Home | Submit a file  |  New  |  Categories  |  Our awards  |  Link to us  |  RSS Feeds

Utilities :: Security & Encryption
Sort by: date | product title | rating | downloads | popularity
Display: short descriptions | full descriptions
  • AW GoOn allows you to work safely in your PC under a Standard User account, but having full Administrator level privileges to any number of selected applications you could not run otherwise. You don't need to enter any credentials of a member of the Local Administrators Group to launch such applications and you don't even need to know them. This makes the software perfectly suitable both for the workplace and for the home environment.
  • Secure portable pdf documents with user level and owner level security protection. Encrypt pdf documents using 40 bits and 128 bits encryption level security. Pdf encryption software not only set user level password but also facilitates owner guard security which restrict pdf printing, editing, signing, commenting, content & graphics copying, page extraction etc. Tool helps to customize the security setting by selecting required parameter to lock pdf. User can select whether he/she wants to allow their recipients to print, edit, copy pdf content or not. All options can be set by simple tick boxes selection. The main feature of this awesome tool is that it can process batch pdf files for encrypting documents. Locking pdf files with password ensures that only intended recipients can open the documents. Features: # Pdf encryption tool supports bulk pdf files. # User can add both user and owner password security. # Tool supports two levels of password security 40 bits and 128 bits. # Tool does not r ...
  • Is anyone watching your computer activity right now? You may choose to ignore this, but for just around $100 anyone may monitor the following activities on your computer: A full snapshot of your screen every three to five minutes All passwords All incoming and outgoing e-mails All your chats and instant messages All your documents printed and saved to mini-disks All websites visited The software that monitors and saves all this information can run totally invisible on your system, feeding business sensitive information to your competitors, spouse or a disgruntled employee. What would be the consequences for your business if anyone had access to all your passwords? Or, what would be the consequences if your competition could monitor your tenders, budgets, progress reports, contracts, informal chats and all other internal communication? Is this James Bond? Or, is this only for the determined few with huge resources available? The answer is no. Anyone can monitor your business this way rig ...
  • Aye Parental Control helps parents restrict the time that children spend on computer and Internet. It is the utility for home PC that enables a parent regulate When and How-much of children's time that can be spent on the computer whether it be playing games or surfing the Internet. It also has the ability to block access to specified programs and websites.
  • BackdoorGuard Award-Winning Firewall Software. Prevents Hackers and Adware Communications. protects against emerging viruses before they attack. Easy-to-use firewall blocks hackers and other unknown threats. and prevent spyware from Sending Out your personal data all in an easy-to-use interface. Award-Winning Firewall Software. Prevents Hackers and Adware Communications. Stops viruses and worms, and protects again.
  • BackTrack ist eine kostenlose Linux-Distribution in Form einer Live-CD, die sich durch zahlreiche Hack- und Knack-Tools von vergleichbaren Linux-Live-CDs unterscheidet. Einerseits eignet sich BackTrack damit hervorragend für Administratoren zum Aufspüren von Sicherheitslücken, andererseits erhalten Hacker mit der Distribution ein optimales Angriffswerkzeug
  • A program for recovering lost or forgotten passwords to backup files (*.qic) created with Microsoft Backup. All passwords are recovered instantly.
  • A VPN protects you by encrypting your internet traffic, making your online activities impossible to intercept by unwanted third parties. Once connected to any of our servers, you become masked behind an anonymous IP address. Bart VPN gives you the option to automatically encrypt selected applications on your computer, it will also connect to the best server available in your location. It's simply the ultimate gateway to internet freedom.
  • Base64 Tools for Windows is a utility, which allows you to Encode/Decode File, Text, String, URL and any other data and if you are a Software Developer you can also check out our Base64 Encode/Decode ActiveX DLL Library used in this application.
  • Encrypt and decrypt whole files or their parts using AES, Triple-DES (3DES), RC2, and DES symmetric algorithms. You can encrypt files with a single password or specify cryptographic keys (vectors) instead. You can change key bit length for better protection. You can select specifically which bytes in a file should be encrypted/decrypted, though by default the whole file is processed.
  • Looking for PDF security solution! Download and tryout our advanced pdf password protection solution which encrypts bulk pdf documents in a single click. Software provides a big hand to your business confidential property by encrypting data and protecting with open password. User can set pdf owner password on documents, thus enables users to restrict pdf files for printing, text copying, form filling, editing, signing, commenting, page extraction etc. PDF encryptor tool supports both 128 bit and 40 bit RC4 encryption level. E-book security software protects your electronic pdf books from printing and copying. User password is required to lock the documents from opening and owner password is required to lock the documents for applying various permissions like printing, copying etc. Software is independent on Adobe Acrobat Pro and also does not require extra plug-ins for it. Features: # Process batch pdf files for encryption. # Software supports all latest versions of windows operating systems including Wind ...
  • Set PDF open password on bulk PDF files, password protect batch PDF documents. Download free PDF locker software to instantly lock multiple PDF documents. Encrypt PDF using 40 bit and 128 bit RC4 encryption level. Disallow PDF text copying, document printing, form filling, page extraction, document assembly, content copying for accessibility.
  • Need to protect your important and valuable pdf data with password in non-editable mode? Try pdf encryption software which uses strong 128 bit protection key to encrypt pdf data. Tool adds pdf user password as well as pdf owner restrictions password. User password stands for pdf open restriction and prompts to type when an unauthorized user tries to open it. Only valid and authenticated person who know the password can open and view pdf. Owner password stands for pdf permission password which restricts user to edit document, blocks all types of modification like pdf page split merge extract etc, disable pdf printing and content copying, deny form filling, signing and commenting etc. Software uses 128 bit, 256 bit strong security key and supports both RC4 and AES encryption level protection. Batch pdf security software is very easy to use even by novice user. Download free evaluation copy to lock pdf document with hard security settings. Trial shows watermark on output documents however registered copy works w ...
  • Permanently delete data and wipe free space with BCWipe. BCWipe is trusted throughout the U.S. DoD to securely erase files and folder beyond recovery - including free space, file slack space, MFT records, Internet and local history, directory entries, NTFS log file and directory slack space. BCWipe uniquely features Transparent Wiping - deleted or temporary files are wiped automatically on the fly. Available for Windows, Mac and UNIX.
  • Before selling, disposing or donating used computers, securely erase hard drives with BCWipe Total WipeOut. Trusted as the de-facto standard for the U.S. DoD, BCWipe Total WipeOut erases boot records, filesystem structures, operating system files and service areas. BCWipe Total WipeOut comes built with the U.S. Department of Defense (DoD 5220.22-M) and U.S. Department of Energy (DoE M 205.1-2) standards, as well as other popular wiping standards.
  • The software has been designed as universal program for security hybrid platforms functioning concurrently with wireless and wired Internet cameras, Television-boards, capture boards, power-line, and USB cameras. It has web interface with the equal look and functionality on the local and remote workstations. Users view MPEG coded picture and have full management of the software through net that surveillance workstation can be operated without screen, keyboard, and mouse attached. Program`s modular composition extensively improves reliability because all parts work as autonomous programs. If one component freezes, other modules go on running. For instance if the `capture` module stops working, `watchdog` starts again it right away that viewers don`t notice anything because they are viewing video using a `playback` part. The program performs `repeated` recording that the `disk full` situation never happens. The recording can be non-stop or it can be initiated by motion, human face detection, or by schedul ...
  • Extract and analyze digital evidence. The Enterprise edition of Belkasoft Evidence Center enables team work with full collaboration support, adding user and permission management to the already impressive list of features. Extracting more than 250 types of artifacts, the tool scans hard drives and analyzes page files, hibernation files and live memory dumps for IM and social communications, Web browsing activities, documents and emails.
  • Belkasoft Facebook Profile Saver is a free tool to save the content of Facebook users' profiles for offline use. Designed for computer forensic and IT security specialists, Belkasoft Facebook Profile Saver automates the routine of downloading Facebook pages and resources for offline examination and printout. Local copies of Facebook profiles can be used as court evidence.
  • Best Folder Encryptor safely encrypts files and folder with various methods - Flash (instant), Hiding (instant and hiding), Full (all files in a folder separately), Diamond (strong and packing) and Portable (packing and portable). It has a friendly central management window and also supports direct use in Windows Explorer. It also protects data with enhanced features like folder disguise, disk protection, data lock, data shredding and more.
  • iSafe Keystroke Recorder is the most powerful surveillance keylogger for monitoring and recording every detail of PC and Internet activity at home and in the office. Additionally, it's a totally invisible keystroke recorder! While the demo version might be detected by some antiviruses, all registered clients get the special version of iSafe Keylogger which cannot be detected and is daily updated for them.
  • Advanced keylogger software allows you to secretly capture all key press activities of computer users and automatically deliver the logs to specified email address. Download keystrokes surveillance utility is windows compatible and record all the keyboard activities used for various windows application (word, excel, notepad and many more) and capture typed visited website URLs in password protected log file with date, time and session. If you need to track PC activities of your child, spouse and employees in your absence! You can detect everything that is typed on keyboard with the help of keylogger tool. Stealth keystroke recorder tool records all key press activity like visited website URLs, search engine keywords, user name, password, emails, forms, document printed, text and images sent to the clipboard, accessed application, voice chat records, every keystrokes with special keys in password protected log file and save this log file for future use. Untraceable key logger utility does not show in start me ...
  • Invisibe Keylogger will let you monitor what people you share your computer with type when you are away. Working in the background, Invisible Keylogger will record every keystroke a user makes in every application and save it to a text file. In Stealth mode, the program is totally invisible to other people who are not aware their computer activity is monitored.
  • Invisibe Keylogger will let you monitor what people you share your computer with type when you are away. Working in the background, Invisible Keylogger will record every keystroke a user makes in every application and save it to a text file. In Stealth mode, the program is totally invisible to other people who are not aware their computer activity is monitored.
  • Windows keylogger software is the most powerful PC surveillance application, which will record all keystrokes typed using keyboards. Best keylogger utility can obtain confidential data like login details, passwords, chat history, instant messaging emails and inserted text by intercepting keystrokes. Keystroke logging software runs hidden in the background and automatically records all keystrokes. Internet spy software offers detailed information on who uses your computer, their e-mails and chat conversations, the visited web sites. Hidden keylogger can secretly capture information on your PC without the possibility of being detected by the user. Parental control software provides the best possible solution for homes, families, small and middle offices, as well as big companies with the need to monitor hundreds of employee. Keystroke monitoring tool record not only 'simple' keystrokes, but file operations, visited web-sites, clipboard information, monitor outgoing and incoming e-mails etc. It ...
  • Professional keylogger software easily monitors each and every single typed character including Alt, Del, Tab, Ctrl, functional keys (F1-F12), special keys ( @, #, $, &, % ) and other similar characters entered by unwanted user on your computer keyboard without taking your permission. Best keylogger 2010 utility is reliable and efficient tool for business organization to closely track whole activity of employees activities executed on office PC while you are busy in meetings. Hidden Family Key logger application is used to check the online details like chatting on (Yahoo, Orkut, Face book, AIM) messenger or misusing of internet on your desktop/laptop by children, spouse, neighbor, friends and relatives in your absence. Keylogger program is versatile software and remains invisible on add/remove program menu, task manager, control panel, installation folders and on desktop so external user cannot aware of its existence in your computer system. Invisible Key logger software always set hot key combination ...

Page 13 of 30
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30


Legal disclaimer | Privacy policy

© 2004-2015 IT Shareware