Home | Submit a file  |  New  |  Categories  |  Our awards  |  Link to us  |  RSS Feeds

Utilities :: Security & Encryption
Sort by: date | product title | rating | downloads | popularity
Display: short descriptions | full descriptions
  • 1.Steady and Safe Program Wondershare Privacy Protector has a smart search engine as well as good compatibility. It scans for target histories precisely and doesn?t involve other files that are not defined as safe ones so that your computer will not crash because of using this program. 2.Simple but Effective Operation Wondershare Privacy Protector is an easy-to-use tool and will do all cleaning job by just a few mouse clicks. 2.1Click Start Scan; 2.2Click Start Cleanup and confirm. Then all is done! Your privacy will be never revealed since! 3.Windows History Cleaner Clean up history left on Start Menu and Desktop?Recycle Bin, Document history, Find and search history, run history, etc; Operation trace of Windows system?Clipboard, Windows & System temporary files, Memory dumps, etc; And history of recent computer activities?Paint recent file list, Last opened registry, Windows Media Player history and many more others. 4.Browser History Cleaner Clean history of dominant browsers?IE (and ...
  • Protecting your computer from malicious attacks over the Internet is essential and an anti-virus program alone is simply not enough. An intrusion prevention system such as DefenseWall Personal Firewall will completely solve the problem of infection by malicious software. However, unlike other solutions, this is the world's first sandbox firewall, designed to be easy to use and requiring no complicated setup or configuration process.
  • SpyPal For Home secrectly records keystrokes, screenshots, websites visited, windows opened, applications, MSN, ICQ, AIM, Yahoo! IM, Skype, clipboard, passwords, emails, documents and more. In Stealth Mode, it is completely invisible to computer users. Use hotkey and password to access the program. Auto send logs to a preset email or ftp at set interval. Possible usages: monitors employees, children, spouse and investigate crimes.
  • CryptBox creates secure Safes, that can be used just like normal drives and which can be filled with yur data. All content of those safes are encrypted. Safes can only be opened if you know the password. More and more personal data is saved on PCs. Documents, Letters, Photos and even monthly statements of accounts are often stored in an unprotected way.
  • Power Spy For Office secrectly logs all keystrokes, web sites, emails, chats & IMs: MSN Messenger, Windows Live Messenger, ICQ, AOL Messenger, AIM, Yahoo! Messenger, Windows Messenger and Skype. Takes screen snapshots at every X seconds like a surveillance camera. Displays exact activities, like MySpace, Facebook, PC games, online searches & shopping, file transfers and webmails. You can receive reports remotely via emails or ftp.
  • Access Control is a advanced and flexible system for the control of the staff working hours usage in a network or on a terminal server. There are many of the programs to solve a similar problems. Part from them - simply spyware programs intended first of all for capturing of userís keystrokes, passwords and various messages.
  • Steel USB Sentry offers an simple yet effective control of portable media usage in the corporate network. It helps in preventing data theft and cyber crime possibilities through misuse of corporate data. Steel USB Sentry effectively keeps a tight control of the portable media usage by preventing the users from copying confidential data from their workstations. Steel USB Sentry prevents users from using portable media in the workstations
  • PureSurf Desktop with Active Content Recognition technology offers complete Internet coverage by scanning pages in real-time and categorizing content as Adult, Gambling, Violence, Weapons, Hate, Drugs, Dating, Chat, Forums, Social Networks, Blogs, and more. You choose which categories are not allowed to define the online experience you want for your children.
  • Delete files forever so that they can never be recovered.
  • Monitor other computer users activity without their knowledge. Computer Spying Keylogger utilizes state of the art tracking to secretly monitor children, spouse, employees and more.
  • Automatically clear the list of files found under Documents at specified intervals. Clearing can be set to occur every 30 seconds, 1 minute, 5 minutes, 30 minutes, 1 hour, etc. This application sits in the system tray at the bottom right corner of the screen.
  • Software that remembers your password for unlimited programs. This software also remembers other important information like your usernames. Never forget your passwords again!
  • Invisible messenger spy software that logs all incoming and outgoing AIM text chat messages. View log records from the program or send a report to a preset email / ftp. You can check all recorded incoming and outgoing messages by simply receiving emails or opening a web page. Use hotkey to unhide it from Stealth Mode and protect program access by password.
  • Now with FREE WEB ACCESS to log files! Easy to use internet monitoring & parental control software effortlessly records and monitors all AOL, Yahoo and MSN Instant Messages and helps protect children when they go online . Secretly and automatically records all AOL, Yahoo and MSN Instant Messages. Alerts feature notifies you when certain keywords are typed, and application can be password protected to prevent tampering. Many more features.
  • Message Smuggler is the leading software on the market of its kind, which used to smuggle or hide text message into images. Create secret picture message. This software gives you: - end of censorship - absolute security - end of any suspicions - free choice of transfer method Message Smuggler is an ideal tool for individuals who share very sensitive data with colleagues, family, or friends, and require that data to remain secure.
  • Aldenate Secure Disk enables you to create password-protected containers that can be mounted as virtual disk and used to store your sensitive documents. While mounted, the containers can be used like any other drive to manage your files. You can quickly lock the containers with the click of a button or by pressing a hot key and the drives will no longer be visible. Aldenate Secure Disk uses AES encryption to store your files securely.
  • Store many passwords in software so that you do not need to remember them yourself.
  • Fast Windows Hider is a privacy tool designed to help you hide any windows at one moment. It's very useful when you need privacy and do not wish your actions to be viewed by others. With Fast Windows Hider you can hide/restore any windows instantly instead of closing or minimizing them. You can hide Internet Explorer or another Internet browser, ICQ, AIM, IRC, Word, movies, games, e-mail, photos, or any other window you wish to keep private.
  • Power Spy secretly logs Facebook, Skype, keystrokes, chats & IMs, emails, web visits, video talk, microphone, logins, passwords, applications, searches and more. It also takes screenshots like a surveillance camera. Lets you know exactly what they do on a computer screen while you are away. Automatically sends logs to your email or ftp. Starts monitoring with system startup. Perfect for parental control, monitoring employees or catching cheaters.
  • To protect stored data, comply with regulations and prevent data breaches, BestCrypt Container Encryption delivers strong data encryption that's easy to use for virtual drives and selected files or folders. BestCrypt encrypts files on Windows, Mac OS X and Linux with AES and other strong encryption algorithms. By featuring deniable encryption and dynamic containers Jetico File Encryption is the best TrueCrypt alternative. Includes BCWipe.
  • SpyKing PC Spy secretly logs all Facebook use, keystrokes, chats & IMs, emails, web sites, user names, passwords, web cam images, apps, microphone, clipboard and more. It supports Skype, Yahoo Messenger and others. It also takes screenshots like a surveillance camera. You can receive reports remotely via email or ftp as often as you wish. Open these reports on another PC or on your cell phone browser.
  • Skype Spy Monitor secretly record Skype's incoming and outgoing chat messages. It runs completely invisibly so that Skype users won't know its existence. Skype Spy Monitor send log reports to your email or ftp periodically. You can also check logs directly on the monitored PC. It is a small but powerful program that consumes very little system resource. Perfect for monitoring employees, children or spouse, and even investigating crimes.
  • Lotus 1-2-3 Password by Thegrideon Software is Lotus 1-2-3 workbook password recovery tool. It allows you to recover Lotus 1-2-3 files (*.123, *.wk1, *.wk3, *.wk4) passwords for all security levels. Lotus 123 Password recovers passwords instantly regardless of length and complexity. All versions are supported.
  • PowerCryptor is a program to password protects your documents, photos, music, videos and other. Just right-click on file or folder in windows explorer and choose Encrypt. PowerCryptor makes it as easy to open, edit and save encrypted files, as it is to work with unencrypted files. You can securely erase your files beyond recovery. This way, your privacy protection is ensured and no one will be able to access your confidential data.
  • Folder Lock Lite is a revolutionary concept in data security engineered for home or office use. Folder Lock Lite allows you to Lock and Hide your data, keeping your data secured and hidden at all times so that you won't have to worry about the confidentiality of your data. 'Locking' in Folder Lock refers to the process of protecting your files, folders, drives, and even programs by putting a protective lock on them.

Page 12 of 30
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30


Legal disclaimer | Privacy policy

© 2004-2015 IT Shareware