Home | Submit a file  |  New  |  Categories  |  Our awards  |  Link to us  |  RSS Feeds

Utilities :: Security & Encryption
Sort by: date | product title | rating | downloads | popularity
Display: short descriptions | full descriptions
  • Email Spy Monitor spy software secretly monitors and records all emails opened in popular email clients, such as Microsoft Outlook, Microsoft Outlook Express, Windows Vista WinMail and IncrediMail. It runs in a complete invisible mode. You can check all recorded messages by simply receiving emails or opening a web page. Perfect for catching cheaters, monitoring employees, children or spouse, and even investigating crimes.
  • Looking for PDF security solution! Download and tryout our advanced pdf password protection solution which encrypts bulk pdf documents in a single click. Software provides a big hand to your business confidential property by encrypting data and protecting with open password. User can set pdf owner password on documents, thus enables users to restrict pdf files for printing, text copying, form filling, editing, signing, commenting, page extraction etc. PDF encryptor tool supports both 128 bit and 40 bit RC4 encryption level. E-book security software protects your electronic pdf books from printing and copying. User password is required to lock the documents from opening and owner password is required to lock the documents for applying various permissions like printing, copying etc. Software is independent on Adobe Acrobat Pro and also does not require extra plug-ins for it. Features: # Process batch pdf files for encryption. # Software supports all latest versions of windows operating systems including Wind ...
  • Keylogger software is widely used in business world to monitor your staff member day to day computer activity such as created/deleted/modified MS word document information, printed file details, shared confidential files and folder, accessed restricted website (banking, share trading, social networking etc), messenger chat with his friends and many other things, which is done by employee in office hours. Parental control utility has interactive easy to use GUI (graphical user interface) wizards, which provides help to nontechnical user to easily understand the software features and functionality. Child computer desktop activity recording application also captures your spouse, children, family member and friend activity like visited URL history, downloaded songs and movie clips information, installed/uninstalled program details, read official mails, explored personal folder etc, when you are busy in some other work. Keyboard keystroke monitoring tool perfectly works on every version of Windows operating system ...
  • SL Password Generator is a program designed to generate random passwords. Program is fast, small and easy to use. SL Password Generator can create alphabetic, digits, alphadigits or all keyboard character passwords. Passwords list can be printed or saved.
  • Encrypt text as easily as making it bold or italic... simply select the text to be encrypted, and save the file... Add more text to encrypt - or edit non-encrypted text - with no need to re-enter your password... State of the art RSA encryption keeps information safe and secure, while the familiar word processor interface makes it easy to use... Safely exchange encrypted information by email without having to reveal your password.
  • Oculis Labs' PrivateEye stops prying eyes from reading your computer display in places like: Airplanes, Coffee Shops, and Office Cubicles. PrivateEye is an easy-to-use software program that automatically protects your computer display against eavesdroppers. It needs only a standard webcam, and runs on Microsoft Windows XP and Vista.
  • CD/DVD Door Guard Pro provides you with the most effective software protection for optical drives and allows you to customize any actions concerning the protection. You may lock and unlock, open and close the drive's door using "hot keys", play sound notifying about locking/unlocking it, may customize what the utility will do when you click on its icon in tray. CD/DVD Door Guard Pro is not just effective in protection, it is also really handy.
  • IMMonitor Facbook Spy allow you to monitor, block or record Facebook chat conversations remotely, and you can save all captured messages to HTML files for later processing. If your kids (or spouse!) are spending too much time chatting via Facbook, or you suspect they're engaged in dangerous conversations, IMMonitor Facbook Spy is a very simple way to find out and stop it.
  • Excellent PC surveillance tool runs in background and hidden from all viewable areas on system including program files, desktop items, task manager, control panel add/remove program, start menu etc. Affordable keyboard key recorder application is best solution to observe all desktop PC or laptop activities executed by your friends, family members, spouse, colleagues etc when you are away. Advance keystroke tracker spy software requests password from unauthorized user while accessing software configurations. Easy to use PC monitoring tool records all pressed keystroke in encrypted log files and automatically sends at user defined email address or uploaded by FTP server. Advance keylogger application is comprehensive solution to keep track on session details of each logged user with actual date and time. System observation spy software is reliable solution to monitor executed keys on PC and enables primary user to view all saved log reports in txt or html file format. Keyboard key recorder utility helps parent ...
  • Free EyeLine is video surveillance software used to capture and store video from a single camera or webcam. Professional editions for multiple digital video cameras or webcams is available from NCH Software. EyeLine Professional was designed for business uses including video monitoring of offices, buildings, and logging of in-store cameras but it has a broad range of possible applications.
  • Access Forbidden provides a quick, secure and easy way to lock the access to your computer and protect the screeen from prying eyes. Access Forbidden instantly locks the computer with a user defined password or using a "key drive" (a pendrive or other removable drive). The PC will be unlocked entering the password or inserting the key drive. Access Forbidden enables the user to easily prepare a standard removable drive that will be used as an "hardware key". Just one click on the system tray icon and you can leave the PC without worries! Enter your password and the computer returns under your control instantly. Lock the access to your desktop without interrupting other computer activities (running programs, active downloads, mail delivering/reception, chats, scheduled tasks, and so on...). Exclusive feature: use a USB pendrive to lock/unlock the computer! Simply plugging/unplugging the pendrive, whithout the need to click or enter the password. Access Forbidden is ...
  • AWinware PDF Encryption software is fast and affordable solution for encrypting bulk pdf files with user defined owner password. Software permits to add pdf open password also known as user password. Tool can apply security with two level of encryption: 40 bit RC4 and 128 Bit RC4. User can also restrict pdf printing, copying, form filling, content copying for accessibility, signing and commenting. Thus tool can be also be used to set various security restrictions. Trial version adds watermark on output pdf documents which can be removed by registering the product. Batch pdf protection software applies both user as well as owner password in a single click. Download free pdf locker software to test and evaluate by locking pdf file. Features: # Software supports Windows XP, Vista and Windows 7 operating system including 32 bit and 64 bit. # Tool provides two level of encryption security including 40 bit and 128 bit RC4. # Software provides pdf right click context menu option as short cut. # Software is ava ...
  • SterJo Portable Firewall PRO is device designed to prevent outsiders from accessing your network even if it is run from a USB drive. The unit serves as the single entry point to your network and evaluate all TCP connections requests as they are received comparing them with each rule in the policy. This is advanced easy-to-use software with ability to watch for all ports on your system and block them if necessary. - Activity provides a real-time view of the open connections through the firewall. - The policy editor is used to define a security policy where connections requests from unauthorized ip addresses and ports are rejected. - Log provides data connection notes that can be used for prosecuting the potential attackers. - History tab gives you detail information about permitted connections and failed attempts.
  • Professional PC surveillance software helps parents to monitor their kid?s internet activities when they are away. Economical keystroke recorder program records every change made to desktop configuration and sound clips. Advanced keyboard monitoring software covertly records login session details of each secondary user. Affordable PC surveillance utility is protected by password facility and allows only legal user to access software settings. Application saves activities executed on computer like clipboard entries, chat conversations, username etc in encrypted log file. Advanced keylogger program has advanced feature to capture screenshots of all Window applications opened by subsidiary user. Professional keystroke recorder awares you about entire PC activities performed in your absence. Easy to use keyboard monitoring utility delivers generated log file at user specified email ID using FTP server settings. Software is invisible from all observable areas on laptop, desktop including start menu, add or remove ...
  • idoo Secure Disc Creator can burn data onto cd or dvd disc.The disc made by it can be normal data disc,can be encrypted data disc,can have both secure area and public area. idoo Secute Disc Creator your can burn password-protected and encrypted discs. It supports most of CD DVD, if you have a recorder and you want to burn an portable encrypted disc.
  • idoo USB Encryption is powerful USB encryption software, it encrypt usb disk partition , encrypt file on usb flash drive. especially designed to create password protected USB memory sticks. It creates protected areas on the disk that is needed to enter password to see contents.
  • Now use Protect PDF copying program to comfort every users who need to protect pdf from copying, protect pdf copying, protect pdf from being copied. Protect PDF Copying allow users to protect pdf text & images from being copied by unauthorized users. With Protect PDF Copying program you can quickly apply user password & protection to PDF files of Acrobat version up to 9.
  • Snappy Program Lock is a professional security tool for password protecting programs on your computer, laptop or usb drive. Easily add programs to restrict access to by browsing your computer for the exe file or simply drag and drop a shortcut or program to the blocked application list. Not only does it deny access to programs, it also keeps a history log containing application access information. Works with Windows 7, Vista, XP, 2003, 2008.
  • Know what your employee do on their computer and how they utilize their working hours with network PC monitor tool. It helps to monitor activities of multiple computers from a centralized location. Download the free evaluation version to monitor the activities on a single computer for 7 days and schedule recording for 5 minutes
  • Creates a virtual encrypted disk within a file and mounts it as a real disk. Supports Smartcards and Software Certificates
  • Report compute usage allows you to simplify and optimize large volume of information, and get quick access to all the processes running on your computer while it works. When you work at PC, you use a lot of programs or web pages. With Report computer usage you can see which sites your child visits, or which program your employee uses. You can find out the name of the processes you are using or you have used.
  • Using computer activity monitor tool you can easily know what your employees actually do in working hours. You can also save all activities that are happening on their computers and keep them for future reference. Download the free evaluation version of the software that allows you to monitor single computer for 7 days and lets you record the user activities for 5 minutes.
  • DoSWF can do encrypt, obfuscate to swf files. It has featrues as following: 1.Encrypt swf, protect your actionscript and assets. 2.Obfuscate actionscript3.0 code. 4.Encrypt swc files.
  • Keylogger Spy Software can secretly record all keystrokes typed on your computer. It runs completely invisiblely. You can check log reports by simply receiving emails or opening a web page. Keylogger Spy Software is perfect for catching cheaters, monitoring employees, children or spouse, acquiring others' passwords and even investigating crimes. Use hotkey to unhide it from Stealth Mode and protect the program access by password.
  • 1.Steady and Safe Program Wondershare Privacy Protector has a smart search engine as well as good compatibility. It scans for target histories precisely and doesn?t involve other files that are not defined as safe ones so that your computer will not crash because of using this program. 2.Simple but Effective Operation Wondershare Privacy Protector is an easy-to-use tool and will do all cleaning job by just a few mouse clicks. 2.1Click Start Scan; 2.2Click Start Cleanup and confirm. Then all is done! Your privacy will be never revealed since! 3.Windows History Cleaner Clean up history left on Start Menu and Desktop?Recycle Bin, Document history, Find and search history, run history, etc; Operation trace of Windows system?Clipboard, Windows & System temporary files, Memory dumps, etc; And history of recent computer activities?Paint recent file list, Last opened registry, Windows Media Player history and many more others. 4.Browser History Cleaner Clean history of dominant browsers?IE (and ...

Page 12 of 30
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30


Legal disclaimer | Privacy policy

© 2004-2015 IT Shareware