Home | Submit a file  |  New  |  Categories  |  Our awards  |  Link to us  |  RSS Feeds

Utilities :: Security & Encryption
Sort by: date | product title | rating | downloads | popularity
Display: short descriptions | full descriptions
  • SterJo Strong Password Generator creates strong and random passwords based on the characters you want to use. Nowadays password security should be taken really seriously, especially after several announces for security breaches into some large companies like Yahoo, Opera and Dropbox.
  • This software is a powerful video monitoring tool. It allows you to use computer as a security system. Using webcam or IP camera, CSecurity can monitor your office or home. This program analyzes frames of the video stream, and if it detects a movement, you will receive notification. So this is a perfect solution to protect your company or home from intruders.
  • A useful, effective and reliable application that monitors computer usage, user activity, programs or websites Terminal Camera is a comprehensive and practical software utility that provides you with a simple means of monitoring computer usage and user activity. With the help of Terminal Camera you have the possibility to track each opened application, playback all user activity within each section. It also provides you with an embedded video player so you can preview the selected action. Terminal Camera also can used for Terminal Services, RDP, RemoteApp, Citrix, XenApp etc.
  • Never forget a password again, WISeID is the only password you'll ever need! Free password manager secures and protects your sensitive personal information. You can store all of your passwords, credit cards, loyalty cards, ID cards, notes, photos, bank accounts, etc. within the secure safe within the WISeID app. The personal data that you store in WISeID's secure vault always stays under your control, and is never communicated to third parties.
  • Gecko Computer Monitoring Software is the complete solution to monitoring everything that happens on your computer while you're away. Perfect for parents who want to monitor their childs computer or bosses who want to monitor their employees computers - Gecko Monitor has everything you'll need to give you peace of mind by monitoring screenshots, keystrokes, websites, applications, documents, printers and more.
  • Buy Access Security Recovery program to recover Access security from MDB file. Access Security Recovery is the perfect software, if you need to unlock, remove, break or recover Access security. The software can recover Access security for Microsoft Access /97/2000/2002/2003 database. The demo version is offered to verify if the software is capable to recover access security or not. To recover complete Access security password you have to pay 25$ for full version of Access Security Recovery tool.
  • Safari Password Recovery instantly retrieves the login and password information user accounts stored in Apple Safari Web Browser. You only have to open the program, and pulse on the icon "Recover Passwords". that simple. In synthesis, a tool that can take us out of a difficulty in more than an occasion. The current version of Safari Password Recovery will run on Windows XP, Vista and Windows 7. Trial period is endless.
  • No matter what you call it - delete, cancel or remove - when you want to be rid of your Skype account. With Delete Skype Account program it takes only a few steps to say goodbye to your account. The program deletes all your personal data from Skype cloud such as: name, gender, age, etc. and your instant messages in your chat partners and all devices, so nobody will be able to restore them. Also the program clear your personal Skype files on PC.
  • Personal Keylogger Lite is the most powerful stealth keylogger offered Toolsanywhere Software! This is the best choice for you if you think that others are using your computer when you are not home or away from your working place. Personal Keylogger Lite runs silently at the lowest level of windows capturing every keystroke typed including usernames and windows log-on passwords. Personal Keylogger Lite can also capture active window text, text ty
  • Now, you can see for yourself what your employees do on their desktops during office hours and that too without being physically present in front of them. Yes, it is possible with the help of computer monitoring software. It facilitates the administrator to restrict the misuse of organization?s resources by employees, unnecessary chatting, internet surfing, access to social networking sites during working hours. Administrator comes to know about the possible security breaches if any, while invisibly monitoring varied computers at the same time. Also, this advanced utility enables the user to execute commands like Shut down, Restart, Lock, remove wallpaper, start screensaver, etc. on the monitored computers. Also, administrator can schedule online as well as offline recording of the monitored computers. Offline recording of the software is helpful when admin or manager is not available on desk. This recording is saved in AVI format and can be checked later or saved for future references as a proof. For calcula ...
  • SECUDRIVE Sanitizer Free was developed to give the person disposing his or her personal computer the confidence to delete the hard drive without data loss or personal data theft. By destroying the traces given off by the file, through commonly used deleting strategies, SECUDRIVE Sanitizer Free shows the user how important it is to totally delete the hard drive before PC disposal as to protect your privacy and the company's information.
  • CrococryptMirror is an encryption tool which mirrors complete folders to encrypted folders. The encryption algorithms that are used are AES and Twofish (256 bits, cascading). The keyfile is secured by a password using PKCS #5 (PBKDF2) with a SHA512/Whirlpool based HMAC using 100000 iterations and also AES and Twofish. Mirroring can be done manually (on-demand) or by using the sync service which detects directory changes on the fly.
  • Protect Flash, PDF, Powerpoint, Excel, EXE ,E-Book, Video, Audio, Images . Every document which can be printed with a printer driver can be protected. Predefined workflow without programming. Available in 13 languages. Content Protection / DRM / Time limited versions / Software Copy Protection / Network licence per PC, User, Floating Licence / Shop Integration / Screencapture Protection / Delivery on USB Stick, CD or Download Link
  • MSD Strongbox is a confidential files manager of maximum security, which can store files in the database and protect them with a password. To extract the files from the database it is necessary to know the password. MSD Strongbox is ideal for safely transporting documents on removable disks and Pen Drives, as it can be installed on this type of storage devices.
  • TCP Port scanner Multi threaded with possibility to scan 65535 TCP ports on an IP address. You can specify how many threads to run and the timeout. Further more it will tell you the MAC address of the target and the service running. For LINUX, Windows and Mac OS X.
  • Fast create strong passwords. Store and manage passwords. Support all programs and internet browsers. Easy to use. Supported operating system: Windows 2000, Windows XP, Windows 2003, Windows Vista.
  • Clear Blue Security is a free full-featured endpoint security management suite that monitors, detects and reports endpoint security vulnerabilities, including the monitoring of installed malware applications, providing status on updates and patching, implementing a company wide security policy, monitoring installed but unapproved software, alerting suspicious and possibly malicious traffic and scanning network facing IPs for unwanted open ports.
  • Control the time your children spend on Facebook, Youtube, Twitter and other social networks. Limit the access time to the strictly indicated periods as well as limit the total amount of time for visiting social networks. For example, you could restrict access to Facebook to just from 5pm to 8pm, and no more than 45 minutes per day. The WebLock is designed especially for working with social networking sites, it does not perform other internet fi
  • Mobile Spy Mobile Monitoring Software helps to keep records of your activities, logs details, GPS location, which quickly gets uploaded to your mobile spy account which you have created. It is compatible and works for most models of iPhone, Blackberry or Android. This software works independently. It does not depend on your phone. So even you try to delete the message in your phone it has no effect on the software, the details already gets save in the software. To view the details of the user you have to just login into your account with a computer or mobile. If you are concern about your child or employee misusing the cell phone then this software is for you. This mobile spy gets you the current location as often you want. It helps to keep track on your children and subordinates. The Parents can keep track of the website visited by their children with the help of this software.
  • LanAgent is a smart tool to monitor all actions of a remote computer user. The program records various kinds of data, which will be sent to you on your first request: keystrokes; connections established; websites visited; programs, files or directories opened; clipboard contents and so on. A detailed report on a specified time period is always available to you, yet the program is absolutely invisible to this remote user.
  • Eusing Maze Lock uses a pattern based technique to lock your computer. You need first to set your own unlock pattern by connecting some of the nine dots together or keep the default unlock pattern. The next time you need to unlock the pc, the pattern and image must be entered correctly. It can lock your computer with a single click on the tray icon or using a custom hotkey. It can change the lock screen background image, the pattern size etc.
  • USB Log & Lock allows you to control operations with USB devices on computers connected to the local area network of an organization or enterprise. With USB Log & Lock, you can forbid USB devices with the help of flexibly customizable rules both for separate devices and users and for groups of users.
  • Power Spy secretly logs Facebook, keystrokes, chats & IMs, emails, web visits, video talk, logins, passwords, applications, searches and more. It also takes screenshots like a surveillance camera. Let you see exactly what they see on a computer screen. Automatically sends log reports to your email or ftp. Starts monitoring with system startup. Runs silently and invisibly. Only administrator of the software can manage it with hotkey.
  • Advanced-PasswordManager is a secure password management software that stores all your passwords in an encrypted vault protected by one master password. It removes identity traces from your PC after saving them to encrypted vault. You can auto fill web forms using your saved details. Free download Advanced-PasswordManager and protect your passwords, social security number, personal and credit card details from identity theft and fraud.
  • Keystroke Logger Pro is an invisible keylogger for Windows systems that runs hidden in the background. Keystroke Logger Pro secretly records keystrokes, passwords, websites visited and also takes screenshots at set intervals just like a surveillance camera. More details: www.keystroke-logger.com

Page 5 of 30
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30


Legal disclaimer | Privacy policy

© 2004-2020 IT Shareware