Home | Submit a file  |  New  |  Categories  |  Our awards  |  Link to us  |  RSS Feeds

Utilities :: Security & Encryption
Sort by: date | product title | rating | downloads | popularity
Display: short descriptions | full descriptions
  • PC Spy Monitor secretly monitors Facebook, chats, emails, keystrokes, passwords and sends reports to your email or ftp. It logs Windows Live Messenger, Skype, Yahoo Messenger and other IMs. It also takes photo shots of online video talk like a surveillance camera. PC Spy Monitor runs so stealthily that the monitored user won't even know it. You can use hotkey to unhide it and change settings. It is a must have tool for you to reveal the
  • Advanced Keylogger Lite is the most powerful stealth keylogger offered Toolsanywhere Software! This is the best choice for you if you think that others are using your computer when you are not home or away from your working place. Advanced Keylogger Lite runs silently at the lowest level of windows capturing every keystroke typed including usernames and windows log-on passwords. Advanced Keylogger Lite can also capture active window text, text ty
  • Add encryption to USB Flash Drive on the market.'USB Flash Security' is security software that protects data in a USB Flash Drive by a password. It locks by the password by only removing!Data in a USB Flash Drive is protected by a password.Useful Security Tool.There are five editions in 'USB Flash Security' for personal user.Free:Up to 4GB ONE,+:Up to 4GB ONE,++:Up to 8GB TWO,#:Up to 16GB TWO,##:Up to 2000GB THREE.
  • Keyword Magic Professional is the ultimate keyword tool to extract data from the online Google keyword tool. With it, you can view search data, competition data, CPC, search trends and then sort, organize, filter, create keyword lists, view product models with the advanced keyword filters and more.
  • cBlasterPRO is the Best Cell Phone Surveillance Software which provide monitoring child/Employee communication, ensure security and location, corporate Reporting Available, Remote server to handle requests. cBlaster provides SMS/Text Message, Web History/BBM, Location, Voice Call Log, Remote control for parents and employers and Photo clicked by your Child's Camera.
  • Purpose of NotRun: - prevent start selected programs ( is working with more programs). - provide you a user-friendly interface - be simple and easy to operate Customized capabilities of NotRun software. - run NotRun when started Windows (this function is active by default) - password protected access to NotRun (this function is not active by default) - when NotRun is started, it minimized to system tray
  • Facebook Spy Monitor is a Facebook profile monitoring and parental control software. It secretly records PC users' Facebook private profile, emails, chats & IMs, photos, interests, contatcts and events by taking screen snapshots periodically. It also records popular Facebook instant messenging clients and Facebook related web sites and searches. See exactly what users were doing just like watching a surveillance video playback.
  • Free Password Box is free password store software to store and manage all your login IDs and passwords, saving you from trouble of remembering tons of passwords. It can generate unbreakable passwords randomly or according to the template you specify keep logins safe from all passwords cracking tools. And you can use one master password to unlock all the archives that store your IDs & passwords.
  • Lock your desktop with one mouse and prevent anyone from accessing your programs and your importand data, no one can access your locked desktop without the valid password, mte desktop locker provide the following features: - lock your desktop with virtual desktop, - you must enter valid password to access the desktop, - show custom alert to any one try access your locked desktop, - you can select from many virtual desktop lockers, - mte desktop locker prevent access to task manager program in the locker mode, - mte desktop locker prevent access to the following keys: (CTRL+ALt+Del), (Alt+F4) to prevent closing the application, - you can lock your desktop with transparent desktop locker, - mte desktop locker provide log feature that enable you record all mouse clicks and invalid passwords input to know if someone try to open your protected desktop, - program allows you to set password to protect the options dialog for more security, - you can set the program to run at windows startup, - program allows you to p ...
  • We provide Virtual Private Network [VPN] service to our customers for anonymous Internet access and use. Our servers are located in various countries that have Constitutional rights including privacy rights.
  • Estelar Lock a Folder Tool is a powerful file and folder password protection software that offers advanced security solution to take control on your private files, folders, and other Windows resources. This file and folder password protection software can be used to protect your data and stops other unwanted users accessing your data. Using the folder security system you can also protect your data on other removal storage devices such as pen drive external portable hard drive. Once your files or folder are protected using Estelar Lock A Folder software then no one can access such folder and files with knowing the correct password. How to Use this advanced File and folder Password Protection Software? Step One: Run Lock a Folder - After installing the software go to 'Start menu > Programs > Estelar Lock a Folder from there choose Lock Files & Folders Step Two: Browse a Folder or File - Click on the "Add Folder or File" icon to import the folder ...
  • VirShield - free program for safe web-surfing. VirShield is free site adviser and filter which guard you form the undesirable site visiting. Make your web surfing safe.
  • Forensic Studio Ultimate extracts more types of digital evidence from suspects' hard drives than ever, speeding up investigations by creating still presentations of lengthy videos. In addition to Web browsing data including favorites, history and cookies, instant messenger communications, chats and office documents, Forensic Studio Ultimate can analyze pictures and videos, detecting files that contain pornography, human faces or scanned documents
  • The OKcookie is a plugin that allows webmasters to comply with the new EU Cookie Law. The Cookie Law requires informed consent to place cookies on a users browser. It takes your website essential First Party Cookies and securely stores them until the user agrees to the use of Cookies. It allows essential functions of your site to remain working by placing the Master cookie on the browser. Which acts as a Master Cookie to all of the functions.
  • The SafeWeb is a freely available utility that allows you to quickly and efficiently set up your computer to use DNS servers provided by OpenDNS.
  • Folder Lock Free can password protect a folder file or any documents, videos, images that you need to lock. Simply drag-n-drop the data to be hidden to the main security window. Directories and files will be hidden immediately and secured with a password. Folder Lock free is freeware software. Download it and find out how to hide a folder the easy way. Prevent access to a directory or file on Windows 7, Vista & XP. No crack, serial or key needed.
  • PDF Protection Tool from SysInfoTools is very flexible and powerful tool that allows you to impose various security parameters to your PDF file easily. This tool allows user to encrypt (using standard 40-bit or 128-bit supported by Acrobat Reader 5.0 and up) the existing PDF documents, set permissions, add user and owner password. PDF Protection Tool from SysInfoTools is stand-alone application which means that Adobe Acrobat (or any other product) is not required. PDF Protection Tool from SysInfoTools is 100% result oriented and very fast than any other PDF protection imposer tool. It does not modify the existing content of the file and keep the document original as before. This sophisticated software tool take a simple PDF file as input and create a copy of it for user's security( users original document's accessibility is out top priority), then it perform security insertation operations on the copy of original. Within seconds this tool do all the desired operations. PDF Protection from ...
  • The notes nsf local security software enables the user to access that NSF database which is under local security. That is, by using the notes nsf local security removal tool the user can remove local security which is set on the NSF database. It is susceptible of handling the numerous error messages which the user face while accessing the unauthorized NSF database such as "You are not authorized to access that database" and "You are not authorized to perform that operation". Despite of having such a wondrous capability to solve such complicated errors, this software is extremely simple to use and does not require much technical efficiency to get operated by the user. Moreover, it provides quick access to the NSF database and is available at a really affordable price. Furthermore, the notes nsf local security removal tool is compatible to use with almost all versions of Lotus notes. For more information please visit www.nucleusdatarecovery.org
  • The safest and most convenient Secure Folder supports Folder lock, Folder Encrypt and Folder Hide functions. No worry about leaking own personal data to others, no worry about third party spam ware upload or steal your important files, because they cannot even find your file or only can see rubbish data. It's a safe home for your personal photos, diaries, home plans, company reports etc.
  • Protect your PC from being used while you are away from your keyboard. After a specified amount of minutes or seconds have passed, your screen will be go completely black and request a password in order to resume regular use.
  • PDF Decrypt is a perfect tool that lets you to decrypt protected Adobe Acrobat PDF files, which have "owner" password set, preventing the file from editing(changing), printing, selecting text and graphics(and copying them into the Clipboard), or adding/changing annotations and form fields. Decrypted file can be opened in any PDF viewer(e.g. Adobe Acrobat Reader)without any restrictions -- i.e. with edit/copy/print functions enabled. All versions of Adobe Acrobat are supported. The standard security provided by PDF consists of two different methods and two different passwords. A PDF document may be protected by password for opening ('user' password) and the document may also specify operations that should be restricted even when the document is decrypted: printing; copying text and graphics out of the document; modifying the document; and adding or modifying text notes and AcroForm fields (using 'owner' password).
  • Fleet tracking software by RedBrickSecurity uses GPS signals and manages the data as per the required rule set. Fleet tracking software module will upload data, convert into encoded text and send the coordinate via a data bearer such as SMS, Email and Byte array to any desired location. Obtains GPS Data in NMEA format. Can handle data as per defined rule sets. Data can be logged on local device for delayed analysis or retrieved real time mapping.
  • Lock Computer with Desktop Shortcut, Command Line or even from Batch Files. This Free Windows Utility uses minimal computer resources, is a really small application and works with almost every latest Windows Operating System. You can Lock your Computer or Workstation with the Desktop Shortcut Created or from the Programs Menu of this Free Windows Utility. This Windows Computer Locker has been tested with 32 bit and 64 bit versions of Windows.
  • iKeyMonitor is an iOS Keylogger for iPhone/iPad/iPodTouch that logs keystrokes, websites, screenshots and automatically sends the logs to you by email or FTP. And iKeyMonitor is the only Keylogger for iPhone/iPad/iPodTouch with the features of Keystrokes, websites, screenshots logging and email/FTP delivery. iKeyMonitor can be installed on any Jail-broken iOS devices.
  • SpyPal PC Spy secrectly logs Facebook activities, keystrokes, websites visited, emails, Windows Live Messenger (MSN), Yahoo Messenger, Skype, clipboard, user names, passwords, applications run and more. In Stealth Mode, it is completely invisible to computer users. You can use hotkey and password to access the program. Automatically sends logs to a preset email or ftp. Possible usages: monitors employees, children, spouse and investigate

Page 13 of 30
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30


Legal disclaimer | Privacy policy

© 2004-2016 IT Shareware