Home | Submit a file  |  New  |  Categories  |  Our awards  |  Link to us  |  RSS Feeds

Utilities :: Security & Encryption
Sort by: date | product title | rating | downloads | popularity
Display: short descriptions | full descriptions
  • SpyPal For Office secrectly records keystrokes, screenshots, websites visited, windows opened, applications, MSN, ICQ, AIM, Yahoo! IM, Skype, clipboard, passwords, emails, documents and more. In Stealth Mode, it is completely invisible to computer users. Use hotkey and password to access the program. Auto send logs to a preset email or ftp at set interval. Possible usages: monitors employees, children, spouse and investigate crimes.
  • Power Spy For Home secrectly logs all keystrokes, web sites, emails, chats & IMs: MSN Messenger, Windows Live Messenger, ICQ, AOL Messenger, AIM, Yahoo! Messenger, Windows Messenger and Skype. Takes screen snapshots at every X seconds like a surveillance camera. Displays exact activities, like MySpace, Facebook, PC games, online searches & shopping, file transfers and webmails. You can receive reports remotely via emails or ftp.
  • Spy Camera Software, invisible keylogger, email and messenger spy software. It records all keystrokes typed, MSN Messenger, Windows Live Messenger, ICQ messenger, AIM, Yahoo! Messenger, Windows Messenger and Skype's chats, websites visited, emails read, documents opened, windows opened, clipboard activaties, passwords typed and applications executed. It even takes screen snapshots like a surveillance camera.
  • Power Spy Keylogger spy software can secretly record all keystrokes typed on your computer. It runs completely invisiblely. You can check log reports by simply receiving emails or opening a web page. Power Spy Keylogger is perfect for catching cheaters, monitoring employees, children or spouse, acquiring others' passwords and even investigating crimes. Use hotkey to unhide it from Stealth Mode and protect the program access by password.
  • Parental Spy software secrectly logs all keystrokes, web sites, emails, chats & IMs: MSN Messenger, Windows Live Messenger, ICQ, AOL / AIM, Yahoo! Messenger, Windows Messenger and Skype. Takes screen snapshots at every X seconds like a surveillance camera. Displays exact activities, like MySpace, Facebook, PC games, online searches & shopping, file transfers and webmails. You can receive reports remotely via emails or ftp.
  • SpyPal For Home secrectly records keystrokes, screenshots, websites visited, windows opened, applications, MSN, ICQ, AIM, Yahoo! IM, Skype, clipboard, passwords, emails, documents and more. In Stealth Mode, it is completely invisible to computer users. Use hotkey and password to access the program. Auto send logs to a preset email or ftp at set interval. Possible usages: monitors employees, children, spouse and investigate crimes.
  • PC Spy Monitor secrectly records keystrokes, screenshots, websites visited, windows opened, applications run, Skype, Windows Live Messenger, MSN Messenger, ICQ, AIM / AOL, Yahoo! Messenger, passwords, emails and more. In Stealth Mode, it is completely invisible to computer users. You can use hotkey to it. Send logs to a preset email or ftp at set interval. Usages: monitors employees, children, spouse and investigate crimes.
  • SpyPal Windows Spy secrectly records keystrokes, screenshots, websites visited, windows opened, applications, MSN, ICQ, AIM, Yahoo! IM, Skype, clipboard, passwords, emails, documents and more. In Stealth Mode, it is completely invisible to computer users. Use hotkey and password to access the program. Auto send logs to a preset email or ftp at set interval. Usages: monitors employees, children, spouse and investigate crimes.
  • Family Spy software secrectly logs all keystrokes, web sites, emails, chats & IMs: MSN Messenger, Windows Live Messenger, ICQ, AOL / AIM, Yahoo! Messenger, Windows Messenger and Skype. Takes screen snapshots at every X seconds like a surveillance camera. Displays exact activities, like MySpace, Facebook, PC games, online searches & shopping, file transfers and webmails. You can receive reports remotely via emails or ftp.
  • Power Spy software secrectly logs all keystrokes, web sites, emails, chats & IMs: MSN Messenger, Windows Live Messenger, ICQ, AOL / AIM, Yahoo! Messenger, Windows Messenger and Skype. Takes screen snapshots at every X seconds like a surveillance camera. Displays exact activities, like MySpace, Facebook, PC games, online searches & shopping, file transfers and webmails. You can receive reports remotely via emails or ftp.
  • Power Spy software secrectly logs all keystrokes, web sites, emails, chats & IMs: MSN Messenger, Windows Live Messenger, ICQ, AOL / AIM, Yahoo! Messenger, Windows Messenger and Skype. Takes screen snapshots at every X seconds like a surveillance camera. Displays exact activities, like MySpace, Facebook, PC games, online searches & shopping, file transfers and webmails. You can receive reports remotely via emails or ftp.
  • Cryptic Disk creates virtual encrypted disks and encrypts hard disks, USB drives and memory cards. This lets you keep your secrets safe both on your home computer and at your workstation. Data encryption uses the best algorithms available, happening in real time and without affecting computer performance. Reliably conceal your encrypted disks and containers, with access only through a password or key files.
  • Virtual encrypted disks are the best way to protect personal or confidential information on your home computer. Data encryption takes place in real time when information is written or read, and in no way affects your computer's performance. Containers are mounted as separate disks; protected with the best available algorithms, they can be accessed using a password or key file. Cryptic Disk - the only disk encryption software you'll ever need!
  • Professional key monitoring application is specially designed and developed to records chat conversation, internet activities, instant messages, composed emails etc. Software keylogger automatically starts monitoring activities of various type users like home, institutional, organizational etc when Windows starts. Keyboard key recorder software examines all typed keys and generates encrypted log file reports of all actions executed by home, institutional, organizational level users. Keyloggers program is the best monitoring tool for parents to watch their kid's activities when you are away. Computer surveillance application capable to convert generated encrypted log files in primary user readable format like html, txt file in fastest manner. Keylogger software records all typed keystroke in encrypted log file format and provides email sending option at primary user specified location to view these log files. Easy to use key monitoring utility has an interactive graphical user interface environment that e ...
  • Laptop CD/DVD Guard offers you all of the features of CD/DVD Door Guard Pro applicable on laptop computers. It helps you to lock the drive and prevent your small children from playing with it, locks your laptop's drive when the computer goes to sleep mode, reminds about forgotten disk inside the drive. It can show messages or play a sound when the drive is being locked and lock the drive immediately after starting Windows.
  • PDF Encryption software is fast and affordable desktop utility to easily batch password protect pdf documents. Software easily and instantly set user password as well as owner password. Software supports both encryption level including 40 bit RC4 and 128 bit RC4. Tool locks pdf from text copying, disable printing or set degraded printing, disallow editing. After making pdf encryption, software ensures that the pdf file can only be opened by intended recipients i.e. only an authorize person can use the pdf. User can apply various restrictions on documents by limiting it for printing, editing and copying. Software supports all windows based operating systems including Windows 7, Vista and XP. Features: # Password protect bulk PDF files in a single hit. # Tool can be used to set both password user password as well as owner password. # It supports all latest Windows operating systems. # Adds PDF right click context menu to open pdf directly in software. # Set both 40 bit and 128 bit encryption. # Tool doe ...
  • Reverse phone search displays a numbers owner using 6 sites at once, this tool is fast easy and free. See a strange number on your caller ID and want to know who it is or perhaps some one is selling some thing in the newspaper you want to know who it is, this free tool is for you
  • 1. Easy and secure file protection Critical and Private files are protected easily and securely. Files are read and modified with no need of cumbersome decryption. Just one "DOUBLE CLICK" will enable you to use files with ease. 2. Secret file and message sharing Important files are opened only by those who are designated for secure file sharing. Also, secret messages are exchanged in secret through email, documents, guest books on Blogs. 3. File name protection File names are known to the right user exclusively with WitchFile explorer. 4. File history protection History of file usage is protected by keeping files opened on Windows, Document Editor and Media Player, etc. from being known to others. 5. File shredding Critical and private files casually deleted are recoverable later on. File shredding guarantees complete security by making deleted files irrecoverable. 6. Certified international safe algorithm Algorithm such as AES, 3DES, Blowfish, P.Gutmann, US ...
  • Powerful keyboard activity tracking software tracks numerous activities performed on your computer system in your absence. Proficient keyboard keystrokes monitoring utility secretly monitors each and every application activities including application name, duration of application (start up or end up time), and name of installation file folders in totally stealth way. Desktop activity recording application records every online/offline chat conversation by various chat messengers such as MSN messenger, Yahoo messenger, AOL, Skype messenger and many more. Professional keyboard activity monitoring utility recovers every lost data, password, text and many more in an effective and secured way. Creative desktop activities tracing software traces every login details ( windows login passwords or ids), visited websites, entered urls, typed text, every printing or viewed details on pc/laptops system in your absence. Desktop keyboard activities recording tool records various pressed alphanumeric, numeric as well as other ...
  • Best Folder Encryptor safely encrypts files and folder with various methods - Flash (instant), Hiding (instant and hiding), Full (all files in a folder separately), Diamond (strong and packing) and Portable (packing and portable). It has a friendly central management window and also supports direct use in Windows Explorer. It also protects data with enhanced features like folder disguise, disk protection, data lock, data shredding and more.
  • USB Encryptor is a handy utility that can protect your data on USB devices by fast and highly secure encryption or disguise. It has a visual interface that is easy to understand and use. Installation is not required. Simply put it onto the USB device to use. You can choose to encrypt all files and folders on the USB device or just specific ones, and it takes just several seconds. All USB devices and major Windows operating systems are supported.
  • E-Lock ProSigner is a easy to use electronic signature software for applying legally enforceable eSignature onto any electronic document. It integrates with MS Word, Excel and Adobe PDF which enables users to sign from within these application.imageSigner Add-On also allows the users to sign TIFF filesSoftware helps the users to comply with the regulations like HIPAA,SOX,21CFR Part11 etc ProSigner has "Create eSignature" feature to help users to create their own password-protected credentials and associate the signature image to it. This self generated credential are used for signing files. Major features of ProSigner are as follows: - Insert visible eSignature in Word, Excel,TIFF and PDF files - Sign and Verify any files in E-Lock Proprietary format of "Assured Transactions" - Create password protected credentials and associate handwritten signature for secure signing and e-Approvals - Integrates with MS-Word, MS-Excel & Acrobat, and allows users to sign from within these applications ...
  • Restrict PDF program is one of the best utility to prevent pdf copying or to prevent PDF from being copied. With Prevent PDF Copying users can prevent PDF files quickly & easily with a few clicks of mouse. The program allow users to set PDF password &; apply PDF restrictions on PDF files of Acrobat version up to 9 so that users can prevent PDF copying. Now use Restrict PDF program and prevent PDF copying in instant steps.
  • With SWF Protector you can encrypt your artworks, no matter if Flash or Flex technology was used. It protects ActionScript 1/2 and ActionScript 3, so none of your files, either old or new, will stay unguarded. You will be able to encrypt all ActionScript classes, or select specific ones with sensitive code. SWF Protector uses four different protection algorithms that allow SWF file playback in Flash Player, but conceal the source code completely
  • Keylogger is an advanced keystroke recording and system monitoring utility developed to record all day activities run on the computer. Keylogger is an invisible application developed to spy on your employee's as well as kids and spouse all day computer activity. Keylogger program records snapshots (screenshot) of screen on every click of mouse, records every entered keys, record link of every visited website, record sound of chatting. Keylogger create logs of every activity in different categories such as visual log, text log, website logs sound log etc. Keylogger program is designed with very easy to understand and use graphical user interface. Keylogger package comes in easy to install setup and run absolutely invisible in all operating system (Vista, XP, XP2, NT, ME, 2000 etc). Keylogger program is protected by a password so that nobody except you can view the created logs. Keylogger software runs in perfectly hidden mode and can not be detected by any antivirus program. Keylogger is a full pr ...

Page 21 of 30
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30


Legal disclaimer | Privacy policy

© 2004-2014 IT Shareware