Home | Submit a file  |  New  |  Categories  |  Our awards  |  Link to us  |  RSS Feeds

Utilities :: Security & Encryption
Sort by: date | product title | rating | downloads | popularity
Display: short descriptions | full descriptions
  • SkyCrypt is a FIPS 140-2 validated Cloud Encryption Gateway. It allows users to add 256 bit AES encryption to local drives, Google Drive, Dropbox, Bitcasa, SkyDrive or most any other cloud storage service. SkyCrypt features include : NIST FIPS 140-2 validation, AES 256 bit encryption, optional 2 factor authentication via Google Authenticator for IOS or Android, and encrypted file names
  • Scan2Encrypt uses any scanner or webcam to convert hard copies of your documents and photos into secure and searchable PDF files. It provides filter, merge, OCR, 256-bit AES encryption and support for direct upload to Dropbox or sending by email using Outlook or directly though SMTP server. This is extremely easy to use software and it takes only 4 clicks to scan, merge, convert, encrypt and upload to Dropbox or send by email.
  • Keystroke Logger Pro is an invisible keylogger for Windows systems that runs hidden in the background. Keystroke Logger Pro secretly records keystrokes, passwords, websites visited and also takes screenshots at set intervals just like a surveillance camera. More details: www.keystroke-logger.com
  • With Cryper you can encrypt single files or even complete directories. An easy workflow with a maximum of security, that what Cryper offers. Only a few clicks are necessary to feel save and the best, you can test it for free.
  • Lock down Windows XP/Vista/7/8 and create a virtual embedded environment. Inteset's inexpensive Secure Lockdown version 2.0 is perfect for kiosk setups, digital signage, trade shows, library and school labs, Internet cafes, gaming centers, media centers and other applications. Secure Lockdown removes the Windows Desktop functionality and unwanted keyboard strokes and allows your main application to run exclusively.
  • This easy-to-use privacy software effectively limits access to an unlimited number of folders and files on your computer. If you want to hide your files from prying eyes or want to protect them from being deleted or modified, install Hide Folders utility. It safely locks and hides your files and folders and grants access only if you specify the original password. Download FREE trial now!
  • Secure deletion of sensitive data! Files Terminator Free is an easy to use application that allows users to permanently delete their files and wipe free disk space. The utility protects the users privacy by permanently delete sensitive documents, images, videos and other files and by overwriting the free disk space. The software uses several shredding methods (one pass Pseudorandom, British HMG IS5, two pass Russian GOST P50739-95, three pass US DoD 5220.22M, seven pass German VSITR, Canadian RCPM TSSIT OPS-II, Bruce Schneier and the 35-pass Peter Gutmann) and supports drag and drop for easier use. During file shredding the content of the selected files are overwritten several times with random data and predefined characters and cannot be recovered any more. Finally, Files Terminator Free is a quick and easy to use application with a user-friendly interface that helps users permanently delete sensitive documents and swap free disk space.
  • The program is completely free, easy, fast and powerful. It is the best way to encode and decode any type of file, which also integrates seamlessly into Windows Explorer. Be used to hide all the sensitive data and important that we want to keep away from prying eyes. Here are the features: Disarming ease of use; Coding of any type of files; Integration in Windows Explorer for a more rapid; Creating one password for decryption (in addition to the hidden internal); Secure encryption of login passwords, pin codes, serial numbers, etc..; Inability of systems to be cracked by "Brute Force" (if the password is wrong does not display the classic error message intercepted by the crackers, but it is decoded in the wrong way the file will appear illegible). Please note that - Be careful not to forget the password, otherwise we will not be able to decode the encrypted files once!
  • No matter what you call it - delete, cancel or remove - when you want to be rid of your Skype account. With Delete Skype Account program it takes only a few steps to say goodbye to your account. The program deletes all your personal data from Skype cloud such as: name, gender, age, etc. and your instant messages in your chat partners and all devices, so nobody will be able to restore them. Also the program clear your personal Skype files on PC.
  • Xeno Vault have built in compressor so that you do not have to worry about Disk Space. Xeno Vault Can lock any file of any size on every Devices. Xeno Vault is Small, Light, Fast and does not slow down your PC like other locking software. Xeno Vault uses advance Algorithms so that no one can Seek & Search your Data. Xeno Vault has many Functions & Themes too and they are easy to use. Xeno Vault can hide any file from everyone and encrypt them.
  • Finally, for anyone looking for monitoring and tracking all Skype chats and activities Skype Spy USB Edition software was designed. You don't need to install Skype Spy into the PC you are going to track. Just insert the USB flash stick with the Skype Spy and run the program. In this way the app stays completely undetectable. It is a great option for anyone looking for an effective parental control solution or employee monitoring software.
  • Activity Monitor Pro offers effective security on computers and provides the equivalent of the security camera! Activity Monitor Pro runs hidden in the background to secretly record keystrokes typed, passwords entered, websites visited, applications/files used and takes screenshots of the activities. Recorded data will be sent to you by email or FTP/Email address automatically and secretly. Find out more on www.activity-monitor.com
  • Ax3soft Scout process activity monitor is a professional monitoring tool for Windows, it can monitor a process all-sidedly in real time, including process/thread, file system, Registry and network activity whit its powerful features. To create a detail report for process, Ax3soft Scout makes it easy to find and solve your computer problems, e.g. malware, troubleshooting. Key Features Real-time monitor and analyze Ax3soft Scout can monitor process/thread, file system, Registry and network activity (includes: IP, ICMP, TCP and UDP conversations, HTTP visit, Email transfer and FTP transfer) real-time and analyze these activities to identify security threats with different colors. Detail reports Ax3soft Scout can analyze numerous activities to create a detail report for process, the report?s content is very clear, it includes all the threats found and some key activities events. You can find and solve computer problems quickly and easily with the report, even if you don?t have extensive computer knowled ...
  • This is the best file encryption software .it has sepecial algorithms for encryption and it has an special electronic key to run this program.we offer 100% warranty to you for nobody could not reach your files anymore even fbi,cia and all other acencyes too.
  • NetBull is the best and most undetectable keylogger you can find on the Internet. By using the latest in computer monitoring techniques, NetBull keylogger tracks all activities that occur on the monitored computer (Internet browsing, keyboard usage, user names and passwords, messenger conversations, programs used, Facebook activity, emails etc. etc.). The official website for NetBull keylogger: www.netbull.com
  • You have more advantage of Vroot there are root access and an unlocked bootloader, you have an infinite of customization option from ROMs, launchers, and other huge advantage is take root application from play store
  • The GEARS application provides home users and IT professionals an innovative free tool that quickly detects if a machine is compromised and provides greater visibility into the status of installed applications. Using two methods of advanced threat detection, GEARS identifies threats that may not have been detected by the user's installed anti-malware software or experienced issues remediating.
  • MarshallSoft "Secure Source Backup" (SSB) Windows program is designed to create (256-bit AES) encrypted backups of source code and other critical files. SSB is optimized for uploading to cloud services such as Dropbox and OneDrive. Files/directories can be disguised; user controlled AES encryption/decryption is independent of storage location; includes programmable script assembler for robust backups. Uses authorization file for decryption.
  • Leo Folder Locker is a freeware folder locking software specially designed for those who want to secure there important data in just a simple folder.This folder locker software creates a secure folder user puts its important stuff in it and then that folder is locked down so that no one can access your data.It is a easy to use CLI based software.
  • If your server has remote desktop on a public IP, protect it from brute force attacks. Automatically block IPs that try to login with incorrect credentials X times, for X minutes. Runs as a service and protects your server. Every Windows server should have this freeware program installed.
  • PCMate Free EXE Lock is a safe and efficient EXE file encryptor tool that is specially designed to lock any executable programs on your computer to protect them from non-authorized execution. When protecting a program, PCMate Free EXE Lock modifies the binary executable itself, so that it first asks for a password and runs the program only if a valid password has been entered.
  • Now, you can see for yourself what your employees do on their desktops during office hours and that too without being physically present in front of them. Yes, it is possible with the help of computer monitoring software. It facilitates the administrator to restrict the misuse of organization?s resources by employees, unnecessary chatting, internet surfing, access to social networking sites during working hours. Administrator comes to know about the possible security breaches if any, while invisibly monitoring varied computers at the same time. Also, this advanced utility enables the user to execute commands like Shut down, Restart, Lock, remove wallpaper, start screensaver, etc. on the monitored computers. Also, administrator can schedule online as well as offline recording of the monitored computers. Offline recording of the software is helpful when admin or manager is not available on desk. This recording is saved in AVI format and can be checked later or saved for future references as a proof. For calcula ...
  • Utility to control all programs which run on OS Windows startup: you can disable unwanted software, or find more about software which you have installed. You can disable unwanted system processes to get maximum performance of your computer.
  • Lock My PC Free Edition is a good and free alternative to standard Win+L Windows lock. Use it every time when you leave your computer unattended.

Page 1 of 30
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30


Legal disclaimer | Privacy policy

© 2004-2015 IT Shareware