Home | Submit a file  |  New  |  Categories  |  Our awards  |  Link to us  |  RSS Feeds

Utilities :: Security & Encryption
Sort by: date | product title | rating | downloads | popularity
Display: short descriptions | full descriptions
  • Active Invisible Keylogger Home - This is the best choice for you if you think that others are using your computer when you are not home or away from your working place. After you install Active Invisible Keylogger Home on your computer, it will allow you to make program settings for tracking activities on your computer.If you enable "Run Active Invisible Keylogger Home in Stealth Mode" then the program will run by full stealth for others, no one
  • WinUtilities Free History Cleaner is an Internet Eraser that protects your Internet privacy by cleaning up all the tracks of Internet and computer activities. WinUtilities Free History Cleaner supports popular web browsers such as Internet Explorer, Mozilla Firefox, Google Chrome, AOL, Opera and MSN Explorer. WinUtilities Free History Cleaner supports free plug-ins to extend cleaning features, you can easily erase the tracks left by any app....
  • Spyrix Free Parental Control gives parents full control over children computer. Any parent without depth knowledge of computers can easily block access to the sites by several ways: blacklist of prohibited sites, blacklist of sites categories (e.g. adult, dating), blocking access on keywords blacklist (e.g. porn, sex, drugs). Spyrix Free Parental Control can not only block sites but provides powerful tools for detailed monitoring of child's activ
  • OX Mobile Spy is a faithful and advanced mobile phone spying program for users to locate and track mobile GPS location, mobile calls and messages, etc. Also Mobile spying software works as an excellent monitor application for mobile phone to track and record target phone numbers all dialed, web pages visited (e.g.FaceBook, Twitter), SMS text messages sent and received. Log any computer to check control panel and read text messages sent and received word by word, call records on smartphone. Key Features 1. Every incoming received and dialed, call times and call durations from target phone will be sent to the assigned email. 2. GMS Tracker for mobile phone is a real-time tracking software that locate target mobile exact current geographical longitude and latitude position via wifi, so you can learn where your children are, your parents get lost place and even your lost mobile phone where who picked to your phone through gps positioning system. 3. Smart Mobile Spy program can detect users who change the targ ...
  • Ez Parental Control blocks Website Urls And Programs from running on yours, your child's or employee's computer. Features: Blocks Website Urls, Blocks Programs, Shows Running Process Details, View Detailed History Report, Stealth (invisible) Mode support, Hot keys support.
  • Purpose of NotRun: - prevent start selected programs ( is working with more programs). - provide you a user-friendly interface - be simple and easy to operate Customized capabilities of NotRun software. - run NotRun when started Windows (this function is active by default) - password protected access to NotRun (this function is not active by default) - when NotRun is started, it minimized to system tray
  • Keyword Magic Professional is the ultimate keyword tool to extract data from the online Google keyword tool. With it, you can view search data, competition data, CPC, search trends and then sort, organize, filter, create keyword lists, view product models with the advanced keyword filters and more.
  • Put an end to forgotten passwords and insecure password storage! Easy Password Storage keeps your passwords safe but accessible. One master password protects and encrypts all of your valuable information on Windows and Mac. Your passwords are protected with your choice of three industry standard encryption types with up to 448 bit encryption: Advanced Encryption Standard (AES), Blowfish or Serpent.
  • Power Spy software secretly logs Facebook use, keystrokes, chats & IMs, emails, web visits, games, searches, shopping history, user names, passwords and more. It supports Windows Live Messenger, Yahoo Messenger, Skype, ICQ and more. It's invisible to monitored users. However, it is easy for you to unhide its interface with hotkeys. You can receive reports remotely via email or ftp. Perfect for monitoring employees, kids and spouse.
  • Installing this program before your browsers are infected by malware or viruses gives you a free browser to surf the internet. Don't wait until your system is disabled to download this tool that is necessary to have before your browser is crippled and disabled. This rescue utility browser will run even when your system is infected. Regain the ability to surf the net and download software with this protected browser. You need this tool installed while your system is free from malware. Built in pop up blocker included kills any new window that appears. Saves you frustration by giving you access to the internet again. New app killer added that searches constantly for unauthorized applicatons and shuts them down for you to delete them. Use as a malware shield and app killer for constant protection. Saves endless hours reloading damaged programs from malware attacks. Buy any one program from our home page and get one program of equal or lesser value free!
  • Location Safe obtain the GPS location of your child's phone by sending a SMS to the Target device. Location Safe can track the location of your phone at any time, obtain exact location on the planet of your child/employee, GPS information that can be plugged into any popular mapping software, Ensure that your child is safe and your employees are where they are supposed to be. Location Safe is very easy to use and Install in your mobile.
  • PDF Postman offers an easy way to send private emails with MS Outlook. Messages and files are placed in a PDF file then encrypted with strong AES-256 encryption. Since most recipients already have a PDF viewer, they only need to click on the encrypted pdf file and enter a password. Works across devices and platforms. No expensive or complex S/MIME certificates to install. Download a free trial of PDF Postman.
  • Store many passwords in software so that you do not need to remember them yourself.
  • Kernel file shredder is a professional tool that acts as a data privacy tool as it ensures that organization sensitive information is not been misused by any malicious users. It ensures this as it permanently deletes or removes crucial files and folders from your computer system after use. The free file shredder software performs efficient as well as impeccable file shredding in such a manner that once the files and folders are shred, they cannot be recovered back using any powerful data recovery tool. Kernel file shredder offers multiple file shredding options to the users. Moreover, it also enables you to create a list of files that you want to permanently remove from your computer system. This file has a .cfs format. Kernel file shredder comes with a free evaluation or free trial version which enables you to shred files on one hand and on the other hand lets you evaluate the features as well as performance of the tool. However, the limitation of this free trial version is that it is available for a time ...
  • Invisible Spy Software, keylogger, email, chat and Facebook monitoring software. It records all Facebook activities, keystrokes, MSN Messenger, Windows Live Messenger, ICQ, AIM, Yahoo Messenger, and Skype chats, websites visited, emails read, documents opened, clipboard content, passwords typed and applications executed. It send log reports to your custom email automatically. You can check your logs by receiving emails or directly on the
  • Mikey keeps track of your login usernames, user ids, passwords, web page logins, email accounts; you name it. Now you only have to remember one password for Mikey to keep your information private. Mikey will secure your information with a single access password and a unique file encryption method. Open up Mikey and you get one click access to enter passwords, activation codes or any other similar data. Easily search, print, or delete entries all from one screen. Easily print individual entries or even export the entire database in two popular formats. Mikey has a unique approach to auto fill forms. You control the information that Mikey gives out. When you need a username or password simply search for the item then click on the clipboard icon to transfer that information to the clipboard. Then you can paste it right to the place where you need it. This unique feature makes Mikey perfect for use on computers with more than one person. Since Mikey is password protected you no longer have to worry abo ...
  • Keylogger secretly logs all Facebook use, keystrokes, chats & IMs, emails, web visits, video talk, microphone, user names, passwords, searches and more. It records instant messenger, such as Skype, Windows Live Messenger, Yahoo Messenger, ICQ and others. It takes screenshots like a surveillance camera. Runs silently and monitored users won't know it. Log reports will be sent to you via email or ftp.
  • AthTek Keylogger secretly monitor everything - instant messages, emails, websites, internet activities, facebook and twitter, pictures, keystrokes, programs, CD-Rom, documents and files, USB drives, printers, clipboard, any website they visited, any program they run, any character they typed on the computer. With AthTek Keylogger, you can easily know that who is doing what on the computer. The logs will automatically be emailed to your
  • The GRIP Password Manager is a portable USB application that allows you to securely store your passwords and take them with you anywhere you go. Strong encryption means you only need to remember one password ever again. Easily store user names, passwords, web sites, notes, and even categories for your passwords. A built in password generator ensures strong security. The self destructing clipboard wipes your password after you paste it.
  • We provide Virtual Private Network [VPN] service to our customers for anonymous Internet access and use. Our servers are located in various countries that have Constitutional rights including privacy rights.
  • PDF Encryption is very flexible and reliable software that has several features like password protection, encryption level, page restriction, high resolution as well as low resolution printing. Tool provide many options in page restriction level such as restrict document printing, restrict form filling, restrict modify contents, restrict annotations, restrict content copying, restrict content copying for accessibility and assemble documents.
  • PC James Bond 007 secretly logs Facebook, keystrokes, chats, IMs, emails, websites visited, microphone, video talk, logins, passwords, applications, searches, documents and more. Logs Skype, Yahoo Messenger, MSN, ICQ, AIM, etc. Takes screenshots every x seconds like a spy cam. Sends logs to your email. You can check logs on a remote PC, tablet, smart phone, or directly on the monitored PC. Perfect for monitoring employees, kids and spouse
  • Simple application that prevents launch of any processes that you specify. It can be used, for example, in order that the children could not play games in your absence. You can register in the autorun, it will run in stealth mode, call using hot key Ctrl-Shift-F5. You can use it for free.
  • PDF Decrypt is a perfect tool that lets you to decrypt protected Adobe Acrobat PDF files, which have "owner" password set, preventing the file from editing(changing), printing, selecting text and graphics(and copying them into the Clipboard), or adding/changing annotations and form fields. Decrypted file can be opened in any PDF viewer(e.g. Adobe Acrobat Reader)without any restrictions -- i.e. with edit/copy/print functions enabled. All versions of Adobe Acrobat are supported. The standard security provided by PDF consists of two different methods and two different passwords. A PDF document may be protected by password for opening ('user' password) and the document may also specify operations that should be restricted even when the document is decrypted: printing; copying text and graphics out of the document; modifying the document; and adding or modifying text notes and AcroForm fields (using 'owner' password).
  • cBlasterPRO is the Best Cell Phone Surveillance Software which provide monitoring child/Employee communication, ensure security and location, corporate Reporting Available, Remote server to handle requests. cBlaster provides SMS/Text Message, Web History/BBM, Location, Voice Call Log, Remote control for parents and employers and Photo clicked by your Child's Camera.

Page 13 of 30
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30


Legal disclaimer | Privacy policy

© 2004-2016 IT Shareware