Home | Submit a file  |  New  |  Categories  |  Our awards  |  Link to us  |  RSS Feeds

Utilities :: Security & Encryption
Sort by: date | product title | rating | downloads | popularity
Display: short descriptions | full descriptions
  • Database to store and manage your Accounts, Usernames and Passwords, your URLs and Projects, MS Windows Version.
  • Security Tracker internet monitoring software is a powerful and flexible system for the control of the staff working hours usage in a network or on a terminal servers. There are many of the software to solve a similar problem. Part from them - simply spyware programs intended first of all for capturing of user`s keystrokes, passwords and various messages.
  • Keylogger Spy Software secretly logs Facebook, keystrokes, chats, IMs, emails, websites visited, microphone, video talk, logins, passwords, applications, searches, documents and more. Logs Skype, Yahoo Messenger, MSN, ICQ, AIM, etc. Takes screenshots every x seconds like a spy cam. Sends logs to your email. You can check logs on a remote PC, tablet, smart phone, or directly on the monitored PC. Perfect for monitoring employees, kids and s
  • Security Tracker is a powerful and flexible system for the control of the staff working hours usage in a network or on a terminal servers. There are many of the software to solve a similar problem. Part from them - simply spyware programs intended first of all for capturing of user`s keystrokes, passwords and various messages.
  • Web Cam Spy, invisible keylogger, email and messenger spy software. It records all keystrokes typed, MSN Messenger, Windows Live Messenger, ICQ messenger, AIM, Yahoo! Messenger, Windows Messenger and Skype's chats, websites visited, emails read, documents opened, windows opened, clipboard activaties, passwords typed and applications executed. It even takes screen snapshots like a surveillance camera.
  • Secure personal database for sensitive data (bank accounts, credit cards, email accounts, serial numbers, web passwords or any other sensitive information). PassDirector uses strong, high secure Blowfish encryption (up to 448 bit), the password is not stored in the computer, it cannot be retrieved by any way.
  • SpyKing PC Spy secretly logs all Facebook use, keystrokes, chats & IMs, emails, web sites, user names, passwords, web cam images, apps, microphone, clipboard and more. It supports Skype, Yahoo Messenger and others. It also takes screenshots like a surveillance camera. You can receive reports remotely via email or ftp as often as you wish. Open these reports on another PC or on your cell phone browser.
  • Advance keylogger is best PC activity monitoring tool that keep track on all the activities done by any external user on your computer in your absence. Keylogger PC monitoring application records all the online and offline system activities. Software captures voice chat conversation, email id, typed website URL, user name, password, text documents etc. PC spy keylogger utility captures all keyboard pressed characters including alphabets, digits, functional and special characters like Alt, Ctrl, Shift, Del etc. Windows Vista advance keylogger program records all the captured system and keyboard activities in an encrypted log file. Keylogger computer monitoring software automatically sends log files to specified email address or upload to web server through FTP setting. Advance keylogger application records all the activities with exact date and time also captures windows screenshots at regular interval. Software works invisibly as a background process cannot be found in desktop items or in the program files. A ...
  • AWinware Pdf Encryption software is Windows compatible robust application, protects bulk pdf documents with open password and owner password restrictions. Tool uses high level RC4 security algorithms to protect content stream. Encryption mechanism provides two types of securities; low level and high level. Low level uses 40 bits strong key while high level uses 128 bits strong key to protect documents. Tool can add both open password as well as owner password into the pdf document. Open password prompt to type when someone try to open document for reading while owner password is required to edit, copy or print document, if protected previously. Adding restriction owner password prevents pdf from being print, blocks pdf edit, disable pdf content copying, disallow form filling, signing and commenting. Download free evaluation copy of pdf encryption tool to protect document with password, but a watermark will be added in output file, while full copy works perfectly. Features: # Pdf encryption tool adds both ope ...
  • Pangolin is an automatic SQL injection penetration testing (Pen-testing) tool for Website manager or IT Security analyst. Database support: Access,DB2,Informix, SQL Server,MySQL, Oracle,PostgreSQL,Sqlite3,Sybase. Features: Auto-analyzing keyword, HTTPS support, Pre-Login, Bypass firewall setting, Injection Digger, Data dumper, etc.
  • Data Shredder literally destroys files, free space and your Recycle Bin contents instead of only deleting them. That means your data contents once overwritten and destroyed It can't be recovered. The user therefore should be sure of the files, folders .etc. he/she wants to shred.There are many safeguards built into the Data Shredder program to warn the user.
  • Secure portable pdf documents with user level and owner level security protection. Encrypt pdf documents using 40 bits and 128 bits encryption level security. Pdf encryption software not only set user level password but also facilitates owner guard security which restrict pdf printing, editing, signing, commenting, content & graphics copying, page extraction etc. Tool helps to customize the security setting by selecting required parameter to lock pdf. User can select whether he/she wants to allow their recipients to print, edit, copy pdf content or not. All options can be set by simple tick boxes selection. The main feature of this awesome tool is that it can process batch pdf files for encrypting documents. Locking pdf files with password ensures that only intended recipients can open the documents. Features: # Pdf encryption tool supports bulk pdf files. # User can add both user and owner password security. # Tool supports two levels of password security 40 bits and 128 bits. # Tool does not r ...
  • The market of commercial PC monitoring software is huge. Keylogger software for pc surveillance is now common and very popular with many pc owners who want - and by all means have the right - to know how their computers are used. Keylogger software is most often applied for employee monitoring and parental control. It is now clear that information security concerns all of us, whether we like it or not. So Download Parental control tool that detect everything that is typed on keyboard, able to work in hidden mode and allows you to investigate all things that happens on your PC. Internet parental control software makes easy to record everything that your kids does on computer system and helps to protect PC, records instant messages and keystrokes. Professional PC monitoring software facilitates user to monitor online chat activities of children, employees and prevent them misuse and access of unauthorized sites. Keyboard recorder tool allows you to find out everything that happens on PC in your absence. Keystro ...
  • Don't let your hard work slip down the drain! PDF Profit Lock lets you add password protection, self-expiring files, splash screens, exit pop-ups...even your own icons! Installation is a breeze and protecting your PDF files takes less than five minutes a book. If you don't have PDF Profit Lock, you're throwing money down the drain with every download.
  • A professional system for licensing and protecting executable files for Windows. The Enigma Protector is an essential tool for every developer of commercial software and shareware for Windows. The Enigma Protector includes a wide range of unique features aimed at protecting executable files from illegal copying, hacking, modification, and analysis. The supported formats include almost all types of 32- and 64-bit executable files.
  • PTP (Person To Person) now lets you email uncrackable files in AutoCrypt(TM) mode. This means it will self-decrypt at the other end, as if by magic ! The recipient does not need any software or digital certificates to decrypt the file. This feature is unique to PTP and ensures that you can send safe files without worrying about whether the recipient has the right decrypion software to read them. No other system makes email security so easy.
  • Cryptic Disk creates virtual encrypted disks and encrypts hard disks, USB drives and memory cards. This lets you keep your secrets safe both on your home computer and at your workstation. Professional-grade data encryption uses the best algorithms available and happens in real time. Reliable concealment of encrypted disks and containers, with access only through a password or key files. Support for cascading encryption.
  • A free tool which can hide and password protect your private folders so no one else can access them. It has 3 protect modes: hide, lock, and lock with password. The "hide" mode can combine with other "lock" modes to create total hidden folder. Works for Windows 7.0, Vista and XP (including their 32 and 64 bit variants)
  • kitProtector is a tool that allows to secure your computer given to public use. With the help of this tool you can block the user's actions aimed at wrecking the OS and performing unplanned actions. kitProtector works according to the following functionality: Blocks system key combinations (Ctrl+Alt+Del, Ctrl+Esc, Alt+Tab, Ctrl+Shft+Esc, Win+..., Toggles keys, etc). Blocks the user access to the active desktop. Blocks Windows OS programs as well as third-party ones. Blocks the user access to the TaskBar.( Disable the "Task Manager) Specify the time limit to use a program. The possibility to make the user to work with one programe only. After a crash or attempt to close it -it's launched again. During the long-lasting idle time activates a screensaver which is the Internet URL or the link to the local file. The password control prevents unauthorized users to change settings or uninstall the program.
  • Children Monitoring Spy secrectly logs your kids' Facebook use, chats, website visits and web cam images. It also logs keystrokes typed on keyboard, including their user names and passwords. It records their Skype, Windows Live Messenger, Yahoo Messenger and other instant messengers. You can check logs on the monitored PC, or receive logs via email from your office PC or cell phone. It is a great tool for caring parents to proctect childr
  • Security Tracker employee surveillance software is a powerful and flexible system for the control of the staff working hours usage in a network or on a terminal servers. There are many of the software to solve a similar problem. Part from them - simply spyware programs intended first of all for capturing of user`s keystrokes, passwords and various messages.
  • LockItTight let you precisely locate and monitor your computers through LockItTight.com. After you sign up the free service on LockItTight.com and install the client software on your computer, it will consistently report its location, screen and webcam shots, key and clipboard logs to LockItTight.com. You can access the reports from any computer. In case your computer was lost or stolen, you will be able to find where it is, who is using it.
  • Keystroke recorder keylogger is a top-rated, invisible and easy-to-use surveillance tool that records every keystroke to a log file. The log file can be sent secretly with email or FTP to a specified receiver. Keystroke recorder keylogger can also detection specified keywords and take a screenshot whenever one is typed, displaying findings in a tidy log viewer. It causes no suspicious slowdowns and takes very few system resources...
  • Powerful encryption software with pre-boot authentication secures 100% of your hard disk drive, including the OS. Secure Disk provides the ultimate security standard for encryption at the physical sector level. Based on the most secure technology, AES256, this product is an outstanding data security tool.

Page 25 of 30
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30


Legal disclaimer | Privacy policy

© 2004-2020 IT Shareware