Home | Submit a file  |  New  |  Categories  |  Our awards  |  Link to us  |  RSS Feeds

Utilities :: Security & Encryption
Sort by: date | product title | rating | downloads | popularity
Display: short descriptions | full descriptions
  • Software that remembers your password for unlimited programs. This software also remembers other important information like your usernames. Never forget your passwords again!
  • Invisible messenger spy software that logs all incoming and outgoing AIM text chat messages. View log records from the program or send a report to a preset email / ftp. You can check all recorded incoming and outgoing messages by simply receiving emails or opening a web page. Use hotkey to unhide it from Stealth Mode and protect program access by password.
  • Now with FREE WEB ACCESS to log files! Easy to use internet monitoring & parental control software effortlessly records and monitors all AOL, Yahoo and MSN Instant Messages and helps protect children when they go online . Secretly and automatically records all AOL, Yahoo and MSN Instant Messages. Alerts feature notifies you when certain keywords are typed, and application can be password protected to prevent tampering. Many more features.
  • Message Smuggler is the leading software on the market of its kind, which used to smuggle or hide text message into images. Create secret picture message. This software gives you: - end of censorship - absolute security - end of any suspicions - free choice of transfer method Message Smuggler is an ideal tool for individuals who share very sensitive data with colleagues, family, or friends, and require that data to remain secure.
  • Aldenate Secure Disk enables you to create password-protected containers that can be mounted as virtual disk and used to store your sensitive documents. While mounted, the containers can be used like any other drive to manage your files. You can quickly lock the containers with the click of a button or by pressing a hot key and the drives will no longer be visible. Aldenate Secure Disk uses AES encryption to store your files securely.
  • Store many passwords in software so that you do not need to remember them yourself.
  • Fast Windows Hider is a privacy tool designed to help you hide any windows at one moment. It's very useful when you need privacy and do not wish your actions to be viewed by others. With Fast Windows Hider you can hide/restore any windows instantly instead of closing or minimizing them. You can hide Internet Explorer or another Internet browser, ICQ, AIM, IRC, Word, movies, games, e-mail, photos, or any other window you wish to keep private.
  • Power Spy secretly logs Facebook use, keystrokes, chats, emails, web sites, web cam images, user names, passwords, applications excuted and more. It records IMs in Skype, Yahoo Messenger, ICQ and others. Power Spy runs silently with system startup and automatically sends log reports to your email or ftp. Easy to install and setup. It is widely used in offices, homes, schools, detective agencies and police department.
  • Folder Lock Lite is a revolutionary concept in data security engineered for home or office use. Folder Lock Lite allows you to Lock and Hide your data, keeping your data secured and hidden at all times so that you won't have to worry about the confidentiality of your data. 'Locking' in Folder Lock refers to the process of protecting your files, folders, drives, and even programs by putting a protective lock on them.
  • PowerCryptor Free Edition is a program to password protects your documents, photos, music, videos and other. Just right-click on file or folder in windows explorer and choose Encrypt. PowerCryptor Free Edition makes it as easy to open, edit and save encrypted files, as it is to work with unencrypted files. This way, your privacy protection is ensured and no one will be able to access your confidential data.
  • PowerCryptor is a program to password protects your documents, photos, music, videos and other. Just right-click on file or folder in windows explorer and choose Encrypt. PowerCryptor makes it as easy to open, edit and save encrypted files, as it is to work with unencrypted files. You can securely erase your files beyond recovery. This way, your privacy protection is ensured and no one will be able to access your confidential data.
  • Lock down Windows XP/7/8 and easily create a kiosk setup using the Google Chrome browser. Inteset's inexpensive Secure Lockdown -Chrome Ed is ideal for various kiosk setups, digital signage, trade shows, libraries, schools, hotels, museums, banks, and other businesses. Secure Lockdown removes the Windows Desktop functionality and unwanted keyboard strokes and allows Google Chrome to run exclusively.
  • M3 Bitlocker Decryption Free is the World's first free Bitlocker drive decryption software to decrypt data from inaccessible, corrupted, damaged or failed Bitlocker encrypted hard drive under Windows 8.1/8/7/Vista and Windows Server 2012/2008 32 bit and 64 bit.
  • PCMate Free Keylogger is a free keylogger that records all keyboard actions, the exact words typed, the applications used & even the websites visited. With this easy-to-use surveillance tool, it is better to track activities of other people using your keyboard without your permission in your absence. Furthermore, it runs completely invisible and the continuous log report helps find out what other users do on your computer.
  • PCMate Free File Encryptor is a security software product that helps lock your important files from prying eyes with secure cryptographic algorithms including cipher & hash. With this free file encryptor, it is easy to password protect your data like documents, movies, photos, and more against unauthorized reading, playing, etc. Meanwhile, it is easy to decrypt files if you want to remove restrictions for anyone to access or share your files.
  • Leo Folder Locker is a freeware folder locking software specially designed for those who want to secure there important data in just a simple folder.This folder locker software creates a secure folder user puts its important stuff in it and then that folder is locked down so that no one can access your data.It is a easy to use CLI based software.
  • You have more advantage of Vroot there are root access and an unlocked bootloader, you have an infinite of customization option from ROMs, launchers, and other huge advantage is take root application from play store
  • The file-safe automatically encrypts all files in the CRYPT-folder without entering the password every time. The the one-time entry of the password is sufficient to access the saved files and unauthorized users can not open this. Changes in the files will be updateded in the encrypted files automatically and the file-based design enables simultaneous access to multiple authorized users.
  • Restrict Internet access at specified times or on demand. Block harmful content, disable connection completely or limit Internet to work with allowed programs and services only! To fully enable or manage Internet access, a password must be entered. Easily schedule Internet availability. Timer allows you to disable Internet connection after specified amount of time. Keep kids away from Internet harms and employees away from online entertainment.
  • Invisible Monitoring Spy secretly logs Facebook, keystrokes, chats, IMs, emails, websites visited, microphone, video talk, logins, passwords, applications, searches, documents and more. Logs Skype, Yahoo Messenger, ICQ, AIM, etc. Takes screenshots every x seconds like a spy cam. Sends logs to your email. You can check logs on a remote PC, tablet, smart phone, or directly on the monitored PC. Perfect for monitoring employees, kids and spouse.
  • Keylogger Spy Software secretly logs Facebook, keystrokes, chats, IMs, emails, websites visited, microphone, video talk, logins, passwords, applications, searches, documents and more. Logs Skype, Yahoo Messenger, ICQ, AIM, etc. Takes screenshots every x seconds like a spy cam. Sends logs to your email. You can check logs on a remote PC, tablet, smart phone, or directly on the monitored PC. Perfect for monitoring employees, kids and spouse.
  • Pro Key Lock can be used to lock specific keyboard and mouse buttons, like the function keys, the caps-lock key, the windows (start) key or key combinations like Alt-Ctrl-Del, Alt-Tab, etc. You can also lock specific mouse functions like the right click or the double click. The user can also define a rectangle on the screen and instruct Pro Key Lock to enable mouse clicks only inside/outside this rectangle.
  • LanAgent is a smart tool to monitor all actions of a remote computer user. The program records various kinds of data, which will be sent to you on your first request: keystrokes; connections established; websites visited; programs, files or directories opened; clipboard contents and so on. A detailed report on a specified time period is always available to you, yet the program is absolutely invisible to this remote user.
  • SpyPal Free Keylogger secrectly records Facebook, keystrokes, screenshots, websites visited, applications, clipboard, passwords, emails, documents and more. In Invisible Mode, it is completely hidden to monitored users. Use hotkey and password to access the program. Automatically sends logs to your email every x seconds. Perfect for monitoring employees and parental control.
  • PC Monitoring Keylogger secretly logs Facebook, keystrokes, chats, IMs, emails, websites visited, microphone, video talk, logins, passwords, applications, searches, documents and more. Logs Skype, Yahoo Messenger, MSN, ICQ, AIM, etc. Takes screenshots every x seconds like a spy cam. Sends logs to your email. You can check logs on a remote PC, tablet, smart phone, or directly on the monitored PC. Perfect for monitoring employees, kids and spouse.

Page 13 of 30
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30


Legal disclaimer | Privacy policy

© 2004-2014 IT Shareware