Home | Submit a file  |  New  |  Categories  |  Our awards  |  Link to us  |  RSS Feeds

Utilities :: Security & Encryption
Sort by: date | product title | rating | downloads | popularity
Display: short descriptions | full descriptions
  • The market of commercial PC monitoring software is huge. Keylogger software for pc surveillance is now common and very popular with many pc owners who want - and by all means have the right - to know how their computers are used. Keylogger software is most often applied for employee monitoring and parental control. It is now clear that information security concerns all of us, whether we like it or not. So Download Parental control tool that detect everything that is typed on keyboard, able to work in hidden mode and allows you to investigate all things that happens on your PC. Internet parental control software makes easy to record everything that your kids does on computer system and helps to protect PC, records instant messages and keystrokes. Professional PC monitoring software facilitates user to monitor online chat activities of children, employees and prevent them misuse and access of unauthorized sites. Keyboard recorder tool allows you to find out everything that happens on PC in your absence. Keystro ...
  • A professional system for licensing and protecting executable files for Windows. The Enigma Protector is an essential tool for every developer of commercial software and shareware for Windows. The Enigma Protector includes a wide range of unique features aimed at protecting executable files from illegal copying, hacking, modification, and analysis. The supported formats include almost all types of 32- and 64-bit executable files.
  • SurveilStar Any Parental Control is designed for parents to monitor kids' online activity. With this software, parents can grab screenshots, record sent and received mails, record and block chatting messenger, monitor and block visited websites. So parents shield your children from cyber bullies, predators and adult oriented websites, and ensure you have the control you need over children online activity.
  • Receive HTTP(HTTPS)-traffic from user applications. Send traffic HTTP(HTTPS)-traffic back to your applications. Work with proxy "CONNECT" commands. Work via proxy-servers. Encrypt outgoing traffic from your applications. Decrypt incoming traffic to your applications. Simultaneously operate with all your applications. Work with several iSec-servers and Update-servers. Automatically switch to available iSec-servers. Automatic software updates.
  • Sticky Password FREE is the most comprehensive free password manager! Sticky Password FREE creates and stores strong passwords and gives you one-click form filling for online forms and templates. All your personal data is safe because it's encrypted. Only you will have access to your passwords and stored data. The portable version is included free and is easy to install on your USB device. You'll always have your passwords wherever you need them.
  • The software has been created as general application for surveillance hybrid platforms functioning all together with wireless and wired Internet cameras, TV-cards, capture cards, power-line, and USB cameras. It has web interface with the same form and functionality on the local and apart workstations. Users view MPEG-4 coded picture and have complete control of the software through network that security server can be run with no screen, keyboard, and mouse attached. Program`s modular composition extensively improves reliability because all components act as autonomous applications. If one component stops working, other parts keep on running. For instance if the `capture` unit freezes, `watchdog` restarts it right away that users don`t notice anything because they are watching picture using a `playback` part. The program does `cyclic` recording that the `hard drive full` situation never happens. The recording can be constant or it can be initiated by movement, human face recognition, or by timetable. T ...
  • Cryptic Disk creates virtual encrypted disks and encrypts hard disks, USB drives and memory cards. This lets you keep your secrets safe both on your home computer and at your workstation. Professional-grade data encryption uses the best algorithms available and happens in real time. Reliable concealment of encrypted disks and containers, with access only through a password or key files. Support for cascading encryption.
  • PC USB port monitor inspection utility captures entire details of incoming and outgoing data of a connected USB device into the client computer in Local Area Network and save all information in text or html format log file. USB drive activity monitoring software alert to you by CPU sound or selected sound beep when USB drive devices connect or removed from any computer system in local domain. USB drive activity monitoring software provides facility to system administrator that they can assign read and write permission of any USB port for multiple computers simultaneously. USB drive controller tool monitor client system from unauthorized access of pen drive, thumb drive, memory stick, Flash card, iPods, memory card, USB mass storage, MP3 player, MP4 media players or other similar removable storage media in real time. USB drive disabling software capture file operation like cut copy past delete on USB drive and send log file report to server administrator. USB drive activity controller software detain device pl ...
  • Encrypt all your files securely, leave no traces behind with new secure file delete, send passwords in a secure way, increase your security of your password with key-extension and experience new mobility with AFS Xpress (Selfextracting Exe) and encrypted, compressed archives! AFS securely and reliably protects any type of data against unauthorized access. Therefore it's using the world-wide standardized, fast and very safe encryption algorithm - AES. AFS is usable with all kind of storage types, especially designed for usage for USB flash drives. But also usable for secure data transfer via eMail. It's a stable, reliable but also lightweight encryption tool, which even runs without installation. And has simple and efficient user interface with windows context menu integration. Especially useful for work with mobile devices (automatic drive letter detection), no installation needed or possibility to copy installation easily. And on top of all fast help support as well.
  • Best and easy to download internet monitor application easily allows both technical and non-technical user to use such type software without taking extraordinary technical classes in advance. Simple to operate data tracking tool allows user to save all visited details into different file format like txt or html and also able to save them at safe location in system or at user defined another desktop. Amazing PC monitoring utility operates in hidden mode that is not visible in task manager, start up menu, file, add or remove program, installation folder etc. Special http://www.monitoringsoftware.mobi site allows user to take a trial version of tool for understand software. Safe and economical personal computer data manager program allows user to record all actions performed by kids in stealth mode including typed keyword, URLs, visited websites, sending and receiving mails, chat conversation, screenshots and many others in efficient manner. Superior monitoring software supports all Windows OS based system suc ...
  • NoteGuardian securely stores and organizes your sensitive information in an encrypted database. NoteGuardian is easy to use and customizable to suit your needs. NoteGuardian is ideal for managing passwords, logins, financial account numbers, social security numbers, and similar sensitive information. All information in NoteGuardian is stored locally, nothing is transmitted on the internet.
  • Key logging software is designed to remotely monitor and log all keystrokes. PC activity monitoring tool can invisibly records keyboard activities like PIN codes and account numbers for e-payment systems, passwords to online gaming accounts, email addresses, browser histories, system information, user names, passwords etc. Keylogger program logs information about a user's online activities into automatic invisible log and send to administrator specified email id. Software allows you to monitor a user's keystrokes and then send this information back to the specified user email address at work or at home, whichever you choose. Keyboard logger software runs in hidden mode and cannot seen at control panel, start menu, add remove programs and task manager window. Software remotely view everything your child, employee or anyone does while they use your distant PC. Key logger utility has convenient interface of the log and screenshot view and provides support to all windows based operating system l ...
  • PCMate Free File Shredder is a secure and accurate free file eraser application for Windows that allows you to completely remove sensitive data from your hard drive by overwriting it several times with carefully selected patterns (Gutman, USDoD and others). This free file shredder helps shred files, folders as well as wipe recycle bin to protect your private data.
  • PC Activity Monitor Standard (PC Acme Standard) is an ultimate invisible and undetectable easy-to-use monitoring and surveillance tool for personal PCs. It is professional software that captures all users activity on the PC. It is a powerful management tool for users and companies, which want to increase their productivity and profitability. This is the most remarkable security product for a computer you have seen.
  • www.usbsquad.com enable users to prominently capture overall information including USB removable mass storage devices plug in and plug out activities done on client machine even network cable on machine is unplugged or network connection is accidentally broken. Highly interactive USB Port Blocker utility allow users to save record entire client machine information at user defined location in computer system or laptop for future reference and can be viewed by them whenever required. Graphical user interface facilitates users with advanced feature to frequently work with USB data protection tool for windows network without having any specialized technical knowledge or professionally expert guidance for operating. USB device activity monitoring software is available with enhanced feature it informs server with beep alert when any removable media device is inserted or removed to client machine. USB device activity monitoring Application for Windows network is beneficial for different sectors including software co ...
  • Windows Spy software secrectly logs all keystrokes, web sites, emails, chats & IMs: MSN Messenger, Windows Live Messenger, ICQ, AOL / AIM, Yahoo! Messenger, Windows Messenger and Skype. Takes screen snapshots at every X seconds like a surveillance camera. Displays exact activities, like MySpace, Facebook, PC games, online searches & shopping, file transfers and webmails. You can receive reports remotely via emails or ftp.
  • Award-winning software to restrict access to your PC and private data. Allows you to block access to Internet, web sites, files, folders, disks, applications, desktop and more. Block files download, software installations and uninstalls. Prevent users from plugging and using USB Flash devices, memory cards, external HDDs and DVD recorders. Multi-user and multi-profile support. Built-in scheduler. Event logging. Stealth-mode support. Multilingual convenient and friendly interface. Discounts are available when purchasing more than one license of InTouch Lock.
  • WinUtilities Process Security is a powerful Task Manager shows all active processes on your computer. You can easily recognize the endangering potential of each process. No other Task Manager or Process Viewer has this feature. Furthermore you can put a process into quarantine or search the internet for information about that process.
  • SpyPal Remote Spy secrectly records keystrokes, screenshots, websites visited, windows opened, applications, MSN, ICQ, AIM, Yahoo! IM, Skype, clipboard, passwords, emails, documents and more. In Stealth Mode, it is completely invisible to computer users. Use hotkey and password to access the program. Auto send logs to a preset email or ftp at set interval. Usages: monitors employees, children, spouse and investigate crimes.
  • Invisible Spy Software, keylogger, email and messenger spy software. It records all keystrokes typed, MSN Messenger, Windows Live Messenger, ICQ messenger, AIM, Yahoo! Messenger, Windows Messenger and Skype's chat text, websites visited, emails read, documents opened, windows opened, clipboard activaties, passwords typed and applications executed. Invisible Spy Software even takes screen snapshots at your set interval.
  • Our Spy Software is top-10-Spy Software Pro is a Complete Stealth Monitoring Software that can both monitor your Local PC and Remote PC or any Android (cell Phone or Tablet) device. WinSpy Software will capture anything the user sees or types on the keyboard. Win-spy will also capture WebCam shots and record surrounding sounds. Now Works behind Firewalls and Routers. New build includes JPG and PDF Remote File and Advanced Android Monitoring.
  • Power Spy software secrectly logs Facebook use, keystrokes, website visits, emails, chats and IMs: Skype, Windows Live Messenger (MSN), Yahoo Messenger and more. Takes screen snapshots at every X seconds like a surveillance camera. Displays exact activities, like Facebook, PC games, online searches & shopping, file transfers and webmails. You can receive reports remotely via emails or ftp. Perfect for monitoring kids, spouse and employe

Page 26 of 30
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30


Legal disclaimer | Privacy policy

© 2004-2020 IT Shareware