Home | Submit a file  |  New  |  Categories  |  Our awards  |  Link to us  |  RSS Feeds

Utilities :: Security & Encryption
Sort by: date | product title | rating | downloads | popularity
Display: short descriptions | full descriptions
  • LockItTight let you precisely locate and monitor your computers through LockItTight.com. After you sign up the free service on LockItTight.com and install the client software on your computer, it will consistently report its location, screen and webcam shots, key and clipboard logs to LockItTight.com. You can access the reports from any computer. In case your computer was lost or stolen, you will be able to find where it is, who is using it.
  • Passport is an easy-to-use password manager, which helps you to manage your passwords, logins, user IDs, access codes, and related information in a secure way. Using Passport you can store and organize all your passwords and other sensitive information in one encrypted database, which is locked with one master key. So you only have to remember one single master password to unlock the whole database. No more worries about remembering all your passwords. And if someone gains access to the database, it will be impossible to read information from it. The databases are encrypted using the secure and governments approved encryption algorithms. Passport can be installed on external storage devices such as USB flash drives. This will allow you to carry your password databases with you in protected state and accessible on multiple PCs. A built-in password generator helps you to create unique secure passwords, and easy to use form filling functionality automatically logs you into a web site or application.
  • Tripode is a secure, simple, easy to use tool that allows the user to order and clasify images saving them in compressed and/or encrypted files, besides, it can visualize and edit the saved images. In short, with Tripode you can enjoy your images and pictures in private and with complete security, without leaving them exposed to other users.
  • Logix Employee Monitor is a professional surveillance software, designed to monitor employees? activities. The program contains many features to improve employee productivity and prevent the wasting of work time. Employee Monitor tracks and records all your employees? computer activities and gives you remote access to this information, including typed keystrokes, visited websites, screenshots, and more. The software helps you to increase productivity with monitoring. Logix Employee Monitor was designed for an automatic and hidden Internet and PC monitoring. It is an easy-to-use application.Logix Employee Monitor is capable of catching all keystrokes (keylogger), capturing the screen within specified time intervals, recording web sites visited on the Internet. Logix Employee Monitor can create a report in the HTML format, and send it on the specified e-mail or via FTP. Logix Employee Monitor is absolutely invisible.
  • A free tool which can hide and password protect your private folders so no one else can access them. It has 3 protect modes: hide, lock, and lock with password. The "hide" mode can combine with other "lock" modes to create total hidden folder. Works for Windows 7.0, Vista and XP (including their 32 and 64 bit variants)
  • Remove NSF local database security with much ease and efficacy using imminent Kernel for NSF Local Security Removal software. It removes local security while maintaining the NSF file integrity; there is no hampering with NSF file content. Being an unprivileged NSF file user, when you try to access NSF file you get errors like, ?You are not authorized to access that database? or ?You are not authorized to perform that operation?. Lotus Notes local security removal helps you in getting access to the file by removing local security applied to it. After getting the access rights, one can open, edit the NSF file. Moreover, after accessing the NSF file, user can re-apply the removed security back on NSF file. Software is embedded with interactive GUI, which demands no technical skills to remove NSF local database security. Software is compatible with all versions of Lotus Notes .NSF files. FREE demo version is available that removes local security from NSF files with file size of up to 5 MB. For removin ...
  • Data Shredder literally destroys files, free space and your Recycle Bin contents instead of only deleting them. That means your data contents once overwritten and destroyed It can't be recovered. The user therefore should be sure of the files, folders .etc. he/she wants to shred.There are many safeguards built into the Data Shredder program to warn the user.
  • Invisible messenger spy software that records all Yahoo! Messenger incoming and outgoing chat text. Send reports to your custom email address or ftp. You can check all recorded messages by simply receiving emails or opening a web page. Use hotkey to unhide it from Stealth Mode and protect program access by password. Perfect for catching cheaters, monitoring employees, children or spouse, and even investigating crimes.
  • Company designs Keylogger Free software with full functionality and flexibility to consistent watch over entire work performed by company employees without actually being noticed them. Download cost effective Keylogger Free tool from www.keylogger.in to secretly maintain encrypted log file of unknown user actions on your personal computer or laptop in txt or html file formats as per convenient. Comprehensive keyboard monitoring application allows user to record windows login and system time modifications in simplified manner. Most innovative Keylogger Free program traces all type of web pages with complete information of name, accessed time and title of website. Keylogger Free program facilitates you to records login name and password typed in various applications by outside person on your system. Highly interactive Keylogger Free application provides the easiest way to monitor overall activities performed on PC by children, outside user, staff employees, office colleagues, friends, family members, relatives, ...
  • Keylogger - keystroke keyboard logger - X-version is the recording all You type on your computer keyboard software product for PC, spying for each visited internet site, typed search queries, logs all active (started) in the system applications, copies the computer clipboard into LogFile. The spying system monitors, logs, encrypts data and sends it to your E-mail address in the file format You choose during the Keylogger installation. The available for download version allows to check and test the full functional of Keylogger X software during 24 hours from the moment of installation. As the matter of fact, this time is quite enough to enjoy all benefits of this keylogger version. During this 24-hours' period the installed spying module shall collect all data and send it to the E-mail address You've entered while the installation process as 1 LogFile in the chosen by You file format. Information security Keylogger X system consists of Spying for users system activity module sending co ...
  • The Right File Scrambler hides critical and personal data by replacing to random but realistic values. This tool helps you to prevent data disclosing. It operates with three text file formats (tab-delimited, CSV and files with random separators) and saves scrambling results in the same format. The program offers about two dozen of built-in data generators like e-mail, name, state, Zip code, address, etc. Try out demo version for free now!
  • Password Safe Pro is designed to make it easy for users to manage usernames and complex passwords for web-sites, e-commerce sites, and desktop applications. Password Safe Pro removes the security risks of routinely using the same password or storing passwords in a text file, spreadsheet, or unencrypted database.Password Safe Pro employs 160-bit high security level encryption which will help prevent passwords from being compromised.
  • A collaboration between the open source community and Rapid7, Metasploit software helps security and IT professionals identify security issues, verify vulnerability mitigations, and manage expert-driven security assessments, providing true security risk intelligence. Capabilities include smart exploitation, password auditing, web application scanning, and social engineering.
  • Advance keylogger is best PC activity monitoring tool that keep track on all the activities done by any external user on your computer in your absence. Keylogger PC monitoring application records all the online and offline system activities. Software captures voice chat conversation, email id, typed website URL, user name, password, text documents etc. PC spy keylogger utility captures all keyboard pressed characters including alphabets, digits, functional and special characters like Alt, Ctrl, Shift, Del etc. Windows Vista advance keylogger program records all the captured system and keyboard activities in an encrypted log file. Keylogger computer monitoring software automatically sends log files to specified email address or upload to web server through FTP setting. Advance keylogger application records all the activities with exact date and time also captures windows screenshots at regular interval. Software works invisibly as a background process cannot be found in desktop items or in the program files. A ...
  • PC Spy Monitor secrectly records keystrokes, screenshots, websites visited, windows opened, applications run, Skype, Windows Live Messenger, MSN Messenger, ICQ, AIM / AOL, Yahoo! Messenger, passwords, emails and more. In Stealth Mode, it is completely invisible to computer users. You can use hotkey to it. Send logs to a preset email or ftp at set interval. Usages: monitors employees, children, spouse and investigate crimes.
  • Database to store and manage your Accounts, Usernames and Passwords, your URLs and Projects, MS Windows Version.
  • Security Tracker is a powerful and flexible system for the control of the staff working hours usage in a network or on a terminal servers. There are many of the software to solve a similar problem. Part from them - simply spyware programs intended first of all for capturing of user`s keystrokes, passwords and various messages.
  • Invisible PC Keylogger secrectly records all Facebook activities,keystrokes typed, MSN Messenger, Windows Live Messenger, ICQ, AIM, Yahoo! Messenger and Skype chats, websites visited, emails read, documents opened, windows opened, clipboard activaties, passwords typed and applications executed. It sends log reports to your specified email like every 60 minutes. It is completely invisible to the monitored users.
  • Sticky Password FREE is the most comprehensive free password manager! Sticky Password FREE creates and stores strong passwords and gives you one-click form filling for online forms and templates. All your personal data is safe because it's encrypted. Only you will have access to your passwords and stored data. The portable version is included free and is easy to install on your USB device. You'll always have your passwords wherever you need them.
  • SurveilStar Any Parental Control is designed for parents to monitor kids' online activity. With this software, parents can grab screenshots, record sent and received mails, record and block chatting messenger, monitor and block visited websites. So parents shield your children from cyber bullies, predators and adult oriented websites, and ensure you have the control you need over children online activity.
  • Hidden Keylogger Pro is an advanced undetectable low level keystroke logger application that will secretly record all computer activities (visited websites, all the keystrokes, screenshots, both sides of chat conversations etc.). Hidden Keylogger Pro allows you to remotely view the logs via Email and FTP. All of the computer passwords (Outlook, Internet Explorer, FireFox etc.) are succesfully found and included in the logs.
  • Our Spy Software is top-10-Spy Software Pro is a Complete Stealth Monitoring Software that can both monitor your Local PC and Remote PC or any Android (cell Phone or Tablet) device. WinSpy Software will capture anything the user sees or types on the keyboard. Win-spy will also capture WebCam shots and record surrounding sounds. Now Works behind Firewalls and Routers. New build includes JPG and PDF Remote File and Advanced Android Monitoring.
  • A quick and easy way to protect sensitive information on your computer and comply with Privacy Laws and HIPAA. The Privacy Law & HIPAA Compliance Folder Hider software will hide your sensitive files so that they can't be seen or accessed. Files stay hidden even if you turn on "View Hidden Files". Even links in your recent documents menu won't be able to find your hidden files. Use a password to prevent anyone from accessing your files.
  • NoteGuardian securely stores and organizes your sensitive information in an encrypted database. NoteGuardian is easy to use and customizable to suit your needs. NoteGuardian is ideal for managing passwords, logins, financial account numbers, social security numbers, and similar sensitive information. All information in NoteGuardian is stored locally, nothing is transmitted on the internet.
  • The software has been created as general application for surveillance hybrid platforms functioning all together with wireless and wired Internet cameras, TV-cards, capture cards, power-line, and USB cameras. It has web interface with the same form and functionality on the local and apart workstations. Users view MPEG-4 coded picture and have complete control of the software through network that security server can be run with no screen, keyboard, and mouse attached. Program`s modular composition extensively improves reliability because all components act as autonomous applications. If one component stops working, other parts keep on running. For instance if the `capture` unit freezes, `watchdog` restarts it right away that users don`t notice anything because they are watching picture using a `playback` part. The program does `cyclic` recording that the `hard drive full` situation never happens. The recording can be constant or it can be initiated by movement, human face recognition, or by timetable. T ...

Page 25 of 30
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30


Legal disclaimer | Privacy policy

© 2004-2020 IT Shareware