Home | Submit a file  |  New  |  Categories  |  Our awards  |  Link to us  |  RSS Feeds

Utilities :: Security & Encryption
Sort by: date | product title | rating | downloads | popularity
Display: short descriptions | full descriptions
  • Order Maven is an order form generator for online merchants. Create stand-alone Windows executables that can be distributed royalty-free to customers. Collect, encrypt, and e-mail credit card orders directly back to merchant with built-in public key encryption and SMTP functions. Visually design your forms with the drag and drop interface.
  • Iron Privacy Protector is free and allows to secure your private information from the prying eyes in just a few clicks. It has many options to clean sensitive private user information like typed URLs history, favorites, cookies, recently executed applications, temporary files etc. Iron Privacy Protector is a tiny application with a minimal requirements, simple and convenient user interface, small RAM and hard drive footprint. Best of all is that Iron Privacy Protector is completely free for everyone without limitations.
  • Lockend has become the ultimate protection management software through continuous modifications and corrections focused on discrimination and perfection of document or information protection. Lockend is easy to use in dealing with complicate and difficult issues related to data security by offering functions to protect all types of document or privacy information.
  • OpenOffice Draw Password Recovery makes Draw password recovery downright simple. It provides a friendly interface and a carefully chosen feature set to let users recover passwords without problems. Even users who are not exposed to computer technologies can learn how to use OpenOffice Draw Password Recovery in just minutes and then instantly recover open-document passwords and remove ReadOnly protection to make the document editable again.
  • CovertMail for Outlook Express helps keep your emails private. It provides complete privacy of your message store, protecting it from anyone who may want to access your correspondence without authorization. CovertMail hides the identity you specify (it won't be visible through Outlook Express anymore) and encrypts message store. You can get yourself two identities, a usual one and a secret one - the latter totally hidden from anyone.
  • XP-Protector is security tool for Windows XP and Windows 2000. It provides easy and comprehensive access to many security features of these systems, so that home users without experience with administering computers can take advantage of their improved security features.
  • The best network-based security software for public environment applications to secure and maintain a lot of network PC workstations located in different places. It supports over 600 different security restrictions, options and tweaks to restrict access to all parts of Windows, lets you apply executable patches remotely, and schedule reboots, shutdowns, and Windows Explorer restarts from a single administrator's computer.
  • RDS-Knight is the optimal solution to detect cyber threats, defend RDS servers and develop remote desktop systems' security. RDS-Knight combines five great protections to keep Remote connections safe at all time. Easy-to-use and efficient RDP software, it enables rapid response to cyber breaches to enforce security for both Remote Desktop' users and administrators. Download it now and keep the hackers away from your RDS Servers !
  • Power Spy Lite secretly logs Facebook, Skype, keystrokes, chats & IMs, emails, web visits, video talk, logins, passwords, applications, searches and more. It also takes screenshots like a surveillance camera. Lets you know exactly what they do on a computer screen while you are away. Automatically sends log reports to your email. Starts monitoring with system startup. Runs silently and invisibly.
  • SpyPal Keylogger secrectly records Facebook, keystrokes, screenshots, websites visited, applications, Skype, clipboard, passwords, emails, documents, microphone and more. In Stealth Mode, it is completely invisible to monitored users. Use hotkey and password to access the program. Automatically sends logs to your email or ftp every x seconds. Perfect for monitoring employees, children, spouse and investigating crimes.
  • Network Password Manager is a program created especially for the enterprise. It helps employees to safely store and use passwords within the company, manage passwords and set access rights. It also provides the reliable security using 256-bit AES encryption. It works in multi-user mode and creates a common environment. Support of Windows user groups is included. A clear, user-friendly interface considerably simplifies the installation process.
  • To protect your privacy, comply with regulations and prevent data breaches, BestCrypt Container Encryption delivers 'on-the-fly' data encryption that's easy to use for virtual drives and selected files or folders. BestCrypt encrypts files on Windows, Mac OS X and Linux with AES and other strong encryption algorithms. By featuring deniable encryption and dynamic containers Jetico's file encryption is the best TrueCrypt alternative. Includes BCWipe
  • Power Spy for Home secretly logs Facebook, keystrokes, chats, IMs, emails, websites visited, microphone, video talk, logins, passwords, applications, searches, documents and more. Logs Skype, Yahoo Messenger, ICQ, AIM, etc. Takes screenshots every x seconds like a spy cam. Sends logs to your email. You can check logs on a remote PC, tablet, smart phone, or directly on the monitored PC. Perfect for monitoring employees, kids and spouse.
  • Perfect Keylogger is the most powerful and undetectable monitoring software for Windows PC. It tracks all keystrokes and view keylogs, captures chats: Messages, Skype, Facebook, WhatsApp Web etc., secretly records screenshots, tracks visited websites even in private mode. Smart reporting system. Export logs automatically and send it your email or ftp.
  • KSnetManager is a revolutionary parental control tool that is distinct from other internet monitoring software: 1) Instead of being a hidden monitoring program, it is interactive. 2) Instead of passive monitoring, it actively controls and blocks unexpected activities. 3) It controls and monitors not only websites, but also all programs on your computer. 4) The program has a fully encrypted key logger; and much more.
  • Protect files and folders situated on local media of Windows98/ME/NT/2000/XP/Vista with Easy File & Folder Protector at Windows kernel level. Your can deny access to certain files and folders, or to hide them securely from viewing and searching. Easy File & Folder Protector has an easy-to-use user interface allowing you to allocate access to your files and folders between your users according to predefined timetables. Each PC user can have his..
  • Spyrix Keylogger is a Powerful Invisible Software for remote monitoring of user activity:keystrokes logger, screenshots, passwords, facebook, Skype, web, chats, emails, IMs. Collected data can be viewed via remote secure web-account and also be automatically sent to email, dropbox, google drive, FTP, Local Network. Spyrix Keylogger is very easy to configure and use.
  • PTP (Person To Person) now lets you email uncrackable files in AutoCrypt(TM) mode. This means it will self-decrypt at the other end, as if by magic ! The recipient does not need any software or digital certificates to decrypt the file. This feature is unique to PTP and ensures that you can send safe files without worrying about whether the recipient has the right decrypion software to read them. No other system makes email security so easy.
  • Netwrix Password Manager gives end users ability to securely manage their passwords and resolve account lockouts in a self-service fashion without involvement of helpdesk personnel, allowing organizations to implement strong password policies in Active Directory environments and address their identity management challanges.
  • USB Log & Lock allows you to control operations with USB devices on computers connected to the local area network of an organization or enterprise. With USB Log & Lock, you can forbid USB devices with the help of flexibly customizable rules both for separate devices and users and for groups of users.
  • NoteGuardian securely stores and organizes your sensitive information in an encrypted database. NoteGuardian is easy to use and customizable to suit your needs. NoteGuardian is ideal for managing passwords, logins, financial account numbers, social security numbers, and similar sensitive information. All information in NoteGuardian is stored locally, nothing is transmitted on the internet.
  • Easy Hide Files allows hiding files and folders from viewing, accessing and searching completely, so that only you know that those files or folders exist. No matter how particular computer (over local network, from internet or directly) is accessed, those folders stay invisible and safe.
  • It`s not a common knowledge that even after a full deletion of files, either skipping the recycle bin or directly from it, your files can be recovered with the help of specially designed programs. Our program allows you to delete your files without a possibility to recover them, in case your deleted files are recovered, their data will be lost forever, what makes reading them impossible. The program processes files at a high speed and is easy to
  • Smart ID Scan deep scans the files on your PC for any traces of personal ID information. You can help protect your personal information by shredding any documents on PC which contain potential ID leaks including social security numbers, credit card numbers, bank account numbers, passwords or user IDs. Don't risk becoming a victim of ID theft. Run a simple scan with Smart ID Scan today and make sure there is no valuable personal information

Page 25 of 30
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30


Legal disclaimer | Privacy policy

© 2004-2020 IT Shareware