Home | Submit a file  |  New  |  Categories  |  Our awards  |  Link to us  |  RSS Feeds

Utilities :: Security & Encryption
Sort by: date | product title | rating | downloads | popularity
Display: short descriptions | full descriptions
  • Invisible Spy Software is the most powerful and undetectable keylogger. Invisible Spy Software runs silently at the lowest level of Windows and captures every keystroke typed including user names and Windows log-on passwords. Invisible Spy Software stealthily records all computer activities including keystrokes, internet history, active window text, text typed in all popular instant messengers including AOL, YAHOO, ICQ, MSN AND AIM etc.
  • Advance Key logger software traces out and records complete system and internet related activities performed by outside users with your laptop in your absence. User friendly Key logger utility monitors overall PC usage and takes screenshots at regular time periods. Key logger spy tool monitors clipboard activities in full silent way to find out cut, copy, and paste activity performed by outsider in the absence. Spy Software Free software monitors complete PC activities and records into log files that can be used as backup file for later use. Powerful internet monitoring program safely traces out and records full details of online conversation of text and voice, typed URL, visited websites into log files in your absence. Advance key logger tool has the option to record windows startup time and facilitates only authorized user to access monitoring activities using hot key combinations. www.dd-spy.com is official and professional website containing complete details about advance system monitoring utility. User f ...
  • Smart Password Manager is a secure password manager and intelligent form filler software, help you store and manage your passwords or other important information securely and conveniently, remember the login or form information of websites and auto-fill them in by one click. And it has built in a strong password generator that can generate random passwords for you. It supports multi-user application, can backup and restore your data easily.
  • PassBoom presents a completely free password generator for your computer. It creates easily memorable yet extremely secure and complex passwords which you can use for the online services and other password-protected features that you access. The software is extremely easy to use and, best of all; it is available completely free for both home and commercial use.
  • Power Spy software secrectly logs all keystrokes, web sites, emails, chats & IMs: MSN Messenger, Windows Live Messenger, ICQ, AOL / AIM, Yahoo! Messenger, Windows Messenger and Skype. Takes screen snapshots at every X seconds like a surveillance camera. Displays exact activities, like MySpace, Facebook, PC games, online searches & shopping, file transfers and webmails. You can receive reports remotely via emails or ftp.
  • Steel USB Sentry offers an simple yet effective control of portable media usage in the corporate network. It helps in preventing data theft and cyber crime possibilities through misuse of corporate data. Steel USB Sentry effectively keeps a tight control of the portable media usage by preventing the users from copying confidential data from their workstations. Steel USB Sentry prevents users from using portable media in the workstations
  • Cheater-Catcher is a professional product that makes it easy to catch the cheaters. With Cheater-Catcher you can find out who your spouse is instant messaging, what he or she is writing in e-mails, and which websites he or she is visiting. Cheater-Catcher is the easiest and most cost effective way to put an end to the nightmare of suspicion and doubt caused by the infidelity of a cheating spouse or of a sexually active teen.
  • SpyPal Desktop Screen Spy secrectly records keystrokes, screenshots, websites visited, windows opened, applications, MSN, ICQ, AIM, Yahoo! IM, Skype, clipboard, passwords, emails, documents and more. In Stealth Mode, it is completely invisible to computer users. Use hotkey and password to access the program. Auto send logs to a preset email or ftp at set interval. Possible usages: monitors employees, children, spouse and investigate cri
  • Ahead PDF Encrypt is a powerful tool that allows you to encrypt existing PDF files, set permissions, add user and owner password, set descriptions. With Ahead PDF Encrypt, you can easily set the owner password and restrictions on printing, editing and copying. You can also encrypt a PDF document by setting the user password, no one can open the PDF document except he knows the correct password.
  • Pangolin is an automatic SQL injection penetration testing (Pen-testing) tool for Website manager or IT Security analyst. Database support: Access,DB2,Informix, SQL Server,MySQL, Oracle,PostgreSQL,Sqlite3,Sybase. Features: Auto-analyzing keyword, HTTPS support, Pre-Login, Bypass firewall setting, Injection Digger, Data dumper, etc.
  • idoo USB Encryption is powerful USB encryption software, it encrypt usb disk partition , encrypt file on usb flash drive. especially designed to create password protected USB memory sticks. It creates protected areas on the disk that is needed to enter password to see contents.
  • FoxCrypt is a security software product. It uses AES 256 encryption algorithm and RIPEMD 160 hash function. FoxCrypt supports multiple user accounts. Without password, not even FBI could recover the original. Move files into vault and keep them private even if you share a computer. Users will not be able to open, read, modify, delete, move or copy the protected files/folders. The hidden files/folders will be totally invisible to users or to any other programs including Windows Explorer. FoxCrypt is designed to protect files and folder on your local disk. FoxCrypt will not slow down the system speeds and it will never have the chance to destroy your data. Read and write files as usual. Just drag your files into a secure virtual disk in the Explorer, they will be encrypted on-the-fly.
  • AdSysNet Self-Service Password Reset is a web based active directory self service password reset tool. User web console lets the users to reset password and submitting the requests to the help desk admins. HelpDesk console lets help desk admins to process the password reset and update profile requests from the users. Admin console helps to configure the security settings and view the audit report. Logon screen password reset feature is supported.
  • SoftFuse Password Generator generates difficult-to-crack passwords easily and quickly. You can create extremely strong passwords up to 128-character length for all your accounts! While generating a password, you can use letters, digits, symbols, as well as their combinations. The program is a simple-to-use! Protect you important documents more securely!
  • Bytescout USB Locker is a freeware utility to disable/enable writing to USB flash drives to prevent unauthorized copying of your files from your computer. Supports password protection for USB flash locker settings access
  • Looking to remove or shred files permanently from your computer system, then without any second opinion file shredder is the most appropriate application that you can rely on. Perhaps, the key aspect that makes it quite appropriate for secure file deletion is its ability of rewriting the file with random series of binary data multiple times. This way, the original content of the file that was present initially gets overwritten and finally reduces the possibility of restoring a shredded file completely. Besides this, the tool also facilitates its user to make a proper selection between different shredding algorithms depending upon the sensitivity of data. What makes it more special is its unique aptitude to shred the files in any format. Besides this, the software also supports all versions of Windows operating systems. Perhaps, this software can make you free from the misuse of any vital information. Moreover, this software is also available in a free trial version and so a user can easily analyze it performa ...
  • PTP (Person To Person) now lets you email uncrackable files in AutoCrypt(TM) mode. This means it will self-decrypt at the other end, as if by magic ! The recipient does not need any software or digital certificates to decrypt the file. This feature is unique to PTP and ensures that you can send safe files without worrying about whether the recipient has the right decrypion software to read them. No other system makes email security so easy.
  • Bsecsoft Data Locker is professional file encryption and folder lock software which offers you best way of encrypting and password protecting files and folders. It can safely protect any file and folder on your PC from being seen, read or modified. The Data Locker is easy to use, just like a safety box, and support to drag and drop the folders or files you want to hide or protect.
  • Screenlogger is smart and clever program recording PC-user activities, the main software function is screen-shots (snapshots) logging when You set time-periods to create sreenshots and delete them, the kind of Keylogger logging most actual things: logs clipboard, search engine queries, social networks, messengers: Skype, ICQ, AIM, etc., files, applications activities, visited web-sites, remembering logins and passwords, useful information security soft for parental or employees control monitoring purposes Screenlogger main characteristics: Logging each keystroke, Screenshots' logging by set periods, Screenlogger friendly software interface, Clipboard data logging, Logging of search engines' queries, sites, social networks, messengers, files, Screenlogger LogFile search system, Logs calendar, Logs archive searching, Screenshots logging by set periods, Snapshots auto-deletion setting, Screen-shots quick preview and auto-enlarge by 1 click in LogFile, Works in OS Windows XP, NT, 2000, 2003, ...
  • SpyPal Keylogger Spy software can secretly record all keystrokes typed on your computer. This may include chats, emails, user names, passwords, online searches, myspace, facebook activities and more.It runs in a complete invisible mode. You can check logging reports by simply receiving emails or opening a web page.Perfect for catching cheaters, monitoring employees, children or spouse.
  • SecureTower is your ultimate solution for data leak protection. An advanced and extremely effective system, it will help you to monitor how the Internet resources in your company are being used. You can stay in complete control by being constantly aware of any unauthorized attempts to transfer confidential information over the Internet. It keeps track of all user activities in the network and immediately notifies you if it detects leaking data
  • Invisible keylogger application software designed to track typed keywords of your laptop keyboard. Hidden keylogger utility is safe, easy to use and system surveillance tool that captures Windows screenshots at regular time interval. Invisible keylogger software provides option to generate log file in TXT or HTML formats for future use. Hidden keylogger application program is totally hidden from your computer?s task manager, system installation files, add/remove program and computer desktop. Invisible keylogger utility is professional system monitoring tool that provides user friendly graphical interface so that any non technical user can easily operate the software. Hidden keylogger application program provides real time monitoring of your computer system and records entire PC activities in hidden files formats. Invisible keylogger tool provides option to send log files at specified email address. Hidden keylogger application program is password protected application that helps to restrict unauthorized user ...
  • Keeping your web servers secure from hackers is absolutely essential for keeping sensitive data belonging to your company or your customers safe. The Google Hack Database is a free tool from SecPoint which will scan your web domains for security vulnerabilities and match them to Google. You will then be able to find out if any sensitive information was leaked to Google.
  • Enhanced version of invisible keystroke log monitoring tool provide facility of recording various user typed entries including email information, printing activities, chat conversations etc. With its email feature user can watch all external user activities at remote PC by capturing screenshots of all running applications including visited websites, search engine results, email information etc. Computer monitoring software sends captured screenshots at specified email address or using FTP settings at certain time intervals. Windows keystroke recording tool is very useful for monitoring work and activities of employees in office and of children by parents at home. Keystroke logging tool is extremely useful utility in case when user fails to save his important work-documents due to power failure or illogical system shut down as software is capable of restoring all previous tasks from recorded log files. Computer monitoring software has following main features: * PC surveillance software helps you to monitor a ...

Page 22 of 30
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30


Legal disclaimer | Privacy policy

© 2004-2020 IT Shareware