Home | Submit a file  |  New  |  Categories  |  Our awards  |  Link to us  |  RSS Feeds

Utilities :: Security & Encryption
Sort by: date | product title | rating | downloads | popularity
Display: short descriptions | full descriptions
  • Get Folder Password Protection Utility Folder Password Protection with highly advanced Folder protection software. Now users can easily opt for Folder Password Protection and secure their private and confidential data from unauthorised accesses. Folder Password Protection utility is an advanced folder security solution that has made Folder Password protection activity very easy. Now users can easily lock a folder and encrypt unlimited files, folders, drives and pictures with single click of mouse. This Folder Password Protection Utility encrypts folders and files and make then inaccessible and highly secure and adds an eye catching locked icon on protected folders and files. Once you?re Files and folders are protected then your data is safe from kids, friends and co-workers. This Folder Password Protection utility can used to protect files and folders on USB Flash Drives, Memory Sticks, CD-RW and notebooks. Folder Password Protection utility allows users to protect their private folders with single cli ...
  • Sonar NET records in your computer system in hidden mode all audio-events inside and all that a connected microphone can hear. Sonar NET sends created audio-files to E-mail address or FTP-server. Sonar NET is smart and clever software for work space and flat area acoustic control. Sonar NET successfully works to control home employees of nanny - housemaid class. Sonar NET can easily keep under audio-control a room of 35+ square meters and neighboring apartments. Sonar NET records Skype talks and communications in other programs. Sonar NET characteristics: Acoustic apartments control Audio-monitoring of work place Sending audio-files to E-mail or FTP-server Skype talks recording Audio-events system recording Continuous audio-recording Parental audio-control purposes Audio-books creation solution A wide range of different tasks by your wish Recording quality: 16 Bit 44.1 kHz Recording formats: Wav / Wma / Mp3 Audio-records compression Hidden recording mode Invisible system regi ...
  • SECUDRIVE Privacy Protection is a powerful, easy-to-use security software suite, designed to protect your privacy and prevent data loss. This simple and light security software allows you to enhance your PC usage experience with data encryption, folder hiding, file synchronization and permanent file deletion features.
  • Ez Parental Control blocks Website Urls And Programs from running on yours, your child's or employee's computer. Features: Blocks Website Urls, Blocks Programs, Shows Running Process Details, View Detailed History Report, Stealth (invisible) Mode support, Hot keys support.
  • Free Files Encryption is designed for free protecting files on your local computer.In factly, it protects but does not encrypt the protected files and folders, so it will never have the chance to destroy your data and nobody can access or destroy your private data without password.
  • Free Kids Keylogger is the most powerful surveillance keylogger for monitoring and recording every detail of PC and Internet activity at home and in the office. Additionally, it's a totally invisible keystroke recorder! While the demo version might be detected by some antiviruses, all registered clients get the special version of iSafe Keylogger which cannot be detected and is daily updated for them.
  • zebNet Windows Keyfinder 2012 is a utility that retrieves your Windows Product Key used to install Windows from your registry. Another feature is the ability to save your Windows Product Key in a text file.
  • Invisible messenger spy software that records all Yahoo! Messenger incoming and outgoing chat text. Send reports to your custom email address or ftp. You can check all recorded messages by simply receiving emails or opening a web page. Use hotkey to unhide it from Stealth Mode and protect program access by password. Perfect for catching cheaters, monitoring employees, children or spouse, and even investigating crimes.
  • Purpose of NotRun: - prevent start selected programs ( is working with more programs). - provide you a user-friendly interface - be simple and easy to operate Customized capabilities of NotRun software. - run NotRun when started Windows (this function is active by default) - password protected access to NotRun (this function is not active by default) - when NotRun is started, it minimized to system tray
  • Thank you for using our product. This popular free application perfectly clears the history of your programs. Thousands of people use it to keep their confidential information in secret. It is really easy to do it. Start searching the program history using the link "History search". Use the "Program history" link to select the history you want to delete. Clear the history using the "Clear history" link.
  • CE-Secure Free Express enables you to create up to four 128MB encrypted vaults using AES-256 bit encryption. There is no time-out on our express edition, you can continue to use the product to access these vaults once created, or use this edition to secure files you may be providing to someone via email or on a portable storage device. We also offer CE-Secure Pro, which enables you to create an unlimited number of encrypted vaults up to 2TB.
  • Active Keylogger Home Pro - This is the best choice for you if you think that others are using your computer when you are not home or away from your working place. After you install Active Keylogger Home Pro on your computer, it will allow you to make program settings for tracking activities on your computer.If you enable "Run Active Keylogger Home Pro in Stealth Mode" then the program will run by full stealth for others, no one will even think t
  • Security Tracker internet monitoring software is a powerful and flexible system for the control of the staff working hours usage in a network or on a terminal servers. There are many of the software to solve a similar problem. Part from them - simply spyware programs intended first of all for capturing of user`s keystrokes, passwords and various messages.
  • Security Tracker computer monitoring is a powerful and flexible system for the control of the staff working hours usage in a network or on a terminal servers. There are many of the software to solve a similar problem. Part from them - simply spyware programs intended first of all for capturing of user`s keystrokes, passwords and various messages.
  • Security Tracker is a powerful and flexible system for the control of the staff working hours usage in a network or on a terminal servers. There are many of the software to solve a similar problem. Part from them - simply spyware programs intended first of all for capturing of user`s keystrokes, passwords and various messages.
  • Security Tracker employee monitor is a powerful and flexible system for the control of the staff working hours usage in a network or on a terminal servers. There are many of the software to solve a similar problem. Part from them - simply spyware programs intended first of all for capturing of user`s keystrokes, passwords and various messages.
  • Security Tracker employee surveillance software is a powerful and flexible system for the control of the staff working hours usage in a network or on a terminal servers. There are many of the software to solve a similar problem. Part from them - simply spyware programs intended first of all for capturing of user`s keystrokes, passwords and various messages.
  • Security Tracker parental control is a powerful and flexible system for the control of the staff working hours usage in a network or on a terminal servers. There are many of the software to solve a similar problem. Part from them - simply spyware programs intended first of all for capturing of user`s keystrokes, passwords and various messages.
  • PC Ports and connections data monitoring, logging and analyzing software. Device Monitor is an USB, Serial and Network protocol analyzer, data logger software and may be used to capture, log, view and analyze data coming to and out of your computer. Recorded log files can be replayed later even on another computer. Device Monitoring Studio provides you with complete set of features to figure out what's going on when device is connected to the PC
  • Need to break & unlock MDB security from access documents? Get the wonderful software that can break or unlock MDB security. The Unlock MDB security software is created to break or unlock MBD security from Access files. With this program you will able to break or unlock MDB security and get the ability to read and open access files. Unlock MDB security support for Microsoft access 95/97/2000/2002/2003 database. Trial version is available to check on the ability of MDB security unlocker. But, to unlock full MDB securities you have to purchase full version of unlock MDB security software. You can get full version of unlock MDB security in just 25$
  • Advanced Keylogger Lite is the most powerful stealth keylogger offered Toolsanywhere Software! This is the best choice for you if you think that others are using your computer when you are not home or away from your working place. Advanced Keylogger Lite runs silently at the lowest level of windows capturing every keystroke typed including usernames and windows log-on passwords. Advanced Keylogger Lite can also capture active window text, text ty
  • Secure PDF Copying ability of your files to yourself with the help of the Restrict PDF software. The software helps you to Secure PDF Copy ability by putting either the user password or the owner password. While the former blocks the files from being viewed, the latter though letting you check out the content of the files, doesn't allows for the usage of the options of copy, print and edit on the PDF files.
  • Protect PDF from Editing - The completion of the task is easily achieved with aid of Restrict PDF software, which offers to barricade the files from external interference. While the user password prevents you from opening the very files, the owner password goes onto to prevent the contents of the files against the implementation of the features like edit, copy and print.
  • This is a free monitoring software designed for covert invisible surveillance. The main function of the program is keystrokes recording, but it can also capture visited web pages and save text data from Windows clipboard (copied text). WIth this program, you will always know what the users are doing on computer. This is a prefect solution for parents who care about their child's online safety; for system administrators, chiefs and so on.
  • DEKSI Shield allows you to hide and password protect your folders and set access rights using an encryption tool and protection wizard. DEKSI Shield is the most advanced, powerful and feature rich protection program for your computer system: hide files, folders, and drives, and set access rules using flexible security combinations for your most valuable data. A unique feature of DEKSI Shield is the combination of data hiding and encrypting. Features include: 1. Ability to hide files, folders, or drives from all other users (including the administrator). 2. Encrypts files and folders. 3. A mask that allows you to hide file groups (for example, c:*.doc). 4. Ability to set permissions (Read, Write, Visibility, Delete) for any files, folders, and drives. For example, you can make your files Read Only and make it impossible to delete them. 5. An access lock on your private folders and settings (My Documents, Favorites, Control Panel, Internet History, etc. 6. A protection wizard. 7. Password prote ...

Page 17 of 30
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30


Legal disclaimer | Privacy policy

© 2004-2015 IT Shareware