Home | Submit a file  |  New  |  Categories  |  Our awards  |  Link to us  |  RSS Feeds

Utilities :: Security & Encryption
Sort by: date | product title | rating | downloads | popularity
Display: short descriptions | full descriptions
  • Restrict Internet access at specified times or on demand. Block harmful content, disable connection completely or limit Internet to work with allowed programs and services only! To fully enable or manage Internet access, a password must be entered. Easily schedule Internet availability. Timer allows you to disable Internet connection after specified amount of time. Keep kids away from Internet harms and employees away from online entertainment.
  • Advance Key logger software traces out and records complete system and internet related activities performed by outside users with your laptop in your absence. User friendly Key logger utility monitors overall PC usage and takes screenshots at regular time periods. Key logger spy tool monitors clipboard activities in full silent way to find out cut, copy, and paste activity performed by outsider in the absence. Spy Software Free software monitors complete PC activities and records into log files that can be used as backup file for later use. Powerful internet monitoring program safely traces out and records full details of online conversation of text and voice, typed URL, visited websites into log files in your absence. Advance key logger tool has the option to record windows startup time and facilitates only authorized user to access monitoring activities using hot key combinations. www.dd-spy.com is official and professional website containing complete details about advance system monitoring utility. User f ...
  • Hide ALL IP is the worlds best IP hide software, hide all your applications and games IP from snoopers & hackers, allows you to surf anonymously, prevent identity theft, and guard against hacker intrusions, all just a click. Hide ALL IP is unique hide ip software support UDP and http tunnel.
  • Extract and analyze digital evidence. The Enterprise edition of Belkasoft Evidence Center enables team work with full collaboration support, adding user and permission management to the already impressive list of features. Extracting more than 250 types of artifacts, the tool scans hard drives and analyzes page files, hibernation files and live memory dumps for IM and social communications, Web browsing activities, documents and emails.
  • Invisible messenger spy software that records all Yahoo! Messenger incoming and outgoing chat text. Send reports to your custom email address or ftp. You can check all recorded messages by simply receiving emails or opening a web page. Use hotkey to unhide it from Stealth Mode and protect program access by password. Perfect for catching cheaters, monitoring employees, children or spouse, and even investigating crimes.
  • Deleted files can always be recovered if nothing is overwritten over the harddrive sector where they were before deletion. PCBooster Free File Shredder could lend you a hand in case you have some private files of high importance and you want them gone forever so that nobody can retrieve them. It provides thorough deletion of all types of files - no one, even the hackers with most advanced recovery tools, can get them back.
  • Trustworthy keyboard monitoring program includes uncomplicated installation process along with best aspect which hides from desktop, control panel, add/remove programs, installation files/folders also has handy capability to get customized for specific functions. Interactive Free Spy Software for windows operating system can be straightforwardly downloaded from www.freespysoftware.mobi which is superlative and proper program for administrating system, employer, office managers, parents and many more. Reliable activity monitor application efficiently supervise online transactions of spouse and builds report in format of txt or html file according to user necessity moreover uses hot key combination or run command settings to unhide the software at the time of running mode. Pioneering Free Spy Software proffers potential to system administrator to supervise each executed activity through family members, friends or company employees on your private computer at your absence. Consistent Free Spy Software encloses a ...
  • Encrypt and convert word to exe with password protected, Support doc, docx, docm, The encrypted document can prevent from editing and copying. You can set whether or not allow your users to print document. You can also set multiple encryption modes. Easily distribute your files and protect it, only you can create open password for your users.
  • Facebook Activity Spy secrectly logs all Facebook use, keystrokes, web visits, emails, chats & IMs: Windows Live Messenger, Yahoo Messenger, Skype and other IMs. It logs applications, documents, clipboard, user names, passwords, video talk, video played and more. It also takes screenshots at every X seconds like a surveillance camera. It runs invisibly so that monitored users won't know it. You can receive log reports remotely via email
  • PDF Protection Tool from SysInfoTools is very flexible and powerful tool that allows you to impose various security parameters to your PDF file easily. This tool allows user to encrypt (using standard 40-bit or 128-bit supported by Acrobat Reader 5.0 and up) the existing PDF documents, set permissions, add user and owner password. PDF Protection Tool from SysInfoTools is stand-alone application which means that Adobe Acrobat (or any other product) is not required. PDF Protection Tool from SysInfoTools is 100% result oriented and very fast than any other PDF protection imposer tool. It does not modify the existing content of the file and keep the document original as before. This sophisticated software tool take a simple PDF file as input and create a copy of it for user's security( users original document's accessibility is out top priority), then it perform security insertation operations on the copy of original. Within seconds this tool do all the desired operations. PDF Protection from ...
  • PC Activity Monitor Lite (PC Acme Lite) is an ultimate invisible and undetectable easy-to-use monitoring and surveillance tool for personal PCs. It is professional software that captures all users activity on the PC. It is a powerful management tool for users and companies, which want to increase their productivity and profitability. This is the most remarkable security product for a computer you have seen.
  • SafeWallet password manager and password management solution is the most secure and easy to use password manager. It offers smart browser integration ensures you do not have to do anything to stay safe. SafeWallet Password Manager works while you browse. Detecting, saving and filling login and password information in a highly secure and intuitive manner. Never be at risk again, SafeWallet password manager will always protect you!
  • Power Spy secretly logs Facebook, keystrokes, chats & IMs, emails, web visits, video talk, logins, passwords, applications, searches and more. It also takes screenshots like a surveillance camera. Let you see exactly what they see on a computer screen. Automatically sends log reports to your email or ftp. Starts monitoring with system startup. Runs silently and invisibly. Only administrator of the software can manage it with hotkey.
  • Free Password Box is free password store software to store and manage all your login IDs and passwords, saving you from trouble of remembering tons of passwords. It can generate unbreakable passwords randomly or according to the template you specify keep logins safe from all passwords cracking tools. And you can use one master password to unlock all the archives that store your IDs & passwords.
  • A VPN protects you by encrypting your internet traffic, making your online activities impossible to intercept by unwanted third parties. Once connected to any of our servers, you become masked behind an anonymous IP address. Bart VPN gives you the option to automatically encrypt selected applications on your computer, it will also connect to the best server available in your location. It's simply the ultimate gateway to internet freedom.
  • Active Directory Reports enables Active Directory computer Reports Active Directory OU Reports Active Directory User Reports Active Directory Group Reports Active Directory NTFS Reports Active Directory Passwords Reports Active Directory user logon Reports Active Directory GPO Reports for account lockout policy AD Reports for Last log on
  • Password management with synchronization. SecuStar administrates your passwords safely and clearly. Furthermore SecuStar can synchronize between several PCs, so you have access to your passwords from all the devices you are working with. SecuStar stores your password data using the AES-256 algorithm, which is approved in the U.S. for state documents classified top secret.
  • Experience the newest and most advanced keylogger and computer monitoring software. Record all keystrokes typed, capture screenshots and view applications they used as well as monitor all visited websites, viewed YouTube videos and passwords. Monitor Facebook and Skype chats in easy to use interface. Remotely monitor any computer and receive recorded data via e-mail.
  • SpyPal PC Spy secrectly logs Facebook activities, keystrokes, websites visited, emails, Windows Live Messenger (MSN), Yahoo Messenger, Skype, clipboard, user names, passwords, applications run and more. In Stealth Mode, it is completely invisible to computer users. You can use hotkey and password to access the program. Automatically sends logs to a preset email or ftp. Possible usages: monitors employees, children, spouse and investigat
  • Employee Monitor Spy secretly logs your employees' PC & internet usage during their work hours. It lets you exactly what they type on PC keyboard, web sites they visit, who they talk to online and the content of their conversation. Employee Monitor Spy even takes screen snapshots periodically like a surveillance camera aiming at their computers. You can either receive log reports remotely from or check logs directly on their PCs.
  • Spyrix Personal Monitor is a software for hidden monitoring of all types of user activity: Keystrokes logging (including passwords), Screenshots capture, Clipboard monitoring, Apps monitoring, Internet activity including social networks like facebook, google plus, linkedin, Skype, Microsoft Live Messenger,ICQ, Google Talk, search engines activity(google, bing and yahoo). Spyrix Personal Monitor send all logs via email, ftp or local network
  • SpyPal Keylogger Spy software can secretly record all keystrokes typed on your computer. This may include chats, emails, user names, passwords, online searches, myspace, facebook activities and more.It runs in a complete invisible mode. You can check logging reports by simply receiving emails or opening a web page.Perfect for catching cheaters, monitoring employees, children or spouse.
  • Estelar Lock a Folder Tool is a powerful file and folder password protection software that offers advanced security solution to take control on your private files, folders, and other Windows resources. This file and folder password protection software can be used to protect your data and stops other unwanted users accessing your data. Using the folder security system you can also protect your data on other removal storage devices such as pen drive external portable hard drive. Once your files or folder are protected using Estelar Lock A Folder software then no one can access such folder and files with knowing the correct password. How to Use this advanced File and folder Password Protection Software? Step One: Run Lock a Folder - After installing the software go to 'Start menu > Programs > Estelar Lock a Folder from there choose Lock Files & Folders Step Two: Browse a Folder or File - Click on the "Add Folder or File" icon to import the folder ...
  • SpyPal Invisible Spy secrectly records Facebook, keystrokes, screenshots, websites visited, windows opened, applications, MSN, ICQ, AIM, Yahoo IM, Skype, clipboard, passwords, emails, documents and more. In Stealth Mode, it is completely invisible to computer users. Use hotkey and password to access the program. Auto send logs to a preset email or ftp at set interval. Usages: monitors employees, children, spouse and investigate crimes.
  • SpyPal Windows Spy secrectly records Facebook, keystrokes, websites visited, applications, Windows Live Messenger, ICQ, Yahoo Messenger, Skype, clipboard, passwords, emails, documents and more. In Stealth Mode, it is completely invisible to monitored users. Automatically sends logs to a preset email or ftp at set interval. Usages: monitors employees, children, spouse and investigate crimes.

Page 13 of 30
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30


Legal disclaimer | Privacy policy

© 2004-2015 IT Shareware