Home | Submit a file  |  New  |  Categories  |  Our awards  |  Link to us  |  RSS Feeds

Utilities :: Security & Encryption
Sort by: date | product title | rating | downloads | popularity
Display: short descriptions | full descriptions
  • Password Box is one of the best password managers and private information to keep you safe. It is easy to use and yet powerful multipurpose program allows users to create their own arbitrary number of categories and fields that can be flexibly configured to fit your goals. This approach provides new ways to store and organize information. Password Box allows you to store all the important information in one file, which is securely encrypted.
  • Remo File Eraser a secure data eraser application, which erases important and confidential files / folders beyond recovery. The software is also capable of wiping free disk space to erase deleted data using various shredding patterns leaving no traces of critical data. Superior drive wipe feature facilitates you to wipe entire hard drive permanently.
  • Power Spy secretly logs Facebook use, keystrokes, chats, emails, web sites, web cam images, user names, passwords, applications excuted and more. It records IMs in Windows Live Messenger, Skype, Yahoo Messenger, ICQ and others. Power Spy runs silently with system startup and automatically sends log reports to your email or ftp. Easy to install and setup. It is widely used in offices, homes, schools, detective agencies and police departm
  • SpyPal Invisible Spy secrectly records Facebook, keystrokes, screenshots, websites visited, windows opened, applications, MSN, ICQ, AIM, Yahoo IM, Skype, clipboard, passwords, emails, documents and more. In Stealth Mode, it is completely invisible to computer users. Use hotkey and password to access the program. Auto send logs to a preset email or ftp at set interval. Usages: monitors employees, children, spouse and investigate crimes.
  • Web Cam Spy, invisible keylogger, email and messenger spy software. It records all keystrokes typed, MSN Messenger, Windows Live Messenger, ICQ messenger, AIM, Yahoo! Messenger, Windows Messenger and Skype's chats, websites visited, emails read, documents opened, windows opened, clipboard activaties, passwords typed and applications executed. It even takes screen snapshots like a surveillance camera.
  • Children Monitoring Spy secrectly logs your kids' Facebook use, chats, website visits and web cam images. It also logs keystrokes typed on keyboard, including their user names and passwords. It records their Skype, Windows Live Messenger, Yahoo Messenger and other instant messengers. You can check logs on the monitored PC, or receive logs via email from your office PC or cell phone. It is a great tool for caring parents to proctect childr
  • Invisible Spy Software secretly logs Facebook, keystrokes, chats, IMs, emails, websites visited, microphone, video talk, logins, passwords, applications, searches, documents and more. Logs Skype, Yahoo Messenger, MSN, ICQ, AIM, etc. Takes screenshots every x seconds like a spy cam. Sends logs to your email. You can check logs on a remote PC, tablet, smart phone, or directly on the monitored PC. Perfect for monitoring employees, kids and s
  • Keystroke recording application monitors activity perform by kids like typed URL, chatting text, distinct files and programs usage and record them for parent. Key logger Software help user to records action perform on their computer in their absence like customize system settings, changes to files, transferring data to USB device and etc. Advance spyware application is compatible with recent windows versions as windows vista, windows XP, 7 and distinct others. Keystroke capture application records internet usage, typed URL and searching keywords perform by user using your laptop. Monitoring Software is needed to records activity perform and also provides user friendly interface to driven this tool to view every usage perform on it. Computer activity recording application is design to capture activities on network, website URL, clipboard content and composed e-mail by user. Internet activity monitoring application has ability to records web activity while working in hidden mode without being observed by user o ...
  • SpyPal Windows Spy secrectly records Facebook, keystrokes, websites visited, applications, Windows Live Messenger, ICQ, Yahoo Messenger, Skype, clipboard, passwords, emails, documents and more. In Stealth Mode, it is completely invisible to monitored users. Automatically sends logs to a preset email or ftp at set interval. Usages: monitors employees, children, spouse and investigate crimes.
  • Windows Spy Software secretly logs Facebook, keystrokes, chats, IMs, emails, websites visited, microphone, video talk, logins, passwords, applications, searches, documents and more. Logs Skype, Yahoo Messenger, MSN, ICQ, AIM, etc. Takes screenshots every x seconds like a spy cam. Sends logs to your email. You can check logs on a remote PC, tablet, smart phone, or directly on the monitored PC. Perfect for monitoring employees, kids and spo
  • www.freewarekeylogger.us offers best solution for all small and large business industries to record workers activity in minimum cost and time. Computer monitoring program provides complete solution to trace user activities including both side chat conversation, compose emails, clipboard action, internet surfing history, user name and time spent on computer, accessed websites, type keyboards, online search or similar type of activity on system. Freeware Key logger easily runs in hidden so other external user does not know about any program installation on computer system. Keystroke recorder program provides detail monitoring about single pressed keystroke activity even if you are many miles away from your system. PC monitoring program helps organization to improve their business productivity on checking regular employees activity performed on office system. Freeware Key logger software is beneficial to record all search engines activities like Google, MSN or Yahoo. Visual surveillance Key logger tool facilitat ...
  • www.freewarekeylogger.org software helps in monitoring apple Mac operated computer system with options to trace all records like internet history, searches, clipboard activity and keystrokes with USB device insertion and removal easily. Keylogger also facilitates to take screenshot of computer at regular time duration and also keep log files with advance options to run programs in silent mode so user can?t modify programs or setting. Monitoring tool provides simplest way to record computer history with complete email-password details and also traces clipboard database without any expert professional knowledge. Employee monitoring tool for Mac os x is capable to trace your computer and internet activity without being notified. Activity record software is best tool available on internet for monitoring purpose at offices, home, cyber caf and other work places with support of silent mode. Activity tracing program is not stored on desktop icons, starts up menu, install/uninstall list so unauthorized user?s are no ...
  • Do you have a PDF file which cannot be printed, copied or modified? Your PDF file has had password security and other restrictions added. PDF protection tool can be used to crack protected Adobe Acrobat PDF files, which have “user” or “owner” password set, preventing the file from editing, printing, extracting content, selecting text and graphics or adding/changing annotations and form fields. Decryption of PDF is being done on a single click in batch mode. In just a second, you will have a PDF file with no restrictions on your local system. Now, you can edit, print, copy, form fill and many more with your PDF files and decrypted PDF can be opened in any PDF viewer (e.g. Adobe Acrobat Reader) without any restrictions. The standard security provided by PDF consists of two different methods and two different passwords. PDF document may be protected by password for opening ('user' password) and the document modification security like content copying, printing, editing, image extracting, form fi ...
  • The generation of cryptographic keys and certificate requests X.509, and other service functions associated with the formation and maintenance of key systems of the carriers in PKI (Public Key Infrastructure - PKI), supporting secure applications built on the basis 2-keys cryptographic algorithms. Support: GOST R34.10-2001, RSA, DSA, eToken, Rutoken EDS, KRYPTON, Accord-AMDZ, Sobol...
  • Hibosoft BossComing Boss Key is a professional and reliable application designed to protect your privacy and hide sensitive information. It is a powerful, intuitive and easy to use boss key application based on virtual desktop techniques. Hibosoft BossComing Boss Key can hide window, protect your privacy and hide sensitive information from prying eyes in seconds.
  • Keeping your web servers secure from hackers is absolutely essential for keeping sensitive data belonging to your company or your customers safe. The Google Hack Database is a free tool from SecPoint which will scan your web domains for security vulnerabilities and match them to Google. You will then be able to find out if any sensitive information was leaked to Google.
  • Best and easy to download internet monitor application easily allows both technical and non-technical user to use such type software without taking extraordinary technical classes in advance. Simple to operate data tracking tool allows user to save all visited details into different file format like txt or html and also able to save them at safe location in system or at user defined another desktop. Amazing PC monitoring utility operates in hidden mode that is not visible in task manager, start up menu, file, add or remove program, installation folder etc. Special http://www.monitoringsoftware.mobi site allows user to take a trial version of tool for understand software. Safe and economical personal computer data manager program allows user to record all actions performed by kids in stealth mode including typed keyword, URLs, visited websites, sending and receiving mails, chat conversation, screenshots and many others in efficient manner. Superior monitoring software supports all Windows OS based system suc ...
  • CyberSafe is one of the perfect solutions for data encryption software. It provides the ultimate data security features including support for many different algorithms and encryption methods. You can hide files and folders and encrypt them so that no one can ever access your data unexpectedly. Skype chat messages, emails and Amazon S3 encryption are also supported by this powerful all-in-one solution.
  • NSF Local Security Remover from SysInfoTools is a robust and powerful tool that allows user to remove local security restrictions from secured NSF database files of lotus Notes. This tool removes security in no time with just few mouse clicks and key strokes. NSF Local Security Remover from SysInfoTools is a perfect solution for removing security from secured NSF database file of Lotus Notes. Lotus Notes has an attribute named as Access Control List (ACL) using which administrator set access rights to particular NSF file. Using this attribute file owner manages the NSF file. But sometimes situation arises when Lotus Domino server act inaccessible stops responding and the user or administrator is not able to access the NSF file. Every time when they try to do so the above mentioned errors are flashed making situation worse. NSF Local Security Remover from SysInfoTools is especially designed to deal with such type of situations. It erases NSF security aptly and helps you to open and read Lotus Notes NSF file ...
  • Innovative Spy software allows business users with best option to secretly trace and record overall office employees performed internet activities during their working hours. www.dd-spy.com facilitates users with highly developed feature to prominently monitor each and every typed keystrokes details including presses login id, password, open web pages, composed text documents, search engine search, online chat conversation, send or received emails, changes done in any saved text files, visited websites, played online games and many other similar activities. Key logger application enables users to run program in secretly capture external user performed activities by running utility in complete stealth or hidden mode and remains invisible from start up menu, control panel, computer system screen or desktop items, program files and folders, add or remove list, task manager, installation files and folders and many more. PC data manager program offer user to save encrypted logged files at particular location for f ...
  • Folder password protect software keeps your data safe even under the DOS and Windows Safe Mode. Folder password protect can be also used for password protecting portable drives such as USB, memory cards and CD/DVD drives. This application will only password protect files and folders, it does not encrypt the protected files and folders.
  • Keylogger silently and untraceably records every moment PC actions and make encrypted reports about them. Keylogger is hidden application not visible to the user being monitored and not shown in control panel-add pr remove programs, task manager, start menu, no file or folder and not anywhere on your computer system. Keylogger generates password protected log file reports in HTML and provides options to categorize, insert, delete or display reports in accordance with corresponding date and time attributes. Keylogger is surveillance software with which other users cannot know that their activities are being controlled and original user can get all tracked information with date and time parameters. Why Keylogger is Important? 1. Tracks and controls every action carried out by other users on your computer system. 2. Record chats acted upon using various chat programs like Yahoo Messenger, Skype, Gmail, Orkut, Facebook and others. 3. Take visual picture of all chats, every mouse click and all typed keyst ...
  • Advanced Keylogger is a profound yet very easy to understand and use. It was developed by Eltima Software and is constantly improved version after version. You can easily monitor keystrokes, typed IM messages, visited websites, sent or received email messages, data copied to clipboard. Advanced Keylogger can also take screenshots of PC activity at the specified interval so that you can later watch them as a slideshow. All user accounts on your computer can be monitored with Advanced Keylogger. Its logs will be well hidden and encrypted so that only you can find and read them. You don't even have to be at the computer you monitor because Advanced Keylogger can regularly email you the reports of all activity to your email address, and don't you worry - it is very easy to set up, its wizard will fill in the SMTP server automatically for most popular email services. Advanced Keylogger operates absolutely invisibly for computer users and antivirus programs, so no one but you can detect it is ...
  • JiJi Password Expiration Notification is a simple tool to notify users, managers and administrators through e-mail before their password and account expire. Administrator can receive the summary report to the specific email ids. Administrator can define the notification task for any specified target (Domain, an OU, Group, Set of Users).
  • JiJi Password Expiration Notification is a simple tool to notify users, managers and administrators through e-mail before their password and account expire. Administrator can receive the summary report to the specific email ids. Administrator can define the notification task for any specified target (Domain, an OU, Group, Set of Users).

Page 17 of 30
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30


Legal disclaimer | Privacy policy

© 2004-2017 IT Shareware