Home | Submit a file  |  New  |  Categories  |  Our awards  |  Link to us  |  RSS Feeds

Utilities :: Security & Encryption
Sort by: date | product title | rating | downloads | popularity
Display: short descriptions | full descriptions
  • SafeWallet password manager and password management solution is the most secure and easy to use password manager. It offers smart browser integration ensures you do not have to do anything to stay safe. SafeWallet Password Manager works while you browse. Detecting, saving and filling login and password information in a highly secure and intuitive manner. Never be at risk again, SafeWallet password manager will always protect you!
  • jiji self service password resetl,In this the end-users can securely reset their own Active Directory passwords without having to involve highly technical helpdesk professionals. Gartner states that 30% of helpdesk queries are related to password resets management and account lockout. With Self Service Password Reset end-users no longer have to wait for a member of the helpdesk staff to reset their forgotten or lost password
  • www.freewarekeylogger.org software helps in monitoring apple Mac operated computer system with options to trace all records like internet history, searches, clipboard activity and keystrokes with USB device insertion and removal easily. Keylogger also facilitates to take screenshot of computer at regular time duration and also keep log files with advance options to run programs in silent mode so user can?t modify programs or setting. Monitoring tool provides simplest way to record computer history with complete email-password details and also traces clipboard database without any expert professional knowledge. Employee monitoring tool for Mac os x is capable to trace your computer and internet activity without being notified. Activity record software is best tool available on internet for monitoring purpose at offices, home, cyber café and other work places with support of silent mode. Activity tracing program is not stored on desktop icons, starts up menu, install/uninstall list so unauthorized user?s are no ...
  • SpyPal PC Spy secrectly logs Facebook activities, keystrokes, websites visited, emails, Windows Live Messenger (MSN), Yahoo Messenger, Skype, clipboard, user names, passwords, applications run and more. In Stealth Mode, it is completely invisible to computer users. You can use hotkey and password to access the program. Automatically sends logs to a preset email or ftp. Possible usages: monitors employees, children, spouse and investigat
  • Facebook Activity Spy secrectly logs all Facebook use, keystrokes, web visits, emails, chats & IMs: Windows Live Messenger, Yahoo Messenger, Skype and other IMs. It logs applications, documents, clipboard, user names, passwords, video talk, video played and more. It also takes screenshots at every X seconds like a surveillance camera. It runs invisibly so that monitored users won't know it. You can receive log reports remotely via email
  • Leawo SWF Encrypt is a professional SWF Protector designed to protect Flash SWF files from being decompiled by SWF decompilers or Flash Decompiler tools. With Advanced Obfuscation Techniques and proven Encryption Technology, Leawo SWF Encrypt could act as an ActionScript Obfuscator to obfuscate the ActionScript of your SWF flash files so as to secure and protect SWF ActionScript files, and prevent from SWF Reverse Engineering and Decompiling.
  • Estelar Lock a Folder Tool is a powerful file and folder password protection software that offers advanced security solution to take control on your private files, folders, and other Windows resources. This file and folder password protection software can be used to protect your data and stops other unwanted users accessing your data. Using the folder security system you can also protect your data on other removal storage devices such as pen drive external portable hard drive. Once your files or folder are protected using Estelar Lock A Folder software then no one can access such folder and files with knowing the correct password. How to Use this advanced File and folder Password Protection Software? Step One: Run Lock a Folder - After installing the software go to 'Start menu > Programs > Estelar Lock a Folder from there choose Lock Files & Folders Step Two: Browse a Folder or File - Click on the "Add Folder or File" icon to import the folder ...
  • Encrypt and convert ppt to exe with password protected, support microsoft powerpoint ppt, pps, pot. the encrypted file can only be opened when an Open Password is provided (PC-binding or Non-PC-binding), Only you can create open password for your users. your users can run the encrypted self-running ppt without Microsoft PowerPoint installed. The encrypted file support One Computer One Password license to your users.
  • PC Spy Monitor secretly monitors Facebook, chats, emails, keystrokes, passwords and sends reports to your email or ftp. It logs Windows Live Messenger, Skype, Yahoo Messenger and other IMs. It also takes photo shots of online video talk like a surveillance camera. PC Spy Monitor runs so stealthily that the monitored user won't even know it. You can use hotkey to unhide it and change settings. It is a must have tool for you to reveal the
  • Active Directory Reports enables Active Directory computer Reports Active Directory OU Reports Active Directory User Reports Active Directory Group Reports Active Directory NTFS Reports Active Directory Passwords Reports Active Directory user logon Reports Active Directory GPO Reports for account lockout policy AD Reports for Last log on
  • Kid Key Logger Pro is a powerful, fully featured, keylogger, specifically designed for parents to record their children activity, while they let them play on their computers. Kid Key Logger Pro can log keystrokes, mouse and windows events ans also capture screenshots of your desktop. Log files can be written to disk, emailed or uploaded on a server. The key logger can be remote-controlled from another PC or from an Android device.
  • Spyrix Personal Monitor is a software for hidden monitoring of all types of user activity: Keystrokes logging (including passwords), Screenshots capture, Clipboard monitoring, Apps monitoring, Internet activity including social networks like facebook, google plus, linkedin, Skype, Microsoft Live Messenger,ICQ, Google Talk, search engines activity(google, bing and yahoo). Spyrix Personal Monitor send all logs via email, ftp or local network
  • When you send email messages, Internet Service Providers (ISP) usually store the messages on their mail servers before they try to deliver them. This can be a major risk for you because your relevant information can be viewed and printed on that end, and someday used against you. Email Security sends your email messages directly to recipient mailboxes without leaving any traces on the Internet.
  • Invisible messenger spy software that records all Yahoo! Messenger incoming and outgoing chat text. Send reports to your custom email address or ftp. You can check all recorded messages by simply receiving emails or opening a web page. Use hotkey to unhide it from Stealth Mode and protect program access by password. Perfect for catching cheaters, monitoring employees, children or spouse, and even investigating crimes.
  • Fast create strong passwords. Store and manage passwords. Support all programs and internet browsers. Easy to use. Supported operating system: Windows 2000, Windows XP, Windows 2003, Windows Vista.
  • Stealth Parental Control offers a complete Internet Monitoring and Parental Control Software solution. Stealth Parental Control can secretly record information on your computer and allows you to specify what days and hours your children may access the computer, internet or any game on your system! Our advanced stealth technology ensures that Stealth Parental Control remains completely hidden from everyone except you.
  • Data Protecto is the world's best file encryption software for your computers which also features the most Secure Online Cloud Storage Service with Encrypted File Sharing with your friends. Data Protecto has 9 of the most advanced data protection features to protect their files, folders, drives, and applications from unauthorized access, use, and sharing. Data Protecto consistently protects your data in SAFE MODE, and runs in Stealth Mode.
  • SpyPal Invisible Spy secrectly records Facebook, keystrokes, screenshots, websites visited, windows opened, applications, MSN, ICQ, AIM, Yahoo IM, Skype, clipboard, passwords, emails, documents and more. In Stealth Mode, it is completely invisible to computer users. Use hotkey and password to access the program. Auto send logs to a preset email or ftp at set interval. Usages: monitors employees, children, spouse and investigate crimes.
  • Password management with synchronization. SecuStar administrates your passwords safely and clearly. Furthermore SecuStar can synchronize between several PCs, so you have access to your passwords from all the devices you are working with. SecuStar stores your password data using the AES-256 algorithm, which is approved in the U.S. for state documents classified top secret.
  • Yahoo Messenger Spy Monitor secretly records all Yahoo Messenger incoming and outgoing instant messages. It sends logs to your custom email or ftp. You can check all records by simply receiving emails or opening a web page. Use hotkey to unhide it from the Stealth Mode and protect program access by password. Perfect for catching cheaters, monitoring employees, children or spouse, and even investigating crimes.
  • Laptop lid controller will increase your laptop security -- it will lock laptop when you close it. Also, it can suspend/shutdown the computer after specified time, play the sounds and execute applications. Different schemes for different power sources. The auto-mute option makes your PC silent when it going to sleep/suspend mode, turning off or while desktop locked. Also, the sound is automatically muted when the screensaver appears.
  • www.usbsquad.com enable users to prominently capture overall information including USB removable mass storage devices plug in and plug out activities done on client machine even network cable on machine is unplugged or network connection is accidentally broken. Highly interactive USB Port Blocker utility allow users to save record entire client machine information at user defined location in computer system or laptop for future reference and can be viewed by them whenever required. Graphical user interface facilitates users with advanced feature to frequently work with USB data protection tool for windows network without having any specialized technical knowledge or professionally expert guidance for operating. USB device activity monitoring software is available with enhanced feature it informs server with beep alert when any removable media device is inserted or removed to client machine. USB device activity monitoring Application for Windows network is beneficial for different sectors including software co ...
  • Power PC Keylogger secretly logs Facebook, keystrokes, chats, IMs, emails, websites visited, microphone, video talk, logins, passwords, applications, searches, documents and more. Logs Skype, Yahoo Messenger, MSN, ICQ, AIM, etc. Takes screenshots every x seconds like a spy cam. Sends logs to your email. You can check logs on a remote PC, tablet, smart phone, or directly on the monitored PC. Perfect for monitoring employees, kids and spous
  • PCBooster Free Keylogger provides you the ability to secretly capture all keystrokes to keep your employees, kids & spouse in check. Just launch it in the computer you have access to and it will, in real-time, record the words typed, the webpage visited and even the program used. With the detailed report, you won't miss any keystroke happened. Most of all, it can work silently in hidden mode, making your monitoring invisible.
  • Keylogger secretly logs all Facebook use, keystrokes, chats & IMs, emails, web visits, video talk, microphone, user names, passwords, searches and more. It records instant messenger, such as Skype, Windows Live Messenger, Yahoo Messenger, ICQ and others. It takes screenshots like a surveillance camera. Runs silently and monitored users won't know it. Log reports will be sent to you via email or ftp.

Page 13 of 30
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30


Legal disclaimer | Privacy policy

© 2004-2014 IT Shareware