Home | Submit a file  |  New  |  Categories  |  Our awards  |  Link to us  |  RSS Feeds

Utilities :: Security & Encryption
Sort by: date | product title | rating | downloads | popularity
Display: short descriptions | full descriptions
  • Free Files Encryption is designed for free protecting files on your local computer.In factly, it protects but does not encrypt the protected files and folders, so it will never have the chance to destroy your data and nobody can access or destroy your private data without password.
  • Free Kids Keylogger is the most powerful surveillance keylogger for monitoring and recording every detail of PC and Internet activity at home and in the office. Additionally, it's a totally invisible keystroke recorder! While the demo version might be detected by some antiviruses, all registered clients get the special version of iSafe Keylogger which cannot be detected and is daily updated for them.
  • zebNet Windows Keyfinder 2012 is a utility that retrieves your Windows Product Key used to install Windows from your registry. Another feature is the ability to save your Windows Product Key in a text file.
  • Invisible messenger spy software that records all Yahoo! Messenger incoming and outgoing chat text. Send reports to your custom email address or ftp. You can check all recorded messages by simply receiving emails or opening a web page. Use hotkey to unhide it from Stealth Mode and protect program access by password. Perfect for catching cheaters, monitoring employees, children or spouse, and even investigating crimes.
  • Purpose of NotRun: - prevent start selected programs ( is working with more programs). - provide you a user-friendly interface - be simple and easy to operate Customized capabilities of NotRun software. - run NotRun when started Windows (this function is active by default) - password protected access to NotRun (this function is not active by default) - when NotRun is started, it minimized to system tray
  • Thank you for using our product. This popular free application perfectly clears the history of your programs. Thousands of people use it to keep their confidential information in secret. It is really easy to do it. Start searching the program history using the link "History search". Use the "Program history" link to select the history you want to delete. Clear the history using the "Clear history" link.
  • CE-Secure Free Express enables you to create up to four 128MB encrypted vaults using AES-256 bit encryption. There is no time-out on our express edition, you can continue to use the product to access these vaults once created, or use this edition to secure files you may be providing to someone via email or on a portable storage device. We also offer CE-Secure Pro, which enables you to create an unlimited number of encrypted vaults up to 2TB.
  • Active Keylogger Home Pro - This is the best choice for you if you think that others are using your computer when you are not home or away from your working place. After you install Active Keylogger Home Pro on your computer, it will allow you to make program settings for tracking activities on your computer.If you enable "Run Active Keylogger Home Pro in Stealth Mode" then the program will run by full stealth for others, no one will even think t
  • Security Tracker internet monitoring software is a powerful and flexible system for the control of the staff working hours usage in a network or on a terminal servers. There are many of the software to solve a similar problem. Part from them - simply spyware programs intended first of all for capturing of user`s keystrokes, passwords and various messages.
  • Security Tracker computer monitoring is a powerful and flexible system for the control of the staff working hours usage in a network or on a terminal servers. There are many of the software to solve a similar problem. Part from them - simply spyware programs intended first of all for capturing of user`s keystrokes, passwords and various messages.
  • Security Tracker is a powerful and flexible system for the control of the staff working hours usage in a network or on a terminal servers. There are many of the software to solve a similar problem. Part from them - simply spyware programs intended first of all for capturing of user`s keystrokes, passwords and various messages.
  • Security Tracker employee monitor is a powerful and flexible system for the control of the staff working hours usage in a network or on a terminal servers. There are many of the software to solve a similar problem. Part from them - simply spyware programs intended first of all for capturing of user`s keystrokes, passwords and various messages.
  • Security Tracker employee surveillance software is a powerful and flexible system for the control of the staff working hours usage in a network or on a terminal servers. There are many of the software to solve a similar problem. Part from them - simply spyware programs intended first of all for capturing of user`s keystrokes, passwords and various messages.
  • Security Tracker parental control is a powerful and flexible system for the control of the staff working hours usage in a network or on a terminal servers. There are many of the software to solve a similar problem. Part from them - simply spyware programs intended first of all for capturing of user`s keystrokes, passwords and various messages.
  • PC Ports and connections data monitoring, logging and analyzing software. Device Monitor is an USB, Serial and Network protocol analyzer, data logger software and may be used to capture, log, view and analyze data coming to and out of your computer. Recorded log files can be replayed later even on another computer. Device Monitoring Studio provides you with complete set of features to figure out what's going on when device is connected to the PC
  • Need to break & unlock MDB security from access documents? Get the wonderful software that can break or unlock MDB security. The Unlock MDB security software is created to break or unlock MBD security from Access files. With this program you will able to break or unlock MDB security and get the ability to read and open access files. Unlock MDB security support for Microsoft access 95/97/2000/2002/2003 database. Trial version is available to check on the ability of MDB security unlocker. But, to unlock full MDB securities you have to purchase full version of unlock MDB security software. You can get full version of unlock MDB security in just 25$
  • Advanced Keylogger Lite is the most powerful stealth keylogger offered Toolsanywhere Software! This is the best choice for you if you think that others are using your computer when you are not home or away from your working place. Advanced Keylogger Lite runs silently at the lowest level of windows capturing every keystroke typed including usernames and windows log-on passwords. Advanced Keylogger Lite can also capture active window text, text ty
  • Secure PDF Copying ability of your files to yourself with the help of the Restrict PDF software. The software helps you to Secure PDF Copy ability by putting either the user password or the owner password. While the former blocks the files from being viewed, the latter though letting you check out the content of the files, doesn't allows for the usage of the options of copy, print and edit on the PDF files.
  • Protect PDF from Editing - The completion of the task is easily achieved with aid of Restrict PDF software, which offers to barricade the files from external interference. While the user password prevents you from opening the very files, the owner password goes onto to prevent the contents of the files against the implementation of the features like edit, copy and print.
  • This is a free monitoring software designed for covert invisible surveillance. The main function of the program is keystrokes recording, but it can also capture visited web pages and save text data from Windows clipboard (copied text). WIth this program, you will always know what the users are doing on computer. This is a prefect solution for parents who care about their child's online safety; for system administrators, chiefs and so on.
  • DEKSI Shield allows you to hide and password protect your folders and set access rights using an encryption tool and protection wizard. DEKSI Shield is the most advanced, powerful and feature rich protection program for your computer system: hide files, folders, and drives, and set access rules using flexible security combinations for your most valuable data. A unique feature of DEKSI Shield is the combination of data hiding and encrypting. Features include: 1. Ability to hide files, folders, or drives from all other users (including the administrator). 2. Encrypts files and folders. 3. A mask that allows you to hide file groups (for example, c:*.doc). 4. Ability to set permissions (Read, Write, Visibility, Delete) for any files, folders, and drives. For example, you can make your files Read Only and make it impossible to delete them. 5. An access lock on your private folders and settings (My Documents, Favorites, Control Panel, Internet History, etc. 6. A protection wizard. 7. Password prote ...
  • Keylogger - keystroke keyboard logger - X-version is the recording all You type on your computer keyboard software product for PC, spying for each visited internet site, typed search queries, logs all active (started) in the system applications, copies the computer clipboard into LogFile. The spying system monitors, logs, encrypts data and sends it to your E-mail address in the file format You choose during the Keylogger installation. The available for download version allows to check and test the full functional of Keylogger X software during 24 hours from the moment of installation. As the matter of fact, this time is quite enough to enjoy all benefits of this keylogger version. During this 24-hours' period the installed spying module shall collect all data and send it to the E-mail address You've entered while the installation process as 1 LogFile in the chosen by You file format. Information security Keylogger X system consists of Spying for users system activity module sending co ...
  • Information leakage becomes a social problem. Information leakage may be given a huge damage to a company or individual. So we need security software to protect our information (data,file). There are much security software for PC, but little security software for mobile device. USB Flash Security is security software for mobile device. It can help you to protect you mobile devices by encryption(AES256bit). AES encryption which is recognized by speedy and cipher strength of encryption algorithm has been adopted. Data will be encrypted automatically by writing in USB memory, and it will be decrypted automatically by reading from USB memory. There are five editions in 'USB Flash Security' for personal user. USB Flash Security (Free) USB Flash Security+ (Product) USB Flash Security++ (Product) USB Flash Security# (Product) USB Flash Security## (Product) Main differences of each edition are the disk capacity and the number of USB drive. USB Flash Security can be installed on ONE USB ...
  • ZDelete Internet Eraser software helps to protect your privacy by preventing undesirable people to access private deleted data against your will. Internet Eraser ZDelete erases selected files, drives, folders, Internet Cache, Internet History, Internet Cookies, temporary files, etc. without any possibility of data recovery. Free 30-days evaluation version is fully functional and gives privacy protection.
  • Facebook Password Keylogger secrectly logs all keystrokes, web visits, emails, chats & IMs: MSN Messenger, Windows Live Messenger, ICQ, AOL/AIM, Yahoo! Messenger and Skype. Facebook Password Keylogger displays exact activities, like MySpace, Facebook, PC games, online searches & shopping, file transfers and webmails. It takes screenshots every X seconds like a spy cam. You can receive reports remotely via emails or ftp.

Page 17 of 30
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30


Legal disclaimer | Privacy policy

© 2004-2014 IT Shareware