Home | Submit a file  |  New  |  Categories  |  Our awards  |  Link to us  |  RSS Feeds

Utilities :: Security & Encryption
Sort by: date | product title | rating | downloads | popularity
Display: short descriptions | full descriptions
  • JiJi Password Expiration Notification is a simple tool to notify users, managers and administrators through e-mail before their password and account expire. Administrator can receive the summary report to the specific email ids. Administrator can define the notification task for any specified target (Domain, an OU, Group, Set of Users).
  • JiJi Password Expiration Notification is a simple tool to notify users, managers and administrators through e-mail before their password and account expire. Administrator can receive the summary report to the specific email ids. Administrator can define the notification task for any specified target (Domain, an OU, Group, Set of Users).
  • JiJi Password Expiration Notification is a simple tool to notify users, managers and administrators through e-mail before their password and account expire. Administrator can receive the summary report to the specific email ids. Administrator can define the notification task for any specified target (Domain, an OU, Group, Set of Users).
  • Active Directory Password Management,In this the end-users can securely reset their own Active Directory passwords without having to involve highly technical helpdesk professionals. Gartner states that 30% of helpdesk queries are related to password resets management and account lockout. With Self Service Password Reset end-users no longer have to wait for a member of the helpdesk staff to reset their forgotten or lost password
  • Active Directory Reports enables Active Directory computer Reports Active Directory OU Reports Active Directory User Reports Active Directory Group Reports Active Directory NTFS Reports Active Directory Passwords Reports Active Directory user logon Reports Active Directory GPO Reports for account lockout policy AD Reports for Last log on
  • Active ERASER utility supports a variety of sanitation standards, from simple methods such as One Pass Zero to the military-grade DoD 5220.22-M, to even more sophisticated methods such as Gutmann's. You can erase files, folders, CD-RW discs, logical drives, and entire physical drives. The program also wipes out deleted files, which Windows just renders invisible, from your disk. It cleans the tracks of your Internet and local activities, such as cookies and temporary files. The log lets you control the process. You can schedule erasing to trigger every time you start Active Eraser, shut down Windows, or begin another activity. The interface is handy, letting you erase any file using the right-click context menu. Supports U.S. DoD 5220.22-M, VSITR, GOST P50739-95 and Gutmann sanitation standards.
  • See what happens on your PC when you're away. Protect your kids or catch cheating spouses by logging chats and instant messenger conversations. Email or FTP the results automatically to anywhere in the world. Active Key Logger is user-friendly and designed to be conveniently used at home allowing you to see typical user activities such as chats and instant messages sent or received in AOL AIM, ICQ, MSN and Yahoo messengers.
  • See what happens on your PC when you're away. Protect your kids or catch cheating spouses by logging chats and instant messenger conversations. Email or FTP the results automatically to anywhere in the world. Active Key Logger Pro is user-friendly and designed to be conveniently used at home allowing you to see typical user activities such as chats and instant messages sent or received in AOL AIM, ICQ, MSN and Yahoo messengers.
  • Active Keylogger Home - This is the best choice for you if you think that others are using your computer when you are not home or away from your working place. After you install Active Keylogger Home on your computer, it will allow you to make program settings for tracking activities on your computer.If you enable "Run Active Keylogger Home in Stealth Mode" ...
  • Active Keylogger Home Pro - This is the best choice for you if you think that others are using your computer when you are not home or away from your working place. After you install Active Keylogger Home Pro on your computer, it will allow you to make program settings for tracking activities on your computer.If you enable "Run Active Keylogger Home Pro in Stealth Mode" then the program will run by full stealth for others, no one will even think t
  • See what happens on your PC when you're away. Protect your kids or catch cheating spouses by logging chats and instant messenger conversations. Email or FTP the results automatically to anywhere in the world. Active Keylogger Pro is user-friendly and designed to be conveniently used at home allowing you to see typical user activities such as chats and instant messages sent or received in AOL AIM, ICQ, MSN and Yahoo messengers.
  • Active KillDisk is a quality security application that destroys data permanently from any computer that can be started from floppy CD USB. Active KillDisk Professional conforms to US Department of Defense clearing and sanitizing standard DoD 5220.22-M and other. You can be sure that once you wipe a disk with Active KillDisk, sensitive information is destroyed forever.
  • Active Lock can convert any USB storage device into an access key for Windows. Access your Windows computer in an easy, fast and secure way by using USB drive. When you unplug your USB drive, the computer is locked. Active Lock is very easy to use. All you need to do is insert your USB key drive, click on "Enable" and restart the computer. One USB key drive can be configured to access multiple computers. System requirement: Windows 2000/xp/2003. 15-day trial.
  • Active Spy Software is a professional monitoring tool that will stealthily record others who use your PC - children, spouses or employees. Active Spy is monitoring all PC activity, from keystrokes to scheduling screenshots at set intervals. Active Spy software includes several integrated recording modules that monitor: chats (instant messengers), e-mails, Internet history, keystrokes recorder, passwords, programs launched and much more!
  • Active System Locker is a smart tool that allows you to protect your PC by blocking desktop, keyboard and mouse. Use System Locker to restrict access to your computer from unauthorized access when you are away. It is fast, secure, and easy to use. System Locker offer flexible configuration options, reminder, scheduler, audit and other useful functions. It starts automatically with Windows and protects your system.
  • Active@ ZDelete helps to protect your privacy by preventing undesirable people to access private deleted data against your will. This secure delete software allows you to permanently delete files, drives and folders without any possibility of data recovery. Active@ ZDelete conforms to the US Department of Defense clearing and sanitizing standard DoD 5220.22-M. Free 30-days evaluation version is fully functional and gives privacy protection.
  • Active Fraud Shield is a reliable and sophisticated internet stream filter that detects, displays and blocks almost all fraud attempts. The program is designed especially for PayPal online payment service and provides up-to-date protection of the users account. Active Fraud Shield has a number of advanced detection and customization features, including special IP PayPal lists, site analyze system and creation of own black and white lists.
  • Most of us prefer not to turn computer off while we are away for coffee or going to the lavatory or have to attend a meeting in a conference room next door. Introducing Active Screen Lock, the unique security application, that disables Windows system key combinations, such as Alt+F4, Ctrl+Alt+Del, Alt+Tab and WinKey and then shows security screen over your desktop that would not let anyone except you in! TAKE ADVANTAGE OF OUR XMAS PRICE DROP!
  • Spy software that runs invisible and records how computer has been used. Activity Logger records to a log file visited Internet sites with web page titles, received and sent email (POP3/SMTP), IM chats, keystrokes in and all applications, programs that user runs and work duration in every application. It can take screenshots in specified time interval, working like video surveillance camera. Captured snapshots can be viewed later as a slide show.
  • This program is for real time monitoring of users activities on network computers and for employees' work time tracking. It monitors usage of all office computers in a network. You can see keystrokes, remote screen, Internet history and used programs. Send instant messages, copy files from a remote PC and control them. It can record every email and IM sent and received. Recordings are securely kept in Central Log Database on the main computer.
  • Activity Monitor Pro offers effective security on computers and provides the equivalent of the security camera! Activity Monitor Pro runs hidden in the background to secretly record keystrokes typed, passwords entered, websites visited, applications/files used and takes screenshots of the activities. Recorded data will be sent to you by email or FTP/Email address automatically and secretly. Find out more on www.activity-monitor.com
  • Employee computer monitoring through manual process is extremely difficult in the large organizations. Such organizations must take help of third party software such as Employee Desktop Live Viewer to monitor desktop activities of their employees. It is a centralized monitoring tool for the domain or workgroup based network. This Employee Computer monitoring tool can monitor unlimited number of network computers with its Viewer and Agent setup files. Agent setup must be running on all employee systems that are to be monitored by the system administrator. All agent computers are registered with main computer of a network through Viewer setup. Besides this, Employee Desktop Live Viewer enable computer administrator to schedule recordings of user activities on agent computers. It can effectively record both online and offline user activities during specific period in AVI video files. Moreover, Employee Computer Monitoring software also lets the administrator to notify network users through emails and instant me ...
  • Records all computer activities, including keyboard, chat, email, and visited websites. Useful in exercising parental and professional control over resources. It can even log passwords typed during Windows 2000/XP login. A unique file protection makes ActMon files truly invisible, even to so called spyware "cleaner" tools. For maximum security all data is stored in 256-bit AES encrypted files. Network (LAN) and email support with PRO Edition.
  • The newest version of this popular password recovery utility decrypts and displays the passwords behind the asterisks on ALL Windows systems. It works automatically on Web pages, Windows 9x/NT and even Windows 2000/XP systems.
  • WASP displays all passwords of the currently logged in user that are stored in the Microsoft PWL file password database. It allows the convenient management (i. e. supervision and /or deletion) of this file to improve the security / privacy of your PC. It is also very useful for educational purposes about computer security.

Page 5 of 30
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30


Legal disclaimer | Privacy policy

© 2004-2019 IT Shareware