Home | Submit a file  |  New  |  Categories  |  Our awards  |  Link to us  |  RSS Feeds

Utilities :: Security & Encryption
Sort by: date | product title | rating | downloads | popularity
Display: short descriptions | full descriptions
  • CE-Secure Free Express enables you to create up to four 128MB encrypted vaults using AES-256 bit encryption. There is no time-out on our express edition, you can continue to use the product to access these vaults once created, or use this edition to secure files you may be providing to someone via email or on a portable storage device. We also offer CE-Secure Pro, which enables you to create an unlimited number of encrypted vaults up to 2TB.
  • Active Keylogger Home Pro - This is the best choice for you if you think that others are using your computer when you are not home or away from your working place. After you install Active Keylogger Home Pro on your computer, it will allow you to make program settings for tracking activities on your computer.If you enable "Run Active Keylogger Home Pro in Stealth Mode" then the program will run by full stealth for others, no one will even think t
  • Security Tracker internet monitoring software is a powerful and flexible system for the control of the staff working hours usage in a network or on a terminal servers. There are many of the software to solve a similar problem. Part from them - simply spyware programs intended first of all for capturing of user`s keystrokes, passwords and various messages.
  • Security Tracker computer monitoring is a powerful and flexible system for the control of the staff working hours usage in a network or on a terminal servers. There are many of the software to solve a similar problem. Part from them - simply spyware programs intended first of all for capturing of user`s keystrokes, passwords and various messages.
  • Security Tracker is a powerful and flexible system for the control of the staff working hours usage in a network or on a terminal servers. There are many of the software to solve a similar problem. Part from them - simply spyware programs intended first of all for capturing of user`s keystrokes, passwords and various messages.
  • Security Tracker employee monitor is a powerful and flexible system for the control of the staff working hours usage in a network or on a terminal servers. There are many of the software to solve a similar problem. Part from them - simply spyware programs intended first of all for capturing of user`s keystrokes, passwords and various messages.
  • Security Tracker employee surveillance software is a powerful and flexible system for the control of the staff working hours usage in a network or on a terminal servers. There are many of the software to solve a similar problem. Part from them - simply spyware programs intended first of all for capturing of user`s keystrokes, passwords and various messages.
  • Security Tracker parental control is a powerful and flexible system for the control of the staff working hours usage in a network or on a terminal servers. There are many of the software to solve a similar problem. Part from them - simply spyware programs intended first of all for capturing of user`s keystrokes, passwords and various messages.
  • PC Ports and connections data monitoring, logging and analyzing software. Device Monitor is an USB, Serial and Network protocol analyzer, data logger software and may be used to capture, log, view and analyze data coming to and out of your computer. Recorded log files can be replayed later even on another computer. Device Monitoring Studio provides you with complete set of features to figure out what's going on when device is connected to the PC
  • Need to break & unlock MDB security from access documents? Get the wonderful software that can break or unlock MDB security. The Unlock MDB security software is created to break or unlock MBD security from Access files. With this program you will able to break or unlock MDB security and get the ability to read and open access files. Unlock MDB security support for Microsoft access 95/97/2000/2002/2003 database. Trial version is available to check on the ability of MDB security unlocker. But, to unlock full MDB securities you have to purchase full version of unlock MDB security software. You can get full version of unlock MDB security in just 25$
  • Advanced Keylogger Lite is the most powerful stealth keylogger offered Toolsanywhere Software! This is the best choice for you if you think that others are using your computer when you are not home or away from your working place. Advanced Keylogger Lite runs silently at the lowest level of windows capturing every keystroke typed including usernames and windows log-on passwords. Advanced Keylogger Lite can also capture active window text, text ty
  • Secure PDF Copying ability of your files to yourself with the help of the Restrict PDF software. The software helps you to Secure PDF Copy ability by putting either the user password or the owner password. While the former blocks the files from being viewed, the latter though letting you check out the content of the files, doesn't allows for the usage of the options of copy, print and edit on the PDF files.
  • Active Invisible Keylogger Home - This is the best choice for you if you think that others are using your computer when you are not home or away from your working place. After you install Active Invisible Keylogger Home on your computer, it will allow you to make program settings for tracking activities on your computer.If you enable "Run Active Invisible Keylogger Home in Stealth Mode" then the program will run by full stealth for others, no one
  • Personal Keylogger Lite is the most powerful stealth keylogger offered Toolsanywhere Software! This is the best choice for you if you think that others are using your computer when you are not home or away from your working place. Personal Keylogger Lite runs silently at the lowest level of windows capturing every keystroke typed including usernames and windows log-on passwords. Personal Keylogger Lite can also capture active window text, text ty
  • Power Spy secretly logs Facebook use, keystrokes, chats, emails, web sites, web cam images, user names, passwords, applications excuted and more. It records IMs in Windows Live Messenger, Skype, Yahoo Messenger, ICQ and others. Power Spy runs silently with system startup and automatically sends log reports to your email or ftp. Easy to install and setup. It is widely used in offices, homes, schools, detective agencies and police departm
  • DEKSI USB Security allows you to block unauthorized USB devices from any PC or your entire network. DEKSI USB Security will prevent unauthorized USB devices from being connected to your computer. DEKSI USB Security blocks unauthorized USB devices such as memory card readers and USB flash drives, removable storage and USB hard disks while allowing devices such as keyboards, mice and printers to be used as they would normally be. DEKSI USB Security is effective at small offices or in corporations with very large networks. DEKSI USB Security offers centralized deployment and management, and DEKSI USB Security is essential for enforcing security policies on removable storage devices, and it helps control file transfers as well as prevents infections from viruses that can bring your network operations to a halt. Blocking unauthorized USB devices is a small fraction of what DEKSI USB Security offers. DEKSI USB Security makes it possible to white-list USB devices that are considered safe such as printers, scanne ...
  • MSN Spy Monitor secretly logs all MSN Messenger / Windows Live Messenger incoming and outgoing chat text messages. Takes screen snapshots of MSN Messenger video chats every X seconds. It runs in a complete invisible mode. You can check all recorded messages by simply receiving emails or opening a web page. Perfect for catching cheaters, monitoring employees, children or spouse, and even investigating crimes.
  • Keylogger (keystroke keyboard logger) XE is the recording all You type on your computer keyboard software product for PC, spying for each visited internet site, typed search queries, logs all active (started) in the system applications, copies the computer clipboard into LogFile. The spying system monitors, logs, encrypts data and sends it to your E-mail address in the file format You choose during the Keylogger installation. The available for download version allows to check and test the full functional of Keylogger X software during 24 hours from the moment of installation. During this 24-hours' period the installed spying module shall collect all data and send it to the E-mail address You've set while the installation process - up to 4 LogFile a day in the chosen by You file format. Information security Keylogger XE system consists of Spying for users system activity module sending collected data in HTML, XLS format or their password protected versions to your E-mail address. Ke ...
  • Information leakage becomes a social problem. Information leakage may be given a huge damage to a company or individual. So we need security software to protect our information (data,file). There are much security software for PC, but little security software for mobile device. USB Flash Security is security software for mobile device. It can help you to protect you mobile devices by encryption(AES256bit). AES encryption which is recognized by speedy and cipher strength of encryption algorithm has been adopted. Data will be encrypted automatically by writing in USB memory, and it will be decrypted automatically by reading from USB memory. There are five editions in 'USB Flash Security' for personal user. USB Flash Security (Free) USB Flash Security+ (Product) USB Flash Security++ (Product) USB Flash Security# (Product) USB Flash Security## (Product) Main differences of each edition are the disk capacity and the number of USB drive. USB Flash Security can be installed on ONE USB ...
  • ZDelete Internet Eraser software helps to protect your privacy by preventing undesirable people to access private deleted data against your will. Internet Eraser ZDelete erases selected files, drives, folders, Internet Cache, Internet History, Internet Cookies, temporary files, etc. without any possibility of data recovery. Free 30-days evaluation version is fully functional and gives privacy protection.
  • Facebook Password Keylogger secrectly logs all keystrokes, web visits, emails, chats & IMs: MSN Messenger, Windows Live Messenger, ICQ, AOL/AIM, Yahoo! Messenger and Skype. Facebook Password Keylogger displays exact activities, like MySpace, Facebook, PC games, online searches & shopping, file transfers and webmails. It takes screenshots every X seconds like a spy cam. You can receive reports remotely via emails or ftp.
  • The safest and most convenient Secure Folder supports Folder lock, Folder Encrypt and Folder Hide functions. No worry about leaking own personal data to others, no worry about third party spam ware upload or steal your important files, because they cannot even find your file or only can see rubbish data. It's a safe home for your personal photos, diaries, home plans, company reports etc.
  • Social Network Keylogger secrectly logs all keystrokes, web visits, emails, chats & IMs: MSN Messenger, Windows Live Messenger, ICQ, AOL/AIM, Yahoo! Messenger and Skype. Invisible Spy Keylogger displays exact activities, like MySpace, Facebook, PC games, online searches & shopping, file transfers and webmails. It takes screenshots every X seconds like a spy cam. You can receive reports remotely via emails or ftp.
  • Metasploit Express enables IT professionals to easily verify whether vulnerabilities are exploitable, prioritize their mitigation and conduct basic penetration testing. It adds a graphical user interface to the Metasploit Framework, the de-facto leader in pentesting tools, and automates many of the tasks that otherwise require custom scripting, such as smart brute forcing, evidence collection, and reporting.
  • The Java AntidecompilerTM is a development tools for building secure Java applications and components protected against various hacker attacks, including reverse engineering, recompiling, and so on. The protection includes also time-locking of evaluation versions, HASP locking for Java, license protection, and some other features.

Page 21 of 30
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30


Legal disclaimer | Privacy policy

© 2004-2014 IT Shareware