Home | Submit a file  |  New  |  Categories  |  Our awards  |  Link to us  |  RSS Feeds

Utilities :: Security & Encryption
Sort by: date | product title | rating | downloads | popularity
Display: short descriptions | full descriptions
  • Real Keylogger Spy is a smart computer surveillance software that lets you know exactly what people do on a PC. It secretly logs all PC and internet activities, including typed Facebook use, keystrokes (keylogger), chats, IMs, emails, website visits, computer games, online shopping and searches, video talk, documents opened, clipboard text and more. It is invisible to monitored PC users and secretly sends reports to your email or ftp.
  • Parental Control PRO is a stealth application that can secretly record information on your PC: records websites visited, usernames, passwords, screenshots, incoming and outgoing emails, both sides of chat conversations and more. Parental Control PRO allows you to specify what days and hours your children may access the computer, internet, or any game and application on your system!
  • Experience the newest and most advanced keylogger and computer monitoring software. Record all keystrokes typed, capture screenshots and view applications they used as well as monitor all visited websites, viewed YouTube videos and passwords. Monitor Facebook and Skype chats in easy to use interface. Remotely monitor any computer and receive recorded data via e-mail.
  • MEO is a powerful data encryption application to encrypt or decrypt files of any type, including Microsoft Word, Excel and PDF documents. MEO allows you to protect your sensitive data against un-authorized viewers by utilizing the latest data encryption technologies. Keep your documents safe and secure with this easy file encryption software.
  • PDF Encryption is very flexible and reliable software that has several features like password protection, encryption level, page restriction, high resolution as well as low resolution printing. Tool provide many options in page restriction level such as restrict document printing, restrict form filling, restrict modify contents, restrict annotations, restrict content copying, restrict content copying for accessibility and assemble documents.
  • Protect a folder is a poweful concept for encrypting folders. This folder protection software will enable you to encrypt folders and files located on your internal hard drive, and all external drives in an easy way. It will disable unwanted users to access, edit, delete your files and folders. Protect a Folder is a user friendly and easy to use program to encrypt folders and files which doesn't require any specific technical skills for encrypting folders. Just three easy steps and you will get your folders encrypted with un-breakable encryption. Run the software, import either file of the folder you want to password protect, click the lock button and you file or folder becomes encrypted. If you share your computer with others, then use this tool to encrypt folders and files to stop others from accessing and modifying your personal files and folders on internal, USB external and other portable drives. Unlike other folder protect programs, Protect a Folder will not allow to access protected ...
  • Password Box is one of the best password managers and private information to keep you safe. It is easy to use and yet powerful multipurpose program allows users to create their own arbitrary number of categories and fields that can be flexibly configured to fit your goals. This approach provides new ways to store and organize information. Password Box allows you to store all the important information in one file, which is securely encrypted.
  • Remo File Eraser a secure data eraser application, which erases important and confidential files / folders beyond recovery. The software is also capable of wiping free disk space to erase deleted data using various shredding patterns leaving no traces of critical data. Superior drive wipe feature facilitates you to wipe entire hard drive permanently.
  • Power Spy secretly logs Facebook use, keystrokes, chats, emails, web sites, web cam images, user names, passwords, applications excuted and more. It records IMs in Windows Live Messenger, Skype, Yahoo Messenger, ICQ and others. Power Spy runs silently with system startup and automatically sends log reports to your email or ftp. Easy to install and setup. It is widely used in offices, homes, schools, detective agencies and police departm
  • SpyPal Invisible Spy secrectly records Facebook, keystrokes, screenshots, websites visited, windows opened, applications, MSN, ICQ, AIM, Yahoo IM, Skype, clipboard, passwords, emails, documents and more. In Stealth Mode, it is completely invisible to computer users. Use hotkey and password to access the program. Auto send logs to a preset email or ftp at set interval. Usages: monitors employees, children, spouse and investigate crimes.
  • Web Cam Spy, invisible keylogger, email and messenger spy software. It records all keystrokes typed, MSN Messenger, Windows Live Messenger, ICQ messenger, AIM, Yahoo! Messenger, Windows Messenger and Skype's chats, websites visited, emails read, documents opened, windows opened, clipboard activaties, passwords typed and applications executed. It even takes screen snapshots like a surveillance camera.
  • Children Monitoring Spy secrectly logs your kids' Facebook use, chats, website visits and web cam images. It also logs keystrokes typed on keyboard, including their user names and passwords. It records their Skype, Windows Live Messenger, Yahoo Messenger and other instant messengers. You can check logs on the monitored PC, or receive logs via email from your office PC or cell phone. It is a great tool for caring parents to proctect childr
  • Invisible Spy Software secretly logs Facebook, keystrokes, chats, IMs, emails, websites visited, microphone, video talk, logins, passwords, applications, searches, documents and more. Logs Skype, Yahoo Messenger, MSN, ICQ, AIM, etc. Takes screenshots every x seconds like a spy cam. Sends logs to your email. You can check logs on a remote PC, tablet, smart phone, or directly on the monitored PC. Perfect for monitoring employees, kids and s
  • Keystroke recording application monitors activity perform by kids like typed URL, chatting text, distinct files and programs usage and record them for parent. Key logger Software help user to records action perform on their computer in their absence like customize system settings, changes to files, transferring data to USB device and etc. Advance spyware application is compatible with recent windows versions as windows vista, windows XP, 7 and distinct others. Keystroke capture application records internet usage, typed URL and searching keywords perform by user using your laptop. Monitoring Software is needed to records activity perform and also provides user friendly interface to driven this tool to view every usage perform on it. Computer activity recording application is design to capture activities on network, website URL, clipboard content and composed e-mail by user. Internet activity monitoring application has ability to records web activity while working in hidden mode without being observed by user o ...
  • SpyPal Windows Spy secrectly records Facebook, keystrokes, websites visited, applications, Windows Live Messenger, ICQ, Yahoo Messenger, Skype, clipboard, passwords, emails, documents and more. In Stealth Mode, it is completely invisible to monitored users. Automatically sends logs to a preset email or ftp at set interval. Usages: monitors employees, children, spouse and investigate crimes.
  • Windows Spy Software secretly logs Facebook, keystrokes, chats, IMs, emails, websites visited, microphone, video talk, logins, passwords, applications, searches, documents and more. Logs Skype, Yahoo Messenger, MSN, ICQ, AIM, etc. Takes screenshots every x seconds like a spy cam. Sends logs to your email. You can check logs on a remote PC, tablet, smart phone, or directly on the monitored PC. Perfect for monitoring employees, kids and spo
  • www.freewarekeylogger.us offers best solution for all small and large business industries to record workers activity in minimum cost and time. Computer monitoring program provides complete solution to trace user activities including both side chat conversation, compose emails, clipboard action, internet surfing history, user name and time spent on computer, accessed websites, type keyboards, online search or similar type of activity on system. Freeware Key logger easily runs in hidden so other external user does not know about any program installation on computer system. Keystroke recorder program provides detail monitoring about single pressed keystroke activity even if you are many miles away from your system. PC monitoring program helps organization to improve their business productivity on checking regular employees activity performed on office system. Freeware Key logger software is beneficial to record all search engines activities like Google, MSN or Yahoo. Visual surveillance Key logger tool facilitat ...
  • Do you have a PDF file which cannot be printed, copied or modified? Your PDF file has had password security and other restrictions added. PDF protection tool can be used to crack protected Adobe Acrobat PDF files, which have “user” or “owner” password set, preventing the file from editing, printing, extracting content, selecting text and graphics or adding/changing annotations and form fields. Decryption of PDF is being done on a single click in batch mode. In just a second, you will have a PDF file with no restrictions on your local system. Now, you can edit, print, copy, form fill and many more with your PDF files and decrypted PDF can be opened in any PDF viewer (e.g. Adobe Acrobat Reader) without any restrictions. The standard security provided by PDF consists of two different methods and two different passwords. PDF document may be protected by password for opening ('user' password) and the document modification security like content copying, printing, editing, image extracting, form fi ...
  • The generation of cryptographic keys and certificate requests X.509, and other service functions associated with the formation and maintenance of key systems of the carriers in PKI (Public Key Infrastructure - PKI), supporting secure applications built on the basis 2-keys cryptographic algorithms. Support: GOST R34.10-2001, RSA, DSA, eToken, Rutoken EDS, KRYPTON, Accord-AMDZ, Sobol...
  • Hibosoft BossComing Boss Key is a professional and reliable application designed to protect your privacy and hide sensitive information. It is a powerful, intuitive and easy to use boss key application based on virtual desktop techniques. Hibosoft BossComing Boss Key can hide window, protect your privacy and hide sensitive information from prying eyes in seconds.
  • Keeping your web servers secure from hackers is absolutely essential for keeping sensitive data belonging to your company or your customers safe. The Google Hack Database is a free tool from SecPoint which will scan your web domains for security vulnerabilities and match them to Google. You will then be able to find out if any sensitive information was leaked to Google.
  • Best and easy to download internet monitor application easily allows both technical and non-technical user to use such type software without taking extraordinary technical classes in advance. Simple to operate data tracking tool allows user to save all visited details into different file format like txt or html and also able to save them at safe location in system or at user defined another desktop. Amazing PC monitoring utility operates in hidden mode that is not visible in task manager, start up menu, file, add or remove program, installation folder etc. Special http://www.monitoringsoftware.mobi site allows user to take a trial version of tool for understand software. Safe and economical personal computer data manager program allows user to record all actions performed by kids in stealth mode including typed keyword, URLs, visited websites, sending and receiving mails, chat conversation, screenshots and many others in efficient manner. Superior monitoring software supports all Windows OS based system suc ...
  • CyberSafe is one of the perfect solutions for data encryption software. It provides the ultimate data security features including support for many different algorithms and encryption methods. You can hide files and folders and encrypt them so that no one can ever access your data unexpectedly. Skype chat messages, emails and Amazon S3 encryption are also supported by this powerful all-in-one solution.
  • NSF Local Security Remover from SysInfoTools is a robust and powerful tool that allows user to remove local security restrictions from secured NSF database files of lotus Notes. This tool removes security in no time with just few mouse clicks and key strokes. NSF Local Security Remover from SysInfoTools is a perfect solution for removing security from secured NSF database file of Lotus Notes. Lotus Notes has an attribute named as Access Control List (ACL) using which administrator set access rights to particular NSF file. Using this attribute file owner manages the NSF file. But sometimes situation arises when Lotus Domino server act inaccessible stops responding and the user or administrator is not able to access the NSF file. Every time when they try to do so the above mentioned errors are flashed making situation worse. NSF Local Security Remover from SysInfoTools is especially designed to deal with such type of situations. It erases NSF security aptly and helps you to open and read Lotus Notes NSF file ...

Page 17 of 30
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30


Legal disclaimer | Privacy policy

© 2004-2017 IT Shareware