by hackers. Easy to use monitoring internet utility provides user friendly Graphical GUI interface with help menu and non technical or technical operator easily drive to monitoring tool with any training or supports. Innovative or highly technical Mac monitoring software is beneficial for all colleges, universities, institutes, investigatio ...
  • Advanced Keylogger Lite is the most powerful stealth keylogger offered Toolsanywhere Software! This is the best choice for you if you think that others are using your computer when you are not home or away from your working place. Advanced Keylogger Lite runs silently at the lowest level of windows capturing every keystroke typed including usernames and windows log-on passwords. Advanced Keylogger Lite can also capture active window text, text ty
  • Super Keylogger is a professional yet very easy to use invisible keylogger for big and small companies, network administrators, concerned parents and PC owners. Super Keylogger includes several integrated recording modules that monitor: chat convos, e-mails, Internet history, keystrokes recorder, passwords! For more details: www.superkeylogger.com
  • Puran Wipe Disk is a free utility that can completely delete everything on your disk including the file system so that no data can be recovered or it can just wipe the free space so that already deleted files cannot be recovered.
  • Active Invisible Keylogger Home - This is the best choice for you if you think that others are using your computer when you are not home or away from your working place. After you install Active Invisible Keylogger Home on your computer, it will allow you to make program settings for tracking activities on your computer.If you enable "Run Active Invisible Keylogger Home in Stealth Mode" then the program will run by full stealth for others, no one
  • Skype Spy Monitor secretly record Skype's incoming and outgoing chat messages. It runs completely invisibly so that Skype users won't know its existence. Skype Spy Monitor send log reports to your email or ftp periodically. You can also check logs directly on the monitored PC. It is a small but powerful program that consumes very little system resource. Perfect for monitoring employees, children or spouse, and even investigating crimes.
  • HDD Safeguard is a portable software that allows you to protect your private files with a password on your external big drive using the secure AES 256 bits key. It protects data with a password for the entire portable storage device (HDD hard drive, USB flash drive, SSD, etc.) and not just for an virtual partition. Once the drive is locked, one cannot read nor write any data to it without the correct password! No requires installation.
  • Very simple free text/email encryption tool. Works in ANY windows program - Email-software, Word, Notepad etc etc. Just select some text in any software, press a key combination, select the encryption password and thats it. Your text becomes unreadable until you enter your password again.
  • Password Generator is a utility used by webmasters, system administrators and usual users who need their passwords to be highly secure and contain a random mix of upper and lowercase characters and numbers. Password Generator can create passwords of any length. Please note that longer passwords are more secure. Your password should be at least eight characters long. Download the free fully functional trial version of Password Generator now.
  • Keylogger Spy Monitor spy software can secretly record all keystrokes typed on your computer. It runs completely invisiblely. You can check logging reports by simply receiving emails or opening a web page. Perfect for catching cheaters, m onitoring employees, children or spouse, acquiring others' passwords and even investigating crimes. Use hotkey to unhide it from Stealth Mode and protect the program access by password.
  • Secure Image Pro is recommended image protection for photographers and advertising professionals. Pro supports Mac as well as PC visitors. Options include Domain Lock, targeted hyperlink on the image, and several display options, status messages, picture frames, batch file import and processing, multi-registry for use on several domains. Pro will encrypt 1,000's of images on a single click.
  • WideStep Software presents light and affordable monitoring utility - Quick Keylogger. Simple download and support of 64 bit Windows guarantees a smooth start of your work with the optimal set of features: keystrokes, websites and other monitoring options. Simple but clear HTML reports make Quick Keylogger a great solution for everyone.
  • Hard drives, Flash Drives, SSD's nor USB sticks are safe from File Shredder Ultra. Within a few clicks, your selected data is set to be renamed and irretrievably shredded and overwritten, multiple times. Combined with the extra Free Space Shredder feature included free, your data has no where to hide. Works well for traditional mechanical hard disks and newer technologies such as SSD's.
  • Folder password protect software keeps your data safe even under the DOS and Windows Safe Mode. Folder password protect can be also used for password protecting portable drives such as USB, memory cards and CD/DVD drives. This application will only password protect files and folders, it does not encrypt the protected files and folders.
  • CryptDecrypt provides an easy way to protect your sensitive information. CryptDecrypt securely encrypts your data with a password that you select. CryptDecrypt includes several encryption algorithms to protect your data: AES (USA Government Standard) Triple-DES, GOST, RC2, RC4 and Windows Data Protection API.
  • Invisible Spy Software, keylogger, email, chat and Facebook monitoring software. It records all Facebook activities, keystrokes, MSN Messenger, Windows Live Messenger, ICQ, AIM, Yahoo Messenger, and Skype chats, websites visited, emails read, documents opened, clipboard content, passwords typed and applications executed. It send log reports to your custom email automatically. You can check your logs by receiving emails or directly on the

Page 10 of 30
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30


Legal disclaimer | Privacy policy

© 2004-2020 IT Shareware