Home | Submit a file  |  New  |  Categories  |  Our awards  |  Link to us  |  RSS Feeds

Utilities :: Security & Encryption
Sort by: date | product title | rating | downloads | popularity
Display: short descriptions | full descriptions
  • Security Tracker is a powerful and flexible system for the control of the staff working hours usage in a network or on a terminal servers. There are many of the software to solve a similar problem. Part from them - simply spyware programs intended first of all for capturing of user`s keystrokes, passwords and various messages.
  • Security Tracker employee monitor is a powerful and flexible system for the control of the staff working hours usage in a network or on a terminal servers. There are many of the software to solve a similar problem. Part from them - simply spyware programs intended first of all for capturing of user`s keystrokes, passwords and various messages.
  • Security Tracker employee surveillance software is a powerful and flexible system for the control of the staff working hours usage in a network or on a terminal servers. There are many of the software to solve a similar problem. Part from them - simply spyware programs intended first of all for capturing of user`s keystrokes, passwords and various messages.
  • Security Tracker parental control is a powerful and flexible system for the control of the staff working hours usage in a network or on a terminal servers. There are many of the software to solve a similar problem. Part from them - simply spyware programs intended first of all for capturing of user`s keystrokes, passwords and various messages.
  • PC Ports and connections data monitoring, logging and analyzing software. Device Monitor is an USB, Serial and Network protocol analyzer, data logger software and may be used to capture, log, view and analyze data coming to and out of your computer. Recorded log files can be replayed later even on another computer. Device Monitoring Studio provides you with complete set of features to figure out what's going on when device is connected to the PC
  • Need to break & unlock MDB security from access documents? Get the wonderful software that can break or unlock MDB security. The Unlock MDB security software is created to break or unlock MBD security from Access files. With this program you will able to break or unlock MDB security and get the ability to read and open access files. Unlock MDB security support for Microsoft access 95/97/2000/2002/2003 database. Trial version is available to check on the ability of MDB security unlocker. But, to unlock full MDB securities you have to purchase full version of unlock MDB security software. You can get full version of unlock MDB security in just 25$
  • Advanced Keylogger Lite is the most powerful stealth keylogger offered Toolsanywhere Software! This is the best choice for you if you think that others are using your computer when you are not home or away from your working place. Advanced Keylogger Lite runs silently at the lowest level of windows capturing every keystroke typed including usernames and windows log-on passwords. Advanced Keylogger Lite can also capture active window text, text ty
  • Secure PDF Copying ability of your files to yourself with the help of the Restrict PDF software. The software helps you to Secure PDF Copy ability by putting either the user password or the owner password. While the former blocks the files from being viewed, the latter though letting you check out the content of the files, doesn't allows for the usage of the options of copy, print and edit on the PDF files.
  • Active Invisible Keylogger Home - This is the best choice for you if you think that others are using your computer when you are not home or away from your working place. After you install Active Invisible Keylogger Home on your computer, it will allow you to make program settings for tracking activities on your computer.If you enable "Run Active Invisible Keylogger Home in Stealth Mode" then the program will run by full stealth for others, no one
  • Personal Keylogger Lite is the most powerful stealth keylogger offered Toolsanywhere Software! This is the best choice for you if you think that others are using your computer when you are not home or away from your working place. Personal Keylogger Lite runs silently at the lowest level of windows capturing every keystroke typed including usernames and windows log-on passwords. Personal Keylogger Lite can also capture active window text, text ty
  • Power Spy secretly logs Facebook use, keystrokes, chats, emails, web sites, web cam images, user names, passwords, applications excuted and more. It records IMs in Windows Live Messenger, Skype, Yahoo Messenger, ICQ and others. Power Spy runs silently with system startup and automatically sends log reports to your email or ftp. Easy to install and setup. It is widely used in offices, homes, schools, detective agencies and police departm
  • DEKSI USB Security allows you to block unauthorized USB devices from any PC or your entire network. DEKSI USB Security will prevent unauthorized USB devices from being connected to your computer. DEKSI USB Security blocks unauthorized USB devices such as memory card readers and USB flash drives, removable storage and USB hard disks while allowing devices such as keyboards, mice and printers to be used as they would normally be. DEKSI USB Security is effective at small offices or in corporations with very large networks. DEKSI USB Security offers centralized deployment and management, and DEKSI USB Security is essential for enforcing security policies on removable storage devices, and it helps control file transfers as well as prevents infections from viruses that can bring your network operations to a halt. Blocking unauthorized USB devices is a small fraction of what DEKSI USB Security offers. DEKSI USB Security makes it possible to white-list USB devices that are considered safe such as printers, scanne ...
  • MSN Spy Monitor secretly logs all MSN Messenger / Windows Live Messenger incoming and outgoing chat text messages. Takes screen snapshots of MSN Messenger video chats every X seconds. It runs in a complete invisible mode. You can check all recorded messages by simply receiving emails or opening a web page. Perfect for catching cheaters, monitoring employees, children or spouse, and even investigating crimes.
  • Keylogger (keystroke keyboard logger) XE is the recording all You type on your computer keyboard software product for PC, spying for each visited internet site, typed search queries, logs all active (started) in the system applications, copies the computer clipboard into LogFile. The spying system monitors, logs, encrypts data and sends it to your E-mail address in the file format You choose during the Keylogger installation. The available for download version allows to check and test the full functional of Keylogger X software during 24 hours from the moment of installation. During this 24-hours' period the installed spying module shall collect all data and send it to the E-mail address You've set while the installation process - up to 4 LogFile a day in the chosen by You file format. Information security Keylogger XE system consists of Spying for users system activity module sending collected data in HTML, XLS format or their password protected versions to your E-mail address. Ke ...
  • Information leakage becomes a social problem. Information leakage may be given a huge damage to a company or individual. So we need security software to protect our information (data,file). There are much security software for PC, but little security software for mobile device. USB Flash Security is security software for mobile device. It can help you to protect you mobile devices by encryption(AES256bit). AES encryption which is recognized by speedy and cipher strength of encryption algorithm has been adopted. Data will be encrypted automatically by writing in USB memory, and it will be decrypted automatically by reading from USB memory. There are five editions in 'USB Flash Security' for personal user. USB Flash Security (Free) USB Flash Security+ (Product) USB Flash Security++ (Product) USB Flash Security# (Product) USB Flash Security## (Product) Main differences of each edition are the disk capacity and the number of USB drive. USB Flash Security can be installed on ONE USB ...
  • ZDelete Internet Eraser software helps to protect your privacy by preventing undesirable people to access private deleted data against your will. Internet Eraser ZDelete erases selected files, drives, folders, Internet Cache, Internet History, Internet Cookies, temporary files, etc. without any possibility of data recovery. Free 30-days evaluation version is fully functional and gives privacy protection.
  • Facebook Password Keylogger secrectly logs all keystrokes, web visits, emails, chats & IMs: MSN Messenger, Windows Live Messenger, ICQ, AOL/AIM, Yahoo! Messenger and Skype. Facebook Password Keylogger displays exact activities, like MySpace, Facebook, PC games, online searches & shopping, file transfers and webmails. It takes screenshots every X seconds like a spy cam. You can receive reports remotely via emails or ftp.
  • The safest and most convenient Secure Folder supports Folder lock, Folder Encrypt and Folder Hide functions. No worry about leaking own personal data to others, no worry about third party spam ware upload or steal your important files, because they cannot even find your file or only can see rubbish data. It's a safe home for your personal photos, diaries, home plans, company reports etc.
  • Social Network Keylogger secrectly logs all keystrokes, web visits, emails, chats & IMs: MSN Messenger, Windows Live Messenger, ICQ, AOL/AIM, Yahoo! Messenger and Skype. Invisible Spy Keylogger displays exact activities, like MySpace, Facebook, PC games, online searches & shopping, file transfers and webmails. It takes screenshots every X seconds like a spy cam. You can receive reports remotely via emails or ftp.
  • Metasploit Express enables IT professionals to easily verify whether vulnerabilities are exploitable, prioritize their mitigation and conduct basic penetration testing. It adds a graphical user interface to the Metasploit Framework, the de-facto leader in pentesting tools, and automates many of the tasks that otherwise require custom scripting, such as smart brute forcing, evidence collection, and reporting.
  • The Java AntidecompilerTM is a development tools for building secure Java applications and components protected against various hacker attacks, including reverse engineering, recompiling, and so on. The protection includes also time-locking of evaluation versions, HASP locking for Java, license protection, and some other features.
  • Keyword Magic Professional is the ultimate keyword tool to extract data from the online Google keyword tool. With it, you can view search data, competition data, CPC, search trends and then sort, organize, filter, create keyword lists, view product models with the advanced keyword filters and more.
  • A professional system for licensing and protecting executable files for Windows. The Enigma Protector is an essential tool for every developer of commercial software and shareware for Windows. The Enigma Protector includes a wide range of unique features aimed at protecting executable files from illegal copying, hacking, modification, and analysis. The supported formats include almost all types of 32- and 64-bit executable files.
  • Great KeyLogger is an advanced application designed to monitor and record all activities on your pc. Great Keylogger is specialized software used to log all keystrokes of your keyboard, screenshot during every event, sent and received e-mails, passwords, chatting record, all applications opened, all visited sites and many more. Keylogger begins on its own when computer system starts and monitors all kinds of searches which have been opened. Great Keylogger is invisible utility and not displayed anywhere in your PC, neither in task bar, nor in Add/Remove programs. Keylogger provide feature to take snapshots every few seconds or on each mouse click similarly as surveillance camera. Great Keylogger is a powerful tool cultivated to record every event and function like Microphone sounds, video chats, entered passwords, visiting sites etc. Keylogger sets the limitation on particular web sites and applications so that no one can access selected sites. Keylogger is effective tool allows to track all actions from ...
  • Decreasing productivity and efficiency of employees at the workforce is always a matter of serious concern. It often gets very hard for a manager to manage or keep an eye on every employee. In order to get rid of all such kind of worthless activities, you should try to use Employee Desktop Live Viewer tool that has been designed to monitor all ongoing functions on the employee desktop. Owing to the advanced features of this pc monitoring software, it gets lot easier to monitor all the computers connected on the network with utmost ease. Actually, the tool facilitates you to know what the users are doing in the real-time. By employing this proficient software tool, you can easily keep a proper check on employee’s computer activities. In addition, it provides some other controls over their activities like locking, restarting the screensaver or even removing the wallpaper remotely. Thus, the Employee Desktop Live Viewer is all that you need. Being a computer PC monitor tool, it facilitates you to monitor all the ...

Page 21 of 30
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30


Legal disclaimer | Privacy policy

© 2004-2014 IT Shareware