Home | Submit a file  |  New  |  Categories  |  Our awards  |  Link to us  |  RSS Feeds

Utilities :: Security & Encryption
Sort by: date | product title | rating | downloads | popularity
Display: short descriptions | full descriptions
  • Access Forbidden provides a quick, secure and easy way to lock the access to your computer and protect the screeen from prying eyes. Access Forbidden instantly locks the computer with a user defined password or using a "key drive" (a pendrive or other removable drive). The PC will be unlocked entering the password or inserting the key drive. Access Forbidden enables the user to easily prepare a standard removable drive that will be used as an "hardware key". Just one click on the system tray icon and you can leave the PC without worries! Enter your password and the computer returns under your control instantly. Lock the access to your desktop without interrupting other computer activities (running programs, active downloads, mail delivering/reception, chats, scheduled tasks, and so on...). Exclusive feature: use a USB pendrive to lock/unlock the computer! Simply plugging/unplugging the pendrive, whithout the need to click or enter the password. Access Forbidden is ...
  • AWinware PDF Encryption software is fast and affordable solution for encrypting bulk pdf files with user defined owner password. Software permits to add pdf open password also known as user password. Tool can apply security with two level of encryption: 40 bit RC4 and 128 Bit RC4. User can also restrict pdf printing, copying, form filling, content copying for accessibility, signing and commenting. Thus tool can be also be used to set various security restrictions. Trial version adds watermark on output pdf documents which can be removed by registering the product. Batch pdf protection software applies both user as well as owner password in a single click. Download free pdf locker software to test and evaluate by locking pdf file. Features: # Software supports Windows XP, Vista and Windows 7 operating system including 32 bit and 64 bit. # Tool provides two level of encryption security including 40 bit and 128 bit RC4. # Software provides pdf right click context menu option as short cut. # Software is ava ...
  • SterJo Portable Firewall PRO is device designed to prevent outsiders from accessing your network even if it is run from a USB drive. The unit serves as the single entry point to your network and evaluate all TCP connections requests as they are received comparing them with each rule in the policy. This is advanced easy-to-use software with ability to watch for all ports on your system and block them if necessary. - Activity provides a real-time view of the open connections through the firewall. - The policy editor is used to define a security policy where connections requests from unauthorized ip addresses and ports are rejected. - Log provides data connection notes that can be used for prosecuting the potential attackers. - History tab gives you detail information about permitted connections and failed attempts.
  • Professional PC surveillance software helps parents to monitor their kid?s internet activities when they are away. Economical keystroke recorder program records every change made to desktop configuration and sound clips. Advanced keyboard monitoring software covertly records login session details of each secondary user. Affordable PC surveillance utility is protected by password facility and allows only legal user to access software settings. Application saves activities executed on computer like clipboard entries, chat conversations, username etc in encrypted log file. Advanced keylogger program has advanced feature to capture screenshots of all Window applications opened by subsidiary user. Professional keystroke recorder awares you about entire PC activities performed in your absence. Easy to use keyboard monitoring utility delivers generated log file at user specified email ID using FTP server settings. Software is invisible from all observable areas on laptop, desktop including start menu, add or remove ...
  • idoo Secure Disc Creator can burn data onto cd or dvd disc.The disc made by it can be normal data disc,can be encrypted data disc,can have both secure area and public area. idoo Secute Disc Creator your can burn password-protected and encrypted discs. It supports most of CD DVD, if you have a recorder and you want to burn an portable encrypted disc.
  • idoo USB Encryption is powerful USB encryption software, it encrypt usb disk partition , encrypt file on usb flash drive. especially designed to create password protected USB memory sticks. It creates protected areas on the disk that is needed to enter password to see contents.
  • Now use Protect PDF copying program to comfort every users who need to protect pdf from copying, protect pdf copying, protect pdf from being copied. Protect PDF Copying allow users to protect pdf text & images from being copied by unauthorized users. With Protect PDF Copying program you can quickly apply user password & protection to PDF files of Acrobat version up to 9.
  • Snappy Program Lock is a professional security tool for password protecting programs on your computer, laptop or usb drive. Easily add programs to restrict access to by browsing your computer for the exe file or simply drag and drop a shortcut or program to the blocked application list. Not only does it deny access to programs, it also keeps a history log containing application access information. Works with Windows 7, Vista, XP, 2003, 2008.
  • Know what your employee do on their computer and how they utilize their working hours with network PC monitor tool. It helps to monitor activities of multiple computers from a centralized location. Download the free evaluation version to monitor the activities on a single computer for 7 days and schedule recording for 5 minutes
  • Creates a virtual encrypted disk within a file and mounts it as a real disk. Supports Smartcards and Software Certificates
  • Report compute usage allows you to simplify and optimize large volume of information, and get quick access to all the processes running on your computer while it works. When you work at PC, you use a lot of programs or web pages. With Report computer usage you can see which sites your child visits, or which program your employee uses. You can find out the name of the processes you are using or you have used.
  • Using computer activity monitor tool you can easily know what your employees actually do in working hours. You can also save all activities that are happening on their computers and keep them for future reference. Download the free evaluation version of the software that allows you to monitor single computer for 7 days and lets you record the user activities for 5 minutes.
  • DoSWF can do encrypt, obfuscate to swf files. It has featrues as following: 1.Encrypt swf, protect your actionscript and assets. 2.Obfuscate actionscript3.0 code. 4.Encrypt swc files.
  • Keylogger Spy Software can secretly record all keystrokes typed on your computer. It runs completely invisiblely. You can check log reports by simply receiving emails or opening a web page. Keylogger Spy Software is perfect for catching cheaters, monitoring employees, children or spouse, acquiring others' passwords and even investigating crimes. Use hotkey to unhide it from Stealth Mode and protect the program access by password.
  • 1.Steady and Safe Program Wondershare Privacy Protector has a smart search engine as well as good compatibility. It scans for target histories precisely and doesn?t involve other files that are not defined as safe ones so that your computer will not crash because of using this program. 2.Simple but Effective Operation Wondershare Privacy Protector is an easy-to-use tool and will do all cleaning job by just a few mouse clicks. 2.1Click Start Scan; 2.2Click Start Cleanup and confirm. Then all is done! Your privacy will be never revealed since! 3.Windows History Cleaner Clean up history left on Start Menu and Desktop?Recycle Bin, Document history, Find and search history, run history, etc; Operation trace of Windows system?Clipboard, Windows & System temporary files, Memory dumps, etc; And history of recent computer activities?Paint recent file list, Last opened registry, Windows Media Player history and many more others. 4.Browser History Cleaner Clean history of dominant browsers?IE (and ...
  • Protecting your computer from malicious attacks over the Internet is essential and an anti-virus program alone is simply not enough. An intrusion prevention system such as DefenseWall Personal Firewall will completely solve the problem of infection by malicious software. However, unlike other solutions, this is the world's first sandbox firewall, designed to be easy to use and requiring no complicated setup or configuration process.
  • SpyPal For Home secrectly records keystrokes, screenshots, websites visited, windows opened, applications, MSN, ICQ, AIM, Yahoo! IM, Skype, clipboard, passwords, emails, documents and more. In Stealth Mode, it is completely invisible to computer users. Use hotkey and password to access the program. Auto send logs to a preset email or ftp at set interval. Possible usages: monitors employees, children, spouse and investigate crimes.
  • CryptBox creates secure Safes, that can be used just like normal drives and which can be filled with yur data. All content of those safes are encrypted. Safes can only be opened if you know the password. More and more personal data is saved on PCs. Documents, Letters, Photos and even monthly statements of accounts are often stored in an unprotected way.
  • Power Spy For Office secrectly logs all keystrokes, web sites, emails, chats & IMs: MSN Messenger, Windows Live Messenger, ICQ, AOL Messenger, AIM, Yahoo! Messenger, Windows Messenger and Skype. Takes screen snapshots at every X seconds like a surveillance camera. Displays exact activities, like MySpace, Facebook, PC games, online searches & shopping, file transfers and webmails. You can receive reports remotely via emails or ftp.
  • Access Control is a advanced and flexible system for the control of the staff working hours usage in a network or on a terminal server. There are many of the programs to solve a similar problems. Part from them - simply spyware programs intended first of all for capturing of userís keystrokes, passwords and various messages.
  • Steel USB Sentry offers an simple yet effective control of portable media usage in the corporate network. It helps in preventing data theft and cyber crime possibilities through misuse of corporate data. Steel USB Sentry effectively keeps a tight control of the portable media usage by preventing the users from copying confidential data from their workstations. Steel USB Sentry prevents users from using portable media in the workstations
  • PureSurf Desktop with Active Content Recognition technology offers complete Internet coverage by scanning pages in real-time and categorizing content as Adult, Gambling, Violence, Weapons, Hate, Drugs, Dating, Chat, Forums, Social Networks, Blogs, and more. You choose which categories are not allowed to define the online experience you want for your children.
  • Delete files forever so that they can never be recovered.
  • Monitor other computer users activity without their knowledge. Computer Spying Keylogger utilizes state of the art tracking to secretly monitor children, spouse, employees and more.
  • Automatically clear the list of files found under Documents at specified intervals. Clearing can be set to occur every 30 seconds, 1 minute, 5 minutes, 30 minutes, 1 hour, etc. This application sits in the system tray at the bottom right corner of the screen.

Page 13 of 30
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30


Legal disclaimer | Privacy policy

© 2004-2014 IT Shareware