Home | Submit a file  |  New  |  Categories  |  Our awards  |  Link to us  |  RSS Feeds

Utilities :: Security & Encryption
Sort by: date | product title | rating | downloads | popularity
Display: short descriptions | full descriptions
  • LanAgent is a smart tool to monitor all actions of a remote computer user. The program records various kinds of data, which will be sent to you on your first request: keystrokes; connections established; websites visited; programs, files or directories opened; clipboard contents and so on. A detailed report on a specified time period is always available to you, yet the program is absolutely invisible to this remote user.
  • Buy Access Security Recovery program to recover Access security from MDB file. Access Security Recovery is the perfect software, if you need to unlock, remove, break or recover Access security. The software can recover Access security for Microsoft Access /97/2000/2002/2003 database. The demo version is offered to verify if the software is capable to recover access security or not. To recover complete Access security password you have to pay 25$ for full version of Access Security Recovery tool.
  • PCMate Free EXE Lock is a safe and efficient EXE file encryptor tool that is specially designed to lock any executable programs on your computer to protect them from non-authorized execution. When protecting a program, PCMate Free EXE Lock modifies the binary executable itself, so that it first asks for a password and runs the program only if a valid password has been entered.
  • Protect a Folder is a user friendly and easy to use program to encrypt folders and files which doesn't require any specific technical skills for encrypting folders. Just three easy steps and you will get your folders encrypted with un-breakable encryption. Run the software, import either file of the folder you want to password protect, click the lock button and you file or folder becomes encrypted.
  • Protect your PC from being used while you are away from your keyboard. After a specified amount of minutes or seconds have passed, your screen will be go completely black and request a password in order to resume regular use.
  • Access Password by Thegrideon Software is advanced MS Access database (mdb, mdw, mde, etc.) password recovery tool. With this tool you can recover your database passwords, user-level security records (logins from .mdw) or users and groups ids to recreate lost system.mdw (Workgroup Information) file. Access Password recovers data instantly and works with all MS Access 2.0 - 2013 databases.
  • Hide Secret Files is a security product based on an unequalled data hiding method. It is an easy and user-friendly tool to hide and safely protect your private information from erasure and unauthorized access.
  • Protect a folder is a poweful concept for encrypting folders. This folder protection software will enable you to encrypt folders and files located on your internal hard drive, and all external drives in an easy way. It will disable unwanted users to access, edit, delete your files and folders. Protect a Folder is a user friendly and easy to use program to encrypt folders and files which doesn't require any specific technical skills for encrypting folders. Just three easy steps and you will get your folders encrypted with un-breakable encryption. Run the software, import either file of the folder you want to password protect, click the lock button and you file or folder becomes encrypted. If you share your computer with others, then use this tool to encrypt folders and files to stop others from accessing and modifying your personal files and folders on internal, USB external and other portable drives. Unlike other folder protect programs, Protect a Folder will not allow to access protected ...
  • Make use of Kernel File Shredder and delete files or folders from computer?s hard disc permanently. The best aspect about this tool is it comprises of multiple shredding algorithm to make files shredding impeccable. What makes it more special is its remarkable feature of data shredding algorithm. This algorithm has been embedded in this software that allows the user to select and shred files and folders depending on the data sensitivity. Apart from this, the product helps you to automatically shred the temporary system files, content of the Recycle Bin, and free disk space along with allowing you to shred them manually whenever you want. Another great aspect about Kernel File Shredder tool is it facilitates you specify password for secure software access so that no one can use it for destroying purpose. Moreover, you don?t even require spending pointless time in getting familiar with or installing such computer program into your personal computer. It doesn?t matter, whatever is the format of file that you wan ...
  • Fast create strong passwords. Store and manage passwords. Support all programs and internet browsers. Easy to use. Supported operating system: Windows 2000, Windows XP, Windows 2003, Windows Vista.
  • Simplify Active Directory Management and beyond, on-premises or in hybrid environments. Automate critical admin tasks, bulk user management, administrative alerts, AD Provisioning and mobile user notification. Cayo Administrator is purpose-built to solve key day-to-day management issues. Designed to reduce costs, increase security, and sustain compliance while increasing overall efficiency. Watch a demo or get a permanent license at Cayosoft.com
  • Eusing Maze Lock uses a pattern based technique to lock your computer. You need first to set your own unlock pattern by connecting some of the nine dots together or keep the default unlock pattern. The next time you need to unlock the pc, the pattern and image must be entered correctly. It can lock your computer with a single click on the tray icon or using a custom hotkey. It can change the lock screen background image, the pattern size etc.
  • Generate millions of unique strong random passwords, pins, masked keycodes, usernames. Generate random numbers within a certain range or matching particular distribution. Control which characters can appear, where, and how often. Allow/disallow duplicate, consecutive, repeating, and similar characters. Use strings, sequential numbers, and non-ASCII characters. Use various filters to further control output. Save results to Excel, file, database.
  • The Powerful Encryption & Decryption tool An affordable way to make your file(s) unreadable. You can set your own password to protect your file. Easy to use. Gives you a total solution to easily protect your privacy. Unlimited encryption times, without paying royalties. You can easily manager encrypted files for they are text files. You can copy the output to your blogs, website, documents.
  • Employee Monitor Spy secretly logs your employees' PC & internet usage during their work hours. It lets you exactly what they type on PC keyboard, web sites they visit, who they talk to online and the content of their conversation. Employee Monitor Spy even takes screen snapshots periodically like a surveillance camera aiming at their computers. You can either receive log reports remotely from or check logs directly on their PCs.
  • Facebook Spy Monitor is a Facebook profile monitoring and parental control software. It secretly records PC users' Facebook private profile, emails, chats & IMs, photos, interests, contatcts and events by taking screen snapshots periodically. It also records popular Facebook instant messenging clients and Facebook related web sites and searches. See exactly what users were doing just like watching a surveillance video playback.
  • Clean cache, clear history automatically with NetShred X, the easy-to-use internet cache cleaner for Mac OS X that will erase files your browser and email programs leave behind. This internet eraser software is easy to use, fast and cleaner. Easy because it runs automatically - you don't have to remember to use it. Fast because you don't have to wait for it. Cleaner because it will erase, not just delete cache, history, deleted email, and more
  • Locker is a software product of new generation aimed at comprehensive protection of your data and using both protection properties of your operational system and its own protection means. In its basis, there is the task to secure the most flexible, convenient, and reliable PC data protection. The project tasks include limitation of access to folders, files, discs and disc sections on your operational system.
  • File encryption tools such as CyberSafe Files Encryption software provide you with the ultimate solution to protect your data from prying eyes whether it is being stored on an unprotected computer or sent over insecure communication channels. This software provides three automated modes of data encryption, with the highest level protecting your data with a Public Key value for the Microsoft Cryptography Service.
  • Safari Password Recovery instantly retrieves the login and password information user accounts stored in Apple Safari Web Browser. You only have to open the program, and pulse on the icon "Recover Passwords". that simple. In synthesis, a tool that can take us out of a difficulty in more than an occasion. The current version of Safari Password Recovery will run on Windows XP, Vista and Windows 7. Trial period is endless.
  • BizCrypto for BizTalk lets you secure the data and internet communications in your BizTalk orchestrations. The product includes SFTP, SSH, FTPS, OpenPGP, SMTP, POP3, AS2, HTTPS, S3 adapters and S/MIME, PGP, PKI, PDF, XML, ZIP pipelines.
  • With Free Keylogger Remote you can find out what other users are doing on your computer. This program is able to record all keystrokes, Internet activities, clipboard changes, running applications and capture screen. Invisibly. Remotely. And absolutely free of charge. This is the first all featured free spy software in the world. It is invisible and light, powerful and easy-to-use. You will be impressed by its reach functionality.
  • CyberSafe is one of the perfect solutions for data encryption software. It provides the ultimate data security features including support for many different algorithms and encryption methods. You can hide files and folders and encrypt them so that no one can ever access your data unexpectedly. Skype chat messages, emails and Amazon S3 encryption are also supported by this powerful all-in-one solution.
  • FoxyVPN provides a secure anonymous proxy VPN tunnel between you and the Internet, for free. Hide your IP address, surf the web anonymously, and protect your online identity by encrypting all your Internet traffic. With it's parent company in the online privacy market for more than 6 years, our experience at FoxyVPN allows us to provide the highest quality proxy VPN experience for an amazing value. Download FoxyVPN now for free!
  • The program encrypts and decrypts text using the algorithm of the Cardano Grille. Read more about the algorithm you can read on Wikipedia page https://en.wikipedia.org/wiki/Cardan_grille.

Page 6 of 30
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30


Legal disclaimer | Privacy policy

© 2004-2020 IT Shareware