Home | Submit a file  |  New  |  Categories  |  Our awards  |  Link to us  |  RSS Feeds

Utilities :: Security & Encryption
Sort by: date | product title | rating | downloads | popularity
Display: short descriptions | full descriptions
  • Comprehensive protection for Windows-based network workstations under a public environment. It lets you restrict access to every corner of PC workstation, apply executable patches remotely, and schedule reboots, shutdowns, and Windows Explorer restarts from a single administrator's computer connected to a TCP/IP-based network or Internet. In total, 1st Network Admin supports over 600 different security restrictions, options and tweaks.
  • 1st Privacy Tool is a powerful security utility that allows you to restrict access to Windows important resources. This easy-to-use utility helps you to keep your computer in order. It enables you to impose a variety of access restrictions to protect your privacy. You can deny access to each individual component of several Control Panel applets, DOS programs, Registry editing and network access. It has got the multiuser intuitional interface.
  • 1st Screen Lock is a password-protected desktop security utility that lets you lock your desktop with a password on boot, or at the time you are leaving your PC. You can use the built-in spy utility that works in background and enables you to spy on your PC users by fixing all user moves in a log file. This is very useful, when you need to know what your children or personnel do at the time you are away.
  • Protect PC, restrict access to Windows applications, password-protect boot, apply access restrictions to PC, protect your privacy, deny access to Control Panel, disable interruption boot keys, context menus, DOS, Registry editing, Internet and network access. Hide desktop icons, disk drives, Start Menu items, taskbar, task manager, tray icons. Apply password protection to Windows, control Internet, spy on PC users.
  • Password-protected security utility for all Windows. Restrict access to Control Panel, disable Start Menu items, hide drives, disable DOS, boot keys, Registry editing, taskbar, task manager, and network access, hide desktop icons, apply password protection to Windows, and disable running applications. Secure Internet Explorer, disable individual menu items and individual tabs in the Internet Options dialog, as well as specific settings from each
  • Password-protected security utility for all Windows. Restrict access to Control Panel, disable Start Menu items, hide drives, disable DOS, boot keys, Registry editing, taskbar, task manager, and network access, hide desktop icons, apply password protection to Windows, and disable running applications. Secure Internet Explorer, disable individual menu items and individual tabs in the Internet Options dialog, as well as specific settings from each.
  • 1st Security Center is a powerful security utility that allows you to restrict access to Windows important resources. This easy-to-use utility helps you to keep your computer in order. It enables you to impose a variety of access restrictions to protect your privacy. You can deny access to each individual component of several Control Panel applets, DOS programs, Registry editing and network access. It has got the multiuser intuitional interface.
  • Ever need to keep tabs on your spouse or teenagers while they use your computer? CyberAgent X has a friendly and simple interface provides a array of essential computer monitoring features, offers detailed info on who uses your computer,their e-mails and chat, the visited web sites, programs used, screenshots of their activity and internet surfing history. Record all Keystrokes, Passwords, videos and social networks such as facebook and myspace.
  • PrivacyArea is a fast security software that have 2 components: Privacy folder, Manage and auto-fill Password. "Privacy Folder" can hide and password-protect your files, folders, pictures, and documents in seconds. Locked files are hidden, inaccessible and undeletable, effectively protects your data from all online and offline threats such as peepers, hackers, viruses, spyware, and Trojan horses. "Password Manager" securely stores your passwords, credit card/bank acct numbers and auto-fills use the shortcut menu item "Enter Login ID" and "Enter Password" when you visit your online accounts, gives your passwords and other personal data security (strong 256-bit encryption), portability, and complete manageability. Passwords can be printed, copied to another computer, backed up, and restored.
  • 2X SecureRDP dramatically increases the security of your terminal servers by accepting/denying incoming RDP connections by IP, Mac address, computer name & more. Logon screen is only displayed if the connection is established from particular IPs or machines. Computers that do not meet the filter restrictions don't see the logon screen & won't get to try a brute force logon! Its an ideal FREEWARE tool for secure remote administration
  • 360 Monitor allows you to monitor employee's activities on all network computers, such as email, instant message, keystrokes, FTP file transfer, websites visited, applications used, etc. 360 Monitor also can log file operations on employee's computer, such as copy, delete, create, rename, open, copy file to removable disk, etc. Send alarm to console computer when employee do a file operation on removable disk
  • 360 Spy Software is the #1 computer monitoring software available for parents and businesses installing on any computer you own and read the activity logs from anywhere at any time. It logs keystrokes and passwords typed, websites visited and online searches, screenshots of user activity, windows interacted with, internet connections made, application usage, all files opened, deleted and modified, chatroom conversations, computer usage sessions.
  • 360 Spy Software secrectly logs all keystrokes, web sites, emails, chats & IMs: MSN Messenger, Windows Live Messenger, ICQ, AOL / AIM, Yahoo! Messenger, Windows Messenger and Skype. Takes screen snapshots at every X seconds like a surveillance camera. Displays exact activities, like MySpace, Facebook, PC games, online searches & shopping, file transfers and webmails. You can receive reports remotely via emails or ftp.
  • 360 Spy Software secrectly logs all keystrokes, web sites, emails, chats & IMs: MSN Messenger, Windows Live Messenger, ICQ, AOL / AIM, Yahoo! Messenger, Windows Messenger and Skype. Takes screen snapshots at every X seconds like a surveillance camera. Displays exact activities, like MySpace, Facebook, PC games, online searches & shopping, file transfers and webmails. You can receive reports remotely via emails or ftp.
  • 360 Spy Software is a secret keylogger, Facebook, Skype, Windows Live Messenger (MSN Messenger) and Yahoo Messenger spying software. It also records web visits, emails read, online searches, shopping records, etc. You can view logs on the monitored computer or receive reports remotely via emails or ftp, like every 60 minutes. It has extremely easy- to-use interface even for computer beginners.
  • 360 Spy Software secretly logs Facebook, keystrokes, chats, IMs, emails, websites visited, microphone, video talk, logins, passwords, applications, searches, documents and more. Logs Skype, Yahoo Messenger, MSN, ICQ, AIM, etc. Takes screenshots every x seconds like a spy cam. Sends logs to your email. You can check logs on a remote PC, tablet, smart phone, or directly on the monitored PC. Perfect for monitoring employees, kids and spouse.
  • 360 Spy Software secretly logs Facebook, keystrokes, chats, IMs, emails, websites visited, microphone, video talk, logins, passwords, applications, searches, documents and more. Logs Skype, Yahoo Messenger, ICQ, AIM, etc. Takes screenshots every x seconds like a spy cam. Sends logs to your email. You can check logs on a remote PC, tablet, smart phone, or directly on the monitored PC. Perfect for monitoring employees, kids and spouse.
  • 4S Lock 1.07 enables you to lock your workstation at any time by simple double click on system tray icon. Transparent lock is available. 4S Lock also provides startup/logon computer lockdown. During computer startup 4S Lock seamlessly replaces standard windows shell, and switches it back having a password. With version 1.07, 4S Lock also automates computer cleanup. Such files as temporary internet files, cookies, internet history, recent documents traces and other files reflecting your working and internet browsing habits are automatically and permanently destroyed upon computer startup or shutdown. Normally, 4S Lock makes an auto show of top world cars and sport utilities. 10+ pre-configured image sets are available for free one-click download within the program interface. With Synaptex MyScreenSaver Builder 1.1 you can easily package your own images into a single file (MSS-file) and use them with 4S Lock.
  • Evidence Eraser Pro gives you privacy and optimizes your computer by erasing the Internet tracks and unwanted files that piles-up on your computer automatically as you browse Internet. It releases your valuable disk space by cleaning the unneeded zero length files; recent documents bookmarks, IE cache and dead shortcuts from your computer, which enhances your computer performance.
  • Many people believe that passwords are all that's needed to keep pirating eyes away from the data stored on their computers. But if that were true, there'd be no such thing as a "hacker." While passwords are certainly helpful, it takes a lot more than that to protect the information on your computer. With malicious malware products lurking about on the Internet, it's worth having extra layers of data security on your side. Sometimes an innocent-looking website can be a hacker in disguise. Nosey coworkers, bosses, friends, and even spouses can also pose a threat to our privacy. With A+ Folder Locker, you can store files, folders, drives, and even complete software programs in special data storage "lockers." Not only do these lockers keep the names of the files and folders you store in them from being viewed, the robust level of security of the lockers make them virtually impossible to break into. A+ Folder Locker also includes a variety ...
  • A-KEYLOGGER Reliability, and ease of use, This software will give you a simple to use control panel where you have total control, Jargon free instructions make this tool one of the simplest out there when it comes to operation, Total invisibility means the user will be unaware they are being monitored and so will act as normal in there false "private" environment.
  • A-PDF Flash Package Builder is a fast desktop utility program that lets you create professional Windows executable file (.EXE) from flash (SWF) or flash video (FLV) formats. You can customize your flash executable files to playback your flash and flash videos in the best way, and protect them from being used.
  • A-PDF Password Security is a desktop utility program that lets you change password security of existing Acrobat PDF files. That means you can protect PDF files with 128 bit encryption or remove the password protection. It can handle either single or batch documents with a wizard. It can handle either single or batch documents. Another convenient features include password pool and hot directory. You can modify metadata at the same time also.
  • No chance for the Dialer rip off! Protect your PC with a-squared Anti-Dialer from manipulated dial up connections, which can cause a phone bill of several hundred dollars quickly. a-squared Anti-Dialer provides a complete defense against Dialers. Scan all files on your harddisks for Dialer behavior using the Dialer scanner. The integrated background guard protects the PC from new infections.
  • a-squared HiJackFree is a detailed system analysis tool which helps advanced users to detect and remove all types of HiJackers, Spyware, Adware, Trojans and Worms. Manage all types of Autoruns on your system, Explorer and Browser plugins (BHOs, Toolbars, etc.). running Processes and their associated modules, control all Services, even those Windows doesn't display, view open ports and the associated listening processes and edit the hosts file.

Page 2 of 30
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30


Legal disclaimer | Privacy policy

© 2004-2019 IT Shareware