Home | Submit a file  |  New  |  Categories  |  Our awards  |  Link to us  |  RSS Feeds

Utilities :: Security & Encryption
Sort by: date | product title | rating | downloads | popularity
Display: short descriptions | full descriptions
  • Mikey keeps track of your login usernames, user ids, passwords, web page logins, email accounts; you name it. Now you only have to remember one password for Mikey to keep your information private. Mikey will secure your information with a single access password and a unique file encryption method. Open up Mikey and you get one click access to enter passwords, activation codes or any other similar data. Easily search, print, or delete entries all from one screen. Easily print individual entries or even export the entire database in two popular formats. Mikey has a unique approach to auto fill forms. You control the information that Mikey gives out. When you need a username or password simply search for the item then click on the clipboard icon to transfer that information to the clipboard. Then you can paste it right to the place where you need it. This unique feature makes Mikey perfect for use on computers with more than one person. Since Mikey is password protected you no longer have to worry abo ...
  • Keylogger Spy Software secretly logs Facebook, keystrokes, chats, IMs, emails, websites visited, microphone, video talk, logins, passwords, applications, searches, documents and more. Logs Skype, Yahoo Messenger, MSN, ICQ, AIM, etc. Takes screenshots every x seconds like a spy cam. Sends logs to your email. You can check logs on a remote PC, tablet, smart phone, or directly on the monitored PC. Perfect for monitoring employees, kids and s
  • Parental Spy software secrectly logs all keystrokes, web sites, emails, chats & IMs: MSN Messenger, Windows Live Messenger, ICQ, AOL / AIM, Yahoo! Messenger, Windows Messenger and Skype. Takes screen snapshots at every X seconds like a surveillance camera. Displays exact activities, like MySpace, Facebook, PC games, online searches & shopping, file transfers and webmails. You can receive reports remotely via emails or ftp.
  • VarySafe is a document security program which makes data encapsulated stand alone executable viewer file. This viewer decrypts and view internal encrypted data only in the authenticated computer by using hardware fingerprint identification. It is also possible to set the expiration date and user's permission type (view or view + print). Any printing data can be used as a data input by using VarySafe printer.
  • A program for recovering lost or forgotten passwords to backup files (*.qic) created with Microsoft Backup. All passwords are recovered instantly.
  • SafeKuvert provides the user with the ability to encrypt, digitally sign, compress, and/or securely delete files from the hard disk. It uses the Public Key Infrastructure (PKI) built into Windows, standard X-509 certificates from any source including Active Directory, and support for AES, 3DES, DES, RC2, RC4 symmetrical encryption algorithms. The resulting encoded files are standard PKCS#7 messages saved in files with a ".pkcs7" extension.
  • Keylogger software is the best computer-monitoring tool that easily records external user?s activities on the computer system in your absence. Invisible keylogger software works as background process and remains hidden from desktop items, Add/Remove program list and even hides its installation folder path. Using key logger utility, you will be able to establish full control over your computer system. Remote spy keylogger software is the best PC monitoring tool that automatically records all typed emails conversations, chat records, website visited, password and documents lists. Spy Software is password protected software; external users can not change or modify its configuration settings. Spy software allows remote computer monitoring and keystroke recording in real time. If your favorite text editor crashed suddenly you will be able to restore information you typed from the keylogger without any problems with the help of remote keylogger software. Software feature: * Undetectable keylogger program traces l ...
  • FREE Parental Internet filtering software program that helps parents to monitor and control the child's use of the Internet. Supports Microsoft Windows 2000/XP and Vista (including Internet Explorer protected mode).
  • With Children Monitoring Spy you can log chat conversations, emails, the sites someone visited, MySpace, Facebook etc. By activating Children Monitoring Spy, you can monitor everything. Children Monitoring Spy allows you to register all keystrokes typed including language-specific characters, talk and messages conversations, passwords, e-mails, clipboard information, screenshots capturing, desktop and Internet activity.
  • PTP (Person To Person) now lets you email uncrackable files in AutoCrypt(TM) mode. This means it will self-decrypt at the other end, as if by magic ! The recipient does not need any software or digital certificates to decrypt the file. This feature is unique to PTP and ensures that you can send safe files without worrying about whether the recipient has the right decrypion software to read them. No other system makes email security so easy.
  • SpyPal Windows Spy secrectly records Facebook, keystrokes, websites visited, applications, Windows Live Messenger, ICQ, Yahoo Messenger, Skype, clipboard, passwords, emails, documents and more. In Stealth Mode, it is completely invisible to monitored users. Automatically sends logs to a preset email or ftp at set interval. Usages: monitors employees, children, spouse and investigate crimes.
  • Family Keylogger is the most powerful stealth keylogger software. Family Keylogger will let you monitor what people you share your computer with type when you are away. Working in the background, Family Keylogger records every keystroke to a log file. The log file can be sent secretly with email or FTP to a specified receiver. Family Keylogger can also detection specified keywords and take a screenshot whenever one is typed, displaying findings..
  • Invisible messenger spy software that records all Yahoo! Messenger incoming and outgoing chat text. Send reports to your custom email address or ftp. You can check all recorded messages by simply receiving emails or opening a web page. Use hotkey to unhide it from Stealth Mode and protect program access by password. Perfect for catching cheaters, monitoring employees, children or spouse, and even investigating crimes.
  • Secure personal database for sensitive data (bank accounts, credit cards, email accounts, serial numbers, web passwords or any other sensitive information). PassDirector uses strong, high secure Blowfish encryption (up to 448 bit), the password is not stored in the computer, it cannot be retrieved by any way.
  • Pro-Key-Lock allows the user to lock specific keyboard and mouse buttons. You can use pro-key-lock to lock specific keys like the function keys, the caps-lock key, the windows (start) key or key combinations like Alt-Tab, etc. You can also lock specific mouse functions like the right click or the double click. The user can also define a rectangle on the screen and instruct Pro-Key-Lock to enable mouse clicks only inside/outside this rectangle.
  • Children Monitoring Spy secrectly logs your kids' Facebook use, chats, website visits and web cam images. It also logs keystrokes typed on keyboard, including their user names and passwords. It records their Skype, Windows Live Messenger, Yahoo Messenger and other instant messengers. You can check logs on the monitored PC, or receive logs via email from your office PC or cell phone. It is a great tool for caring parents to proctect childr
  • Power Spy secretly logs Facebook, Skype, keystrokes, chats & IMs, emails, web visits, video talk, microphone, logins, passwords, applications, searches and more. It also takes screenshots like a surveillance camera. Lets you know exactly what they do on a computer screen while you are away. Automatically sends log reports to your email or ftp. Starts monitoring with system startup. Runs silently and invisibly.
  • 360 Spy Software secretly logs Facebook, keystrokes, chats, IMs, emails, websites visited, microphone, video talk, logins, passwords, applications, searches, documents and more. Logs Skype, Yahoo Messenger, MSN, ICQ, AIM, etc. Takes screenshots every x seconds like a spy cam. Sends logs to your email. You can check logs on a remote PC, tablet, smart phone, or directly on the monitored PC. Perfect for monitoring employees, kids and spouse.
  • Security Tracker parental control is a powerful and flexible system for the control of the staff working hours usage in a network or on a terminal servers. There are many of the software to solve a similar problem. Part from them - simply spyware programs intended first of all for capturing of user`s keystrokes, passwords and various messages.
  • Family keylogger is complete windows monitoring software allows parents to track all activities carried out on computer system by kids, spouse and children in their absence. Family keylogger is free parental control software records each voice chat conversations, sending and receiving mails, username, passwords, installed websites, visited sites and every computer keystroke. Family keylogger is advanced surveillance software having ability to capture screenshots on every mouse click and stop taking screenshots during PC idle time. Family keylogger manage sound recordings made through desktop microphone operated in non appearance of parents. Family keylogger is spy software used to create HTML reports secretly and send them to customer mail account. Family keylogger provides a graphical user interface to trace and observe all typed keystrokes and mouse recordings. Family keylogger is hidden software not shown in any folder on computer system and kids are not allowed to edit log files. Family keylogger auto ...
  • Tripode is a secure, simple, easy to use tool that allows the user to order and clasify images saving them in compressed and/or encrypted files, besides, it can visualize and edit the saved images. In short, with Tripode you can enjoy your images and pictures in private and with complete security, without leaving them exposed to other users.
  • Security Tracker internet monitoring software is a powerful and flexible system for the control of the staff working hours usage in a network or on a terminal servers. There are many of the software to solve a similar problem. Part from them - simply spyware programs intended first of all for capturing of user`s keystrokes, passwords and various messages.
  • Secure portable pdf documents with user level and owner level security protection. Encrypt pdf documents using 40 bits and 128 bits encryption level security. Pdf encryption software not only set user level password but also facilitates owner guard security which restrict pdf printing, editing, signing, commenting, content & graphics copying, page extraction etc. Tool helps to customize the security setting by selecting required parameter to lock pdf. User can select whether he/she wants to allow their recipients to print, edit, copy pdf content or not. All options can be set by simple tick boxes selection. The main feature of this awesome tool is that it can process batch pdf files for encrypting documents. Locking pdf files with password ensures that only intended recipients can open the documents. Features: # Pdf encryption tool supports bulk pdf files. # User can add both user and owner password security. # Tool supports two levels of password security 40 bits and 128 bits. # Tool does not r ...
  • Pass Guard is a simple piece of software that enables you to securely store all your passwords and private details in one location for easy access. Save time and frustration as you take advantage of the ability to organize all your crucial information for quick and easy reference.
  • Remove NSF local database security with much ease and efficacy using imminent Kernel for NSF Local Security Removal software. It removes local security while maintaining the NSF file integrity; there is no hampering with NSF file content. Being an unprivileged NSF file user, when you try to access NSF file you get errors like, ?You are not authorized to access that database? or ?You are not authorized to perform that operation?. Lotus Notes local security removal helps you in getting access to the file by removing local security applied to it. After getting the access rights, one can open, edit the NSF file. Moreover, after accessing the NSF file, user can re-apply the removed security back on NSF file. Software is embedded with interactive GUI, which demands no technical skills to remove NSF local database security. Software is compatible with all versions of Lotus Notes .NSF files. FREE demo version is available that removes local security from NSF files with file size of up to 5 MB. For removin ...

Page 24 of 30
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30


Legal disclaimer | Privacy policy

© 2004-2020 IT Shareware