Home | Submit a file  |  New  |  Categories  |  Our awards  |  Link to us  |  RSS Feeds

Utilities :: Security & Encryption
Sort by: date | product title | rating | downloads | popularity
Display: short descriptions | full descriptions
  • Keylogger Spy Monitor spy software can secretly record all keystrokes typed on your computer. It runs completely invisiblely. You can check logging reports by simply receiving emails or opening a web page. Perfect for catching cheaters, m onitoring employees, children or spouse, acquiring others' passwords and even investigating crimes. Use hotkey to unhide it from Stealth Mode and protect the program access by password.
  • SpyPal Invisible Spy secrectly records keystrokes, screenshots, websites visited, windows opened, applications, MSN, ICQ, AIM, Yahoo! IM, Skype, clipboard, passwords, emails, documents and more. In Stealth Mode, it is completely invisible to computer users. Use hotkey and password to access the program. Auto send logs to a preset email or ftp at set interval. Usages: monitors employees, children, spouse and investigate crimes.
  • Power Spy For Office secrectly logs all keystrokes, web sites, emails, chats & IMs: MSN Messenger, Windows Live Messenger, ICQ, AOL Messenger, AIM, Yahoo! Messenger, Windows Messenger and Skype. Takes screen snapshots at every X seconds like a surveillance camera. Displays exact activities, like MySpace, Facebook, PC games, online searches & shopping, file transfers and webmails. You can receive reports remotely via emails or ft
  • Invisible messenger spy software that logs all incoming and outgoing AIM text chat messages. View log records from the program or send a report to a preset email / ftp. You can check all recorded incoming and outgoing messages by simply receiving emails or opening a web page. Use hotkey to unhide it from Stealth Mode and protect program access by password.
  • With Children Monitoring Spy you can log chat conversations, emails, the sites someone visited, MySpace, Facebook etc. By activating Children Monitoring Spy, you can monitor everything. Children Monitoring Spy allows you to register all keystrokes typed including language-specific characters, talk and messages conversations, passwords, e-mails, clipboard information, screenshots capturing, desktop and Internet activity.
  • Power Spy secrectly logs all keystrokes, web sites, emails, chats & IMs: MSN Messenger, Windows Live Messenger, ICQ, AOL Messenger, AIM, Yahoo! Messenger, Windows Messenger and Skype. Takes screen snapshots at every X seconds like a surveillance camera. Displays exact activities, like MySpace, Facebook, PC games, online searches & shopping, file transfers and webmails. You can receive reports remotely via emails or ftp.
  • SpyPal Keylogger Spy software can secretly record all keystrokes typed on your computer. This may include chats, emails, user names, passwords, online searches, myspace, facebook activities and more.It runs in a complete invisible mode. You can check logging reports by simply receiving emails or opening a web page.Perfect for catching cheaters, monitoring employees, children or spouse.
  • SpyPal For Office secrectly records keystrokes, screenshots, websites visited, windows opened, applications, MSN, ICQ, AIM, Yahoo! IM, Skype, clipboard, passwords, emails, documents and more. In Stealth Mode, it is completely invisible to computer users. Use hotkey and password to access the program. Auto send logs to a preset email or ftp at set interval. Possible usages: monitors employees, children, spouse and investigate crimes.
  • Power Spy For Home secrectly logs all keystrokes, web sites, emails, chats & IMs: MSN Messenger, Windows Live Messenger, ICQ, AOL Messenger, AIM, Yahoo! Messenger, Windows Messenger and Skype. Takes screen snapshots at every X seconds like a surveillance camera. Displays exact activities, like MySpace, Facebook, PC games, online searches & shopping, file transfers and webmails. You can receive reports remotely via emails or ftp.
  • Spy Camera Software, invisible keylogger, email and messenger spy software. It records all keystrokes typed, MSN Messenger, Windows Live Messenger, ICQ messenger, AIM, Yahoo! Messenger, Windows Messenger and Skype's chats, websites visited, emails read, documents opened, windows opened, clipboard activaties, passwords typed and applications executed. It even takes screen snapshots like a surveillance camera.
  • Power Spy Keylogger spy software can secretly record all keystrokes typed on your computer. It runs completely invisiblely. You can check log reports by simply receiving emails or opening a web page. Power Spy Keylogger is perfect for catching cheaters, monitoring employees, children or spouse, acquiring others' passwords and even investigating crimes. Use hotkey to unhide it from Stealth Mode and protect the program access by password.
  • Parental Spy software secrectly logs all keystrokes, web sites, emails, chats & IMs: MSN Messenger, Windows Live Messenger, ICQ, AOL / AIM, Yahoo! Messenger, Windows Messenger and Skype. Takes screen snapshots at every X seconds like a surveillance camera. Displays exact activities, like MySpace, Facebook, PC games, online searches & shopping, file transfers and webmails. You can receive reports remotely via emails or ftp.
  • SpyPal For Home secrectly records keystrokes, screenshots, websites visited, windows opened, applications, MSN, ICQ, AIM, Yahoo! IM, Skype, clipboard, passwords, emails, documents and more. In Stealth Mode, it is completely invisible to computer users. Use hotkey and password to access the program. Auto send logs to a preset email or ftp at set interval. Possible usages: monitors employees, children, spouse and investigate crimes.
  • PC Spy Monitor secrectly records keystrokes, screenshots, websites visited, windows opened, applications run, Skype, Windows Live Messenger, MSN Messenger, ICQ, AIM / AOL, Yahoo! Messenger, passwords, emails and more. In Stealth Mode, it is completely invisible to computer users. You can use hotkey to it. Send logs to a preset email or ftp at set interval. Usages: monitors employees, children, spouse and investigate crimes.
  • SpyPal Windows Spy secrectly records keystrokes, screenshots, websites visited, windows opened, applications, MSN, ICQ, AIM, Yahoo! IM, Skype, clipboard, passwords, emails, documents and more. In Stealth Mode, it is completely invisible to computer users. Use hotkey and password to access the program. Auto send logs to a preset email or ftp at set interval. Usages: monitors employees, children, spouse and investigate crimes.
  • Family Spy software secrectly logs all keystrokes, web sites, emails, chats & IMs: MSN Messenger, Windows Live Messenger, ICQ, AOL / AIM, Yahoo! Messenger, Windows Messenger and Skype. Takes screen snapshots at every X seconds like a surveillance camera. Displays exact activities, like MySpace, Facebook, PC games, online searches & shopping, file transfers and webmails. You can receive reports remotely via emails or ftp.
  • Power Spy software secrectly logs all keystrokes, web sites, emails, chats & IMs: MSN Messenger, Windows Live Messenger, ICQ, AOL / AIM, Yahoo! Messenger, Windows Messenger and Skype. Takes screen snapshots at every X seconds like a surveillance camera. Displays exact activities, like MySpace, Facebook, PC games, online searches & shopping, file transfers and webmails. You can receive reports remotely via emails or ftp.
  • Power Spy software secrectly logs all keystrokes, web sites, emails, chats & IMs: MSN Messenger, Windows Live Messenger, ICQ, AOL / AIM, Yahoo! Messenger, Windows Messenger and Skype. Takes screen snapshots at every X seconds like a surveillance camera. Displays exact activities, like MySpace, Facebook, PC games, online searches & shopping, file transfers and webmails. You can receive reports remotely via emails or ftp.
  • Cryptic Disk creates virtual encrypted disks and encrypts hard disks, USB drives and memory cards. This lets you keep your secrets safe both on your home computer and at your workstation. Data encryption uses the best algorithms available, happening in real time and without affecting computer performance. Reliably conceal your encrypted disks and containers, with access only through a password or key files.
  • Virtual encrypted disks are the best way to protect personal or confidential information on your home computer. Data encryption takes place in real time when information is written or read, and in no way affects your computer's performance. Containers are mounted as separate disks; protected with the best available algorithms, they can be accessed using a password or key file. Cryptic Disk - the only disk encryption software you'll ever need!
  • Professional key monitoring application is specially designed and developed to records chat conversation, internet activities, instant messages, composed emails etc. Software keylogger automatically starts monitoring activities of various type users like home, institutional, organizational etc when Windows starts. Keyboard key recorder software examines all typed keys and generates encrypted log file reports of all actions executed by home, institutional, organizational level users. Keyloggers program is the best monitoring tool for parents to watch their kid's activities when you are away. Computer surveillance application capable to convert generated encrypted log files in primary user readable format like html, txt file in fastest manner. Keylogger software records all typed keystroke in encrypted log file format and provides email sending option at primary user specified location to view these log files. Easy to use key monitoring utility has an interactive graphical user interface environment that e ...
  • Laptop CD/DVD Guard offers you all of the features of CD/DVD Door Guard Pro applicable on laptop computers. It helps you to lock the drive and prevent your small children from playing with it, locks your laptop's drive when the computer goes to sleep mode, reminds about forgotten disk inside the drive. It can show messages or play a sound when the drive is being locked and lock the drive immediately after starting Windows.
  • PDF Encryption software is fast and affordable desktop utility to easily batch password protect pdf documents. Software easily and instantly set user password as well as owner password. Software supports both encryption level including 40 bit RC4 and 128 bit RC4. Tool locks pdf from text copying, disable printing or set degraded printing, disallow editing. After making pdf encryption, software ensures that the pdf file can only be opened by intended recipients i.e. only an authorize person can use the pdf. User can apply various restrictions on documents by limiting it for printing, editing and copying. Software supports all windows based operating systems including Windows 7, Vista and XP. Features: # Password protect bulk PDF files in a single hit. # Tool can be used to set both password user password as well as owner password. # It supports all latest Windows operating systems. # Adds PDF right click context menu to open pdf directly in software. # Set both 40 bit and 128 bit encryption. # Tool doe ...
  • Reverse phone search displays a numbers owner using 6 sites at once, this tool is fast easy and free. See a strange number on your caller ID and want to know who it is or perhaps some one is selling some thing in the newspaper you want to know who it is, this free tool is for you
  • 1. Easy and secure file protection Critical and Private files are protected easily and securely. Files are read and modified with no need of cumbersome decryption. Just one "DOUBLE CLICK" will enable you to use files with ease. 2. Secret file and message sharing Important files are opened only by those who are designated for secure file sharing. Also, secret messages are exchanged in secret through email, documents, guest books on Blogs. 3. File name protection File names are known to the right user exclusively with WitchFile explorer. 4. File history protection History of file usage is protected by keeping files opened on Windows, Document Editor and Media Player, etc. from being known to others. 5. File shredding Critical and private files casually deleted are recoverable later on. File shredding guarantees complete security by making deleted files irrecoverable. 6. Certified international safe algorithm Algorithm such as AES, 3DES, Blowfish, P.Gutmann, US ...

Page 21 of 30
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30


Legal disclaimer | Privacy policy

© 2004-2015 IT Shareware