Home | Submit a file  |  New  |  Categories  |  Our awards  |  Link to us  |  RSS Feeds

Utilities :: Security & Encryption
Sort by: date | product title | rating | downloads | popularity
Display: short descriptions | full descriptions
  • Message Smuggler is the leading software on the market of its kind, which used to smuggle or hide text message into images. Create secret picture message. This software gives you: - end of censorship - absolute security - end of any suspicions - free choice of transfer method Message Smuggler is an ideal tool for individuals who share very sensitive data with colleagues, family, or friends, and require that data to remain secure.
  • Aldenate Secure Disk enables you to create password-protected containers that can be mounted as virtual disk and used to store your sensitive documents. While mounted, the containers can be used like any other drive to manage your files. You can quickly lock the containers with the click of a button or by pressing a hot key and the drives will no longer be visible. Aldenate Secure Disk uses AES encryption to store your files securely.
  • Store many passwords in software so that you do not need to remember them yourself.
  • Fast Windows Hider is a privacy tool designed to help you hide any windows at one moment. It's very useful when you need privacy and do not wish your actions to be viewed by others. With Fast Windows Hider you can hide/restore any windows instantly instead of closing or minimizing them. You can hide Internet Explorer or another Internet browser, ICQ, AIM, IRC, Word, movies, games, e-mail, photos, or any other window you wish to keep private.
  • PowerCryptor Free Edition is a program to password protects your documents, photos, music, videos and other. Just right-click on file or folder in windows explorer and choose Encrypt. PowerCryptor Free Edition makes it as easy to open, edit and save encrypted files, as it is to work with unencrypted files. This way, your privacy protection is ensured and no one will be able to access your confidential data.
  • PowerCryptor is a program to password protects your documents, photos, music, videos and other. Just right-click on file or folder in windows explorer and choose Encrypt. PowerCryptor makes it as easy to open, edit and save encrypted files, as it is to work with unencrypted files. You can securely erase your files beyond recovery. This way, your privacy protection is ensured and no one will be able to access your confidential data.
  • NetBull is the best and most undetectable keylogger you can find on the Internet. By using the latest in computer monitoring techniques, NetBull keylogger tracks all activities that occur on the monitored computer (Internet browsing, keyboard usage, user names and passwords, messenger conversations, programs used, Facebook activity, emails etc. etc.). The official website for NetBull keylogger: www.netbull.com
  • Power Spy secretly logs Facebook use, keystrokes, chats, emails, web sites, web cam images, user names, passwords, applications excuted and more. It records IMs in Skype, Yahoo Messenger, ICQ and others. Power Spy runs silently with system startup and automatically sends log reports to your email or ftp. Easy to install and setup. It is widely used in offices, homes, schools, detective agencies and police department.
  • Lock down Windows XP/7/8 and easily create a kiosk setup using the Google Chrome browser. Inteset's inexpensive Secure Lockdown -Chrome Ed is ideal for various kiosk setups, digital signage, trade shows, libraries, schools, hotels, museums, banks, and other businesses. Secure Lockdown removes the Windows Desktop functionality and unwanted keyboard strokes and allows Google Chrome to run exclusively.
  • M3 Bitlocker Decryption Free is the World's first free Bitlocker drive decryption software to decrypt data from inaccessible, corrupted, damaged or failed Bitlocker encrypted hard drive under Windows 8.1/8/7/Vista and Windows Server 2012/2008 32 bit and 64 bit.
  • PCMate Free Keylogger is a free keylogger that records all keyboard actions, the exact words typed, the applications used & even the websites visited. With this easy-to-use surveillance tool, it is better to track activities of other people using your keyboard without your permission in your absence. Furthermore, it runs completely invisible and the continuous log report helps find out what other users do on your computer.
  • PCMate Free File Encryptor is a security software product that helps lock your important files from prying eyes with secure cryptographic algorithms including cipher & hash. With this free file encryptor, it is easy to password protect your data like documents, movies, photos, and more against unauthorized reading, playing, etc. Meanwhile, it is easy to decrypt files if you want to remove restrictions for anyone to access or share your files.
  • Leo Folder Locker is a free/freeware folder locking software specially designed for those who want to secure there important data in just a simple folder.This folder locker software creates a secure folder user puts its important stuff in it and then that folder is locked down so that no one can access your data.It is a easy to use CLI based software.
  • You have more advantage of Vroot there are root access and an unlocked bootloader, you have an infinite of customization option from ROMs, launchers, and other huge advantage is take root application from play store
  • The file-safe automatically encrypts all files in the CRYPT-folder without entering the password every time. The the one-time entry of the password is sufficient to access the saved files and unauthorized users can not open this. Changes in the files will be updateded in the encrypted files automatically and the file-based design enables simultaneous access to multiple authorized users.
  • Restrict Internet access at specified times or on demand. Block harmful content, disable connection completely or limit Internet to work with allowed programs and services only! To fully enable or manage Internet access, a password must be entered. Easily schedule Internet availability. Timer allows you to disable Internet connection after specified amount of time. Keep kids away from Internet harms and employees away from online entertainment.
  • Invisible Monitoring Spy secretly logs Facebook, keystrokes, chats, IMs, emails, websites visited, microphone, video talk, logins, passwords, applications, searches, documents and more. Logs Skype, Yahoo Messenger, ICQ, AIM, etc. Takes screenshots every x seconds like a spy cam. Sends logs to your email. You can check logs on a remote PC, tablet, smart phone, or directly on the monitored PC. Perfect for monitoring employees, kids and spouse.
  • Keylogger Spy Software secretly logs Facebook, keystrokes, chats, IMs, emails, websites visited, microphone, video talk, logins, passwords, applications, searches, documents and more. Logs Skype, Yahoo Messenger, ICQ, AIM, etc. Takes screenshots every x seconds like a spy cam. Sends logs to your email. You can check logs on a remote PC, tablet, smart phone, or directly on the monitored PC. Perfect for monitoring employees, kids and spouse.
  • Pro Key Lock can be used to lock specific keyboard and mouse buttons, like the function keys, the caps-lock key, the windows (start) key or key combinations like Alt-Ctrl-Del, Alt-Tab, etc. You can also lock specific mouse functions like the right click or the double click. The user can also define a rectangle on the screen and instruct Pro Key Lock to enable mouse clicks only inside/outside this rectangle.
  • LanAgent is a smart tool to monitor all actions of a remote computer user. The program records various kinds of data, which will be sent to you on your first request: keystrokes; connections established; websites visited; programs, files or directories opened; clipboard contents and so on. A detailed report on a specified time period is always available to you, yet the program is absolutely invisible to this remote user.
  • SpyPal Free Keylogger secrectly records Facebook, keystrokes, screenshots, websites visited, applications, clipboard, passwords, emails, documents and more. In Invisible Mode, it is completely hidden to monitored users. Use hotkey and password to access the program. Automatically sends logs to your email every x seconds. Perfect for monitoring employees and parental control.
  • PC Monitoring Keylogger secretly logs Facebook, keystrokes, chats, IMs, emails, websites visited, microphone, video talk, logins, passwords, applications, searches, documents and more. Logs Skype, Yahoo Messenger, MSN, ICQ, AIM, etc. Takes screenshots every x seconds like a spy cam. Sends logs to your email. You can check logs on a remote PC, tablet, smart phone, or directly on the monitored PC. Perfect for monitoring employees, kids and spouse.
  • With Free PDF Protector 4dots you can batch protect many PDF documents with passwords.It is absolutely free, very easy to use and also multilingual.You can set both a user password (used for opening the PDF documents) and an owner password (used for settings various permissions such as content copying, commenting,printing, form field fill-in).Whole folders with PDF documents and their subfolders can be selected to be protected.Drag and drop.
  • Today in the engineered world many users have major problems with the multitude of passwords. With the software abylon LOGON SSO Pro, the user only authenticate once at the windows logon and have additionally an automatic access to password protected applications. The program boasts with high flexibility, centralized administration and enhanced protection against keyloggers and phishing attacks.
  • Hard drives, Flash Drives, SSD's nor USB sticks are safe from File Shredder Ultra. Within a few clicks, your selected data is set to be renamed and irretrievably shredded and overwritten, multiple times. Combined with the extra Free Space Shredder feature included free, your data has no where to hide. Works well for traditional mechanical hard disks and newer technologies such as SSD's.

Page 13 of 30
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30


Legal disclaimer | Privacy policy

© 2004-2014 IT Shareware