Home | Submit a file  |  New  |  Categories  |  Our awards  |  Link to us  |  RSS Feeds

Utilities :: Security & Encryption
Sort by: date | product title | rating | downloads | popularity
Display: short descriptions | full descriptions
  • CrococryptMirror is an encryption tool which mirrors complete folders to encrypted folders. The encryption algorithms that are used are AES and Twofish (256 bits, cascading). The keyfile is secured by a password using PKCS #5 (PBKDF2) with a SHA512/Whirlpool based HMAC using 100000 iterations and also AES and Twofish. Mirroring can be done manually (on-demand) or by using the sync service which detects directory changes on the fly.
  • Do you want to know they are doing at your computer in your absence? Now to make this possible, when you come home you can view pictures of the screen with everything it displayed via screenshots that were taken at an interval you set (i.e. every minute, 5 minutes, hour, etc.). Use the start function to spy with Windows, so you do not miss a single moment.
  • Before selling, disposing or donating used computers, securely erase hard drives with BCWipe Total WipeOut. Trusted as the de-facto standard for the U.S. DoD, BCWipe Total WipeOut erases boot records, filesystem structures, operating system files and service areas. BCWipe Total WipeOut comes built with the U.S. Department of Defense (DoD 5220.22-M) and U.S. Department of Energy (DoE M 205.1-2) standards, as well as other popular wiping standards.
  • PDF Postman offers an easy way to send private emails with MS Outlook that is friendly for the recipient. Messages and files are placed in a PDF file then encrypted with strong AES-256 encryption. Since most recipients already have a PDF viewer, they need only click on the encrypted pdf file and enter a password. Works across devices and platforms. No expensive or complex S/MIME certificates to install. Download a free trial of PDF Postman.
  • Hidden Keylogger Pro is an advanced undetectable low level keystroke logger application that will secretly record all computer activities (visited websites, all the keystrokes, screenshots, chat convos etc.). Hidden Keylogger Pro allows you to remotely view the logs via Email and FTP. All of the computer passwords (Outlook, Internet Explorer, Firefox etc.) are successfully found and included in the logs. See more: www.hiddenkeylogger.com
  • PDF encryption software protect your PDF document from harmful user those defect your valuable document. PDF file encrypted application support most of all required option those able to protect your PDF document. Tool permitted you to set password on PDF file, use PDF encryption technique like 128 bit and 40 bits. You can restrict PDF page by locking PDF printing, content copying, content editing, form-filling, annotation, page extraction and document assembling etc. program authorize you to select page resolution values like high resolution and low resolution. Features: * Software Protect your PDF document from illegal user. * Set password on PDF file. * User encryption technique like 128 bit and 40 bit. * Restrict page permissions values like print, copy, edit, extract, annotation etc. * Choose page resolution setting like low and high. * Create efficient resultant file name. * Perform operation into batch style. * Work with 32 and 64 bit operating system. * Work with all Window oper ...
  • PowerCryptor Password Generator allows you to create highly secure passwords that are difficult to crack or guess. Just select the criteria for the passwords you need, and click "Generate Secure Passwords". Application is designed to generate passwords of any character content. Using PowerCryptor Password Generator you do not have to think out new passwords. Password Generator will do it instead of you.
  • Automatically blocks IP addresses with hacking attempts on your windows server services (rdp, FTP, SQL-Server) using the Windows firewall. The software runs as a Windows background service and monitors RDP, FTP und SQL-Server events for failed logins. If a configurable number of failed login events is detected from the same IP address BotFence dynamically lists that IP address im the Windows firewall as blocked.
  • MessageLock adds email encryption and zip file compression to Microsoft Outlook. It combines strong U.S. Gov't approved AES-256 bit encryption with the near-universal compatibility of the Zip file format. MessageLock delivers email encryption and zip compression for your message and/or file attachments. With version 2.2, MessageLock now integrates with the Lockbin.com web service, allowing you to send secure messages to anyone. Download a trial
  • Smart ID Scan deep scans the files on your PC for any traces of personal ID information. You can help protect your personal information by shredding any documents on PC which contain potential ID leaks including social security numbers, credit card numbers, bank account numbers, passwords or user IDs. Don't risk becoming a victim of ID theft. Run a simple scan with Smart ID Scan today and make sure there is no valuable personal information
  • With Cryper you can encrypt single files or even complete directories. An easy workflow with a maximum of security, that what Cryper offers. Only a few clicks are necessary to feel save and the best, you can test it for free.
  • Encrypt and decrypt files, documents, and archives through major cryptographic standards, including, TripleDES, Blowfish, TwoFish, Cast128, DES, Ice, Ice2, RC2, RC4, RijnDael, Serpent, Tea, Thin Ice.
  • Easy Hide Files allows hiding files and folders from viewing, accessing and searching completely, so that only you know that those files or folders exist. No matter how particular computer (over local network, from internet or directly) is accessed, those folders stay invisible and safe.
  • Quietzone is a simple to use, highly secure, privacy tool that gives you complete control over your Internet and PC privacy. With Quietzone you choose if and when: Your activity is recorded, tracked or stored by anyone; Any trace of session data or events is left on your PC or device; Your identity and personal data is tracked or recorded. Simply switch the Quietzone button ON or OFF. It's as simple as that.
  • Keystroke Logger Pro is an invisible keylogger for Windows systems that runs hidden in the background. Keystroke Logger Pro secretly records keystrokes, passwords, websites visited and also takes screenshots at set intervals just like a surveillance camera. More details: www.keystroke-logger.com
  • This is the best file encryption software .it has sepecial algorithms for encryption and it has an special electronic key to run this program.we offer 100% warranty to you for nobody could not reach your files anymore even fbi,cia and all other acencyes too.
  • Permanently delete data and wipe free space with BCWipe. BCWipe is trusted throughout the U.S. DoD to securely erase files and folder beyond recovery - including free space, file slack space, MFT records, Internet and local history, directory entries, NTFS log file and directory slack space. BCWipe uniquely features Transparent Wiping - deleted or temporary files are wiped automatically on the fly. Available for Windows, Mac and UNIX.
  • USB Log & Lock allows you to control operations with USB devices on computers connected to the local area network of an organization or enterprise. With USB Log & Lock, you can forbid USB devices with the help of flexibly customizable rules both for separate devices and users and for groups of users.
  • It`s not a common knowledge that even after a full deletion of files, either skipping the recycle bin or directly from it, your files can be recovered with the help of specially designed programs. Our program allows you to delete your files without a possibility to recover them, in case your deleted files are recovered, their data will be lost forever, what makes reading them impossible. The program processes files at a high speed and is easy to
  • Mikey keeps track of your login usernames, user ids, passwords, web page logins, email accounts; you name it. Now you only have to remember one password for Mikey to keep your information private. Mikey will secure your information with a single access password and a unique file encryption method. Open up Mikey and you get one click access to enter passwords, activation codes or any other similar data. Easily search, print, or delete entries all from one screen. Easily print individual entries or even export the entire database in two popular formats. Mikey has a unique approach to auto fill forms. You control the information that Mikey gives out. When you need a username or password simply search for the item then click on the clipboard icon to transfer that information to the clipboard. Then you can paste it right to the place where you need it. This unique feature makes Mikey perfect for use on computers with more than one person. Since Mikey is password protected you no longer have to worry abo ...
  • Xeno Vault have built in compressor so that you do not have to worry about Disk Space. Xeno Vault Can lock any file of any size on every Devices. Xeno Vault is Small, Light, Fast and does not slow down your PC like other locking software. Xeno Vault uses advance Algorithms so that no one can Seek & Search your Data. Xeno Vault has many Functions & Themes too and they are easy to use. Xeno Vault can hide any file from everyone and encrypt them.
  • Spyrix Employee Monitoring - cloud-based platform for tracking your employee computer activities. Spyrix allows remote (via web account) control of employees activity in the Internet including chats, messengers , Skype, social networks Facebook, LinkedIn, Twitter, search engines Google, Yahoo, Bing, apps activity, include games. Spyrix will also make screenshots of active windows, snapshots and video from webcamera, records from microphone.
  • Activity Monitor Pro offers effective security on computers and provides the equivalent of the security camera! Activity Monitor Pro runs hidden in the background to secretly record keystrokes typed, passwords entered, websites visited, applications/files used and takes screenshots of the activities. Recorded data will be sent to you by email or FTP/Email address automatically and secretly. Find out more on www.activity-monitor.com
  • Spyrix Keylogger Gratuit est un puissant logiciel invisible pour une surveillance à DISTANCE complète et détaillée de tous les activités des utilisateurs: frappes de clavier, captures d'écran, mots de passe, web, chat, e-mails, messagerie instantanée. Cet outil est utile pour les parents qui veulent surveiller l'utilisation de l'ordinateur de leurs enfants.

Page 1 of 30
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30

Legal disclaimer | Privacy policy

© 2004-2015 IT Shareware