Home | Submit a file  |  New  |  Categories  |  Our awards  |  Link to us  |  RSS Feeds

Utilities :: Security & Encryption
Sort by: date | product title | rating | downloads | popularity
Display: short descriptions | full descriptions
  • Forensic Studio Ultimate extracts more types of digital evidence from suspects' hard drives than ever, speeding up investigations by creating still presentations of lengthy videos. In addition to Web browsing data including favorites, history and cookies, instant messenger communications, chats and office documents, Forensic Studio Ultimate can analyze pictures and videos, detecting files that contain pornography, human faces or scanned documents
  • SpyPal Remote Spy secrectly records Facebook use, keystrokes, screenshots, websites visited, applications,Windows Live Messenger, Yahoo Messenger, Skype, clipboard, passwords, emails, documents and more. In Stealth Mode, it is completely invisible to monitored users. You can use hotkey and password to access the program. It sends logs to a preset email or ftp at set interval. Usages: monitor employees, children, spouse and investigate c
  • BestCrypt Volume for Disk Encryption protects all data on all types of volumes residing on fixed and removable disks, plus supports RAID and GPT partitions, UEFI and Windows 8 computers. Jetico encryption software provides protection from physical threats, such as lost or stolen computers and USB drives. BestCrypt utilizes a wide variety of algorithms (AES, Twofish, Serpent) and the largest possible key sizes with XTS, LRW encryption modes.
  • AntiPhotoSpy removes private information from photos to protect your privacy. Did you know that each image carries text information along with its picture? This information contains data about various things including the name of the application that you have used for editing the image (e.g. Photoshop) or the camera that you used for taking the photo or even the GPS location of the photo. Remove them easily with AntiPhotoSpy.
  • Experience the newest and most advanced keylogger and computer monitoring software. Record all keystrokes typed, capture screenshots and view applications they used as well as monitor all visited websites, viewed YouTube videos and passwords. Monitor Facebook and Skype chats in easy to use interface. Remotely monitor any computer and receive recorded data via e-mail.
  • JiJi Password Expiration Notification is a simple tool to notify users, managers and administrators through e-mail before their password and account expire. Administrator can receive the summary report to the specific email ids. Administrator can define the notification task for any specified target (Domain, an OU, Group, Set of Users).
  • MSN Spy Monitor secretly logs all MSN Messenger / Windows Live Messenger incoming and outgoing chat text messages. Takes screen snapshots of MSN Messenger video chats every X seconds. It runs in a complete invisible mode. You can check all recorded messages by simply receiving emails or opening a web page. Perfect for catching cheaters, monitoring employees, children or spouse, and even investigating crimes.
  • Screenlogger is smart and clever program recording PC-user activities, the main software function is screen-shots (snapshots) logging when You set time-periods to create sreenshots and delete them, the kind of Keylogger logging most actual things: logs clipboard, search engine queries, social networks, messengers: Skype, ICQ, AIM, etc., files, applications activities, visited web-sites, remembering logins and passwords, useful information security soft for parental or employees control monitoring purposes Screenlogger main characteristics: Logging each keystroke, Screenshots' logging by set periods, Screenlogger friendly software interface, Clipboard data logging, Logging of search engines' queries, sites, social networks, messengers, files, Screenlogger LogFile search system, Logs calendar, Logs archive searching, Screenshots logging by set periods, Snapshots auto-deletion setting, Screen-shots quick preview and auto-enlarge by 1 click in LogFile, Works in OS Windows XP, NT, 2000, 2003, ...
  • The most advanced network security software in its domain which conducts security assessments and security auditing on Cisco firewalls, routers, and switches. This is accompanied with the most up-to-date Cisco auditing tools; it also helps in achieving network security regulatory compliance.
  • Folder Lock Free can password protect a folder file or any documents, videos, images that you need to lock. Simply drag-n-drop the data to be hidden to the main security window. Directories and files will be hidden immediately and secured with a password. Folder Lock free is freeware software. Download it and find out how to hide a folder the easy way. Prevent access to a directory or file on Windows 7, Vista & XP. No crack, serial or key needed.
  • Estelar Lock a Folder Tool is a powerful file and folder password protection software that offers advanced security solution to take control on your private files, folders, and other Windows resources. This file and folder password protection software can be used to protect your data and stops other unwanted users accessing your data. Using the folder security system you can also protect your data on other removal storage devices such as pen drive external portable hard drive. Once your files or folder are protected using Estelar Lock A Folder software then no one can access such folder and files with knowing the correct password. How to Use this advanced File and folder Password Protection Software? Step One: Run Lock a Folder - After installing the software go to 'Start menu > Programs > Estelar Lock a Folder from there choose Lock Files & Folders Step Two: Browse a Folder or File - Click on the "Add Folder or File" icon to import the folder ...
  • The OKcookie is a plugin that allows webmasters to comply with the new EU Cookie Law. The Cookie Law requires informed consent to place cookies on a users browser. It takes your website essential First Party Cookies and securely stores them until the user agrees to the use of Cookies. It allows essential functions of your site to remain working by placing the Master cookie on the browser. Which acts as a Master Cookie to all of the functions.
  • Employee Monitor Spy secretly logs your employees' PC & internet usage during their work hours. It lets you exactly what they type on PC keyboard, web sites they visit, who they talk to online and the content of their conversation. Employee Monitor Spy even takes screen snapshots periodically like a surveillance camera aiming at their computers. You can either receive log reports remotely from or check logs directly on their PCs.
  • PDF Decrypt is a perfect tool that lets you to decrypt protected Adobe Acrobat PDF files, which have "owner" password set, preventing the file from editing(changing), printing, selecting text and graphics(and copying them into the Clipboard), or adding/changing annotations and form fields. Decrypted file can be opened in any PDF viewer(e.g. Adobe Acrobat Reader)without any restrictions -- i.e. with edit/copy/print functions enabled. All versions of Adobe Acrobat are supported. The standard security provided by PDF consists of two different methods and two different passwords. A PDF document may be protected by password for opening ('user' password) and the document may also specify operations that should be restricted even when the document is decrypted: printing; copying text and graphics out of the document; modifying the document; and adding or modifying text notes and AcroForm fields (using 'owner' password).
  • Fleet tracking software by RedBrickSecurity uses GPS signals and manages the data as per the required rule set. Fleet tracking software module will upload data, convert into encoded text and send the coordinate via a data bearer such as SMS, Email and Byte array to any desired location. Obtains GPS Data in NMEA format. Can handle data as per defined rule sets. Data can be logged on local device for delayed analysis or retrieved real time mapping.
  • Free Password Box is free password store software to store and manage all your login IDs and passwords, saving you from trouble of remembering tons of passwords. It can generate unbreakable passwords randomly or according to the template you specify keep logins safe from all passwords cracking tools. And you can use one master password to unlock all the archives that store your IDs & passwords.
  • www.freewarekeylogger.us offers best solution for all small and large business industries to record workers activity in minimum cost and time. Computer monitoring program provides complete solution to trace user activities including both side chat conversation, compose emails, clipboard action, internet surfing history, user name and time spent on computer, accessed websites, type keyboards, online search or similar type of activity on system. Freeware Key logger easily runs in hidden so other external user does not know about any program installation on computer system. Keystroke recorder program provides detail monitoring about single pressed keystroke activity even if you are many miles away from your system. PC monitoring program helps organization to improve their business productivity on checking regular employees activity performed on office system. Freeware Key logger software is beneficial to record all search engines activities like Google, MSN or Yahoo. Visual surveillance Key logger tool facilitat ...
  • Keyword Magic Professional is the ultimate keyword tool to extract data from the online Google keyword tool. With it, you can view search data, competition data, CPC, search trends and then sort, organize, filter, create keyword lists, view product models with the advanced keyword filters and more.
  • Automatically blocks IP addresses with hacking attempts on your windows server services (rdp, FTP, SQL-Server) using the Windows firewall. The software runs as a Windows background service and monitors RDP, FTP und SQL-Server events for failed logins. If a configurable number of failed login events is detected from the same IP address BotFence dynamically lists that IP address im the Windows firewall as blocked.
  • PC Spy Monitor secretly monitors Facebook, chats, emails, keystrokes, passwords and sends reports to your email or ftp. It logs Windows Live Messenger, Skype, Yahoo Messenger and other IMs. It also takes photo shots of online video talk like a surveillance camera. PC Spy Monitor runs so stealthily that the monitored user won't even know it. You can use hotkey to unhide it and change settings. It is a must have tool for you to reveal the
  • Advanced Keylogger Lite is the most powerful stealth keylogger offered Toolsanywhere Software! This is the best choice for you if you think that others are using your computer when you are not home or away from your working place. Advanced Keylogger Lite runs silently at the lowest level of windows capturing every keystroke typed including usernames and windows log-on passwords. Advanced Keylogger Lite can also capture active window text, text ty
  • Location Safe obtain the GPS location of your child's phone by sending a SMS to the Target device. Location Safe can track the location of your phone at any time, obtain exact location on the planet of your child/employee, GPS information that can be plugged into any popular mapping software, Ensure that your child is safe and your employees are where they are supposed to be. Location Safe is very easy to use and Install in your mobile.
  • PDF Protection Tool from SysInfoTools is very flexible and powerful tool that allows you to impose various security parameters to your PDF file easily. This tool allows user to encrypt (using standard 40-bit or 128-bit supported by Acrobat Reader 5.0 and up) the existing PDF documents, set permissions, add user and owner password. PDF Protection Tool from SysInfoTools is stand-alone application which means that Adobe Acrobat (or any other product) is not required. PDF Protection Tool from SysInfoTools is 100% result oriented and very fast than any other PDF protection imposer tool. It does not modify the existing content of the file and keep the document original as before. This sophisticated software tool take a simple PDF file as input and create a copy of it for user's security( users original document's accessibility is out top priority), then it perform security insertation operations on the copy of original. Within seconds this tool do all the desired operations. PDF Protection from ...
  • The safest and most convenient Secure Folder supports Folder lock, Folder Encrypt and Folder Hide functions. No worry about leaking own personal data to others, no worry about third party spam ware upload or steal your important files, because they cannot even find your file or only can see rubbish data. It's a safe home for your personal photos, diaries, home plans, company reports etc.
  • Encrypt and decrypt files with a password to protect sensitive data.

Page 13 of 30
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30


Legal disclaimer | Privacy policy

© 2004-2016 IT Shareware