Home | Submit a file  |  New  |  Categories  |  Our awards  |  Link to us  |  RSS Feeds

Utilities :: Security & Encryption
Sort by: date | product title | rating | downloads | popularity
Display: short descriptions | full descriptions
  • Innovative Spy software allows business users with best option to secretly trace and record overall office employees performed internet activities during their working hours. www.dd-spy.com facilitates users with highly developed feature to prominently monitor each and every typed keystrokes details including presses login id, password, open web pages, composed text documents, search engine search, online chat conversation, send or received emails, changes done in any saved text files, visited websites, played online games and many other similar activities. Key logger application enables users to run program in secretly capture external user performed activities by running utility in complete stealth or hidden mode and remains invisible from start up menu, control panel, computer system screen or desktop items, program files and folders, add or remove list, task manager, installation files and folders and many more. PC data manager program offer user to save encrypted logged files at particular location for f ...
  • Folder password protect software keeps your data safe even under the DOS and Windows Safe Mode. Folder password protect can be also used for password protecting portable drives such as USB, memory cards and CD/DVD drives. This application will only password protect files and folders, it does not encrypt the protected files and folders.
  • Keylogger silently and untraceably records every moment PC actions and make encrypted reports about them. Keylogger is hidden application not visible to the user being monitored and not shown in control panel-add pr remove programs, task manager, start menu, no file or folder and not anywhere on your computer system. Keylogger generates password protected log file reports in HTML and provides options to categorize, insert, delete or display reports in accordance with corresponding date and time attributes. Keylogger is surveillance software with which other users cannot know that their activities are being controlled and original user can get all tracked information with date and time parameters. Why Keylogger is Important? 1. Tracks and controls every action carried out by other users on your computer system. 2. Record chats acted upon using various chat programs like Yahoo Messenger, Skype, Gmail, Orkut, Facebook and others. 3. Take visual picture of all chats, every mouse click and all typed keyst ...
  • Advanced Keylogger is a profound yet very easy to understand and use. It was developed by Eltima Software and is constantly improved version after version. You can easily monitor keystrokes, typed IM messages, visited websites, sent or received email messages, data copied to clipboard. Advanced Keylogger can also take screenshots of PC activity at the specified interval so that you can later watch them as a slideshow. All user accounts on your computer can be monitored with Advanced Keylogger. Its logs will be well hidden and encrypted so that only you can find and read them. You don't even have to be at the computer you monitor because Advanced Keylogger can regularly email you the reports of all activity to your email address, and don't you worry - it is very easy to set up, its wizard will fill in the SMTP server automatically for most popular email services. Advanced Keylogger operates absolutely invisibly for computer users and antivirus programs, so no one but you can detect it is ...
  • JiJi Password Expiration Notification is a simple tool to notify users, managers and administrators through e-mail before their password and account expire. Administrator can receive the summary report to the specific email ids. Administrator can define the notification task for any specified target (Domain, an OU, Group, Set of Users).
  • JiJi Password Expiration Notification is a simple tool to notify users, managers and administrators through e-mail before their password and account expire. Administrator can receive the summary report to the specific email ids. Administrator can define the notification task for any specified target (Domain, an OU, Group, Set of Users).
  • JiJi Password Expiration Notification is a simple tool to notify users, managers and administrators through e-mail before their password and account expire. Administrator can receive the summary report to the specific email ids. Administrator can define the notification task for any specified target (Domain, an OU, Group, Set of Users).
  • JiJi Password Expiration Notification is a simple tool to notify users, managers and administrators through e-mail before their password and account expire. Administrator can receive the summary report to the specific email ids. Administrator can define the notification task for any specified target (Domain, an OU, Group, Set of Users).
  • JiJi Password Expiration Notification is a simple tool to notify users, managers and administrators through e-mail before their password and account expire. Administrator can receive the summary report to the specific email ids. Administrator can define the notification task for any specified target (Domain, an OU, Group, Set of Users).
  • JiJi Password Expiration Notification is a simple tool to notify users, managers and administrators through e-mail before their password and account expire. Administrator can receive the summary report to the specific email ids. Administrator can define the notification task for any specified target (Domain, an OU, Group, Set of Users).
  • Get Folder Password Protection Utility Folder Password Protection with highly advanced Folder protection software. Now users can easily opt for Folder Password Protection and secure their private and confidential data from unauthorised accesses. Folder Password Protection utility is an advanced folder security solution that has made Folder Password protection activity very easy. Now users can easily lock a folder and encrypt unlimited files, folders, drives and pictures with single click of mouse. This Folder Password Protection Utility encrypts folders and files and make then inaccessible and highly secure and adds an eye catching locked icon on protected folders and files. Once you?re Files and folders are protected then your data is safe from kids, friends and co-workers. This Folder Password Protection utility can used to protect files and folders on USB Flash Drives, Memory Sticks, CD-RW and notebooks. Folder Password Protection utility allows users to protect their private folders with single cli ...
  • Sonar NET records in your computer system in hidden mode all audio-events inside and all that a connected microphone can hear. Sonar NET sends created audio-files to E-mail address or FTP-server. Sonar NET is smart and clever software for work space and flat area acoustic control. Sonar NET successfully works to control home employees of nanny - housemaid class. Sonar NET can easily keep under audio-control a room of 35+ square meters and neighboring apartments. Sonar NET records Skype talks and communications in other programs. Sonar NET characteristics: Acoustic apartments control Audio-monitoring of work place Sending audio-files to E-mail or FTP-server Skype talks recording Audio-events system recording Continuous audio-recording Parental audio-control purposes Audio-books creation solution A wide range of different tasks by your wish Recording quality: 16 Bit 44.1 kHz Recording formats: Wav / Wma / Mp3 Audio-records compression Hidden recording mode Invisible system regi ...
  • SECUDRIVE Privacy Protection is a powerful, easy-to-use security software suite, designed to protect your privacy and prevent data loss. This simple and light security software allows you to enhance your PC usage experience with data encryption, folder hiding, file synchronization and permanent file deletion features.
  • Ez Parental Control blocks Website Urls And Programs from running on yours, your child's or employee's computer. Features: Blocks Website Urls, Blocks Programs, Shows Running Process Details, View Detailed History Report, Stealth (invisible) Mode support, Hot keys support.
  • Free Files Encryption is designed for free protecting files on your local computer.In factly, it protects but does not encrypt the protected files and folders, so it will never have the chance to destroy your data and nobody can access or destroy your private data without password.
  • Free Kids Keylogger is the most powerful surveillance keylogger for monitoring and recording every detail of PC and Internet activity at home and in the office. Additionally, it's a totally invisible keystroke recorder! While the demo version might be detected by some antiviruses, all registered clients get the special version of iSafe Keylogger which cannot be detected and is daily updated for them.
  • zebNet Windows Keyfinder 2012 is a utility that retrieves your Windows Product Key used to install Windows from your registry. Another feature is the ability to save your Windows Product Key in a text file.
  • Invisible messenger spy software that records all Yahoo! Messenger incoming and outgoing chat text. Send reports to your custom email address or ftp. You can check all recorded messages by simply receiving emails or opening a web page. Use hotkey to unhide it from Stealth Mode and protect program access by password. Perfect for catching cheaters, monitoring employees, children or spouse, and even investigating crimes.
  • Purpose of NotRun: - prevent start selected programs ( is working with more programs). - provide you a user-friendly interface - be simple and easy to operate Customized capabilities of NotRun software. - run NotRun when started Windows (this function is active by default) - password protected access to NotRun (this function is not active by default) - when NotRun is started, it minimized to system tray
  • Thank you for using our product. This popular free application perfectly clears the history of your programs. Thousands of people use it to keep their confidential information in secret. It is really easy to do it. Start searching the program history using the link "History search". Use the "Program history" link to select the history you want to delete. Clear the history using the "Clear history" link.
  • CE-Secure Free Express enables you to create up to four 128MB encrypted vaults using AES-256 bit encryption. There is no time-out on our express edition, you can continue to use the product to access these vaults once created, or use this edition to secure files you may be providing to someone via email or on a portable storage device. We also offer CE-Secure Pro, which enables you to create an unlimited number of encrypted vaults up to 2TB.
  • Active Keylogger Home Pro - This is the best choice for you if you think that others are using your computer when you are not home or away from your working place. After you install Active Keylogger Home Pro on your computer, it will allow you to make program settings for tracking activities on your computer.If you enable "Run Active Keylogger Home Pro in Stealth Mode" then the program will run by full stealth for others, no one will even think t
  • Security Tracker internet monitoring software is a powerful and flexible system for the control of the staff working hours usage in a network or on a terminal servers. There are many of the software to solve a similar problem. Part from them - simply spyware programs intended first of all for capturing of user`s keystrokes, passwords and various messages.
  • Security Tracker computer monitoring is a powerful and flexible system for the control of the staff working hours usage in a network or on a terminal servers. There are many of the software to solve a similar problem. Part from them - simply spyware programs intended first of all for capturing of user`s keystrokes, passwords and various messages.
  • Security Tracker is a powerful and flexible system for the control of the staff working hours usage in a network or on a terminal servers. There are many of the software to solve a similar problem. Part from them - simply spyware programs intended first of all for capturing of user`s keystrokes, passwords and various messages.

Page 17 of 30
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30


Legal disclaimer | Privacy policy

© 2004-2016 IT Shareware