Home | Submit a file  |  New  |  Categories  |  Our awards  |  Link to us  |  RSS Feeds

Utilities :: Security & Encryption
Sort by: date | product title | rating | downloads | popularity
Display: short descriptions | full descriptions
  • You have more advantage of Vroot there are root access and an unlocked bootloader, you have an infinite of customization option from ROMs, launchers, and other huge advantage is take root application from play store
  • Power Spy for Home secretly logs Facebook, keystrokes, chats, IMs, emails, websites visited, microphone, video talk, logins, passwords, applications, searches, documents and more. Logs Skype, Yahoo Messenger, MSN, ICQ, AIM, etc. Takes screenshots every x seconds like a spy cam. Sends logs to your email. You can check logs on a remote PC, tablet, smart phone, or directly on the monitored PC. Perfect for monitoring employees, kids and spouse.
  • Now, you can see for yourself what your employees do on their desktops during office hours and that too without being physically present in front of them. Yes, it is possible with the help of computer monitoring software. It facilitates the administrator to restrict the misuse of organization?s resources by employees, unnecessary chatting, internet surfing, access to social networking sites during working hours. Administrator comes to know about the possible security breaches if any, while invisibly monitoring varied computers at the same time. Also, this advanced utility enables the user to execute commands like Shut down, Restart, Lock, remove wallpaper, start screensaver, etc. on the monitored computers. Also, administrator can schedule online as well as offline recording of the monitored computers. Offline recording of the software is helpful when admin or manager is not available on desk. This recording is saved in AVI format and can be checked later or saved for future references as a proof. For calcula ...
  • SkyCrypt is a FIPS 140-2 validated Cloud Encryption Gateway. It allows users to add 256 bit AES encryption to local drives, Google Drive, Dropbox, Bitcasa, SkyDrive or most any other cloud storage service. SkyCrypt features include : NIST FIPS 140-2 validation, AES 256 bit encryption, optional 2 factor authentication via Google Authenticator for IOS or Android, and encrypted file names
  • The GEARS application provides home users and IT professionals an innovative free tool that quickly detects if a machine is compromised and provides greater visibility into the status of installed applications. Using two methods of advanced threat detection, GEARS identifies threats that may not have been detected by the user's installed anti-malware software or experienced issues remediating.
  • RecoveryFix Employee Activity Monitor is an invisible software tool that is highly useful for business managers, organizations and home users with which you can easily monitor the activities of employees, children and spouse. Employee Monitor Software helps the network administrators to review and monitor the activities of the employees around a network in real time. Using this tool, you can view the live desktop activities of a network. It also enables you to keep a close look on the employees activities by recording all the events occurred in the PCs. It records all the activities including the system processes, keystrokes, opening/closing of windows, FTP activities, website visits, internet activities, downloading etc., creating desktop screenshots and chat logs. Using this tool; you can monitor several PCs of your organization from a remote place also. This eminent Employee Monitor Software also facilitates the users to create offline logs of the monitored computer activities to view them later. Th ...
  • AD Password Expiration Notification Tool notifies Password expiration.Password Expiration Notification Pro Active Alert Tool to set Password Expire Notification period and configure Password Expire warning and Password Expiration.Password Expiration Alert Tool checks Active Ddirectory, to identify the password expiry dates.Provides scheduler facility for Password Expiry notification.Send password expiry warning email to users,Password Expiration Notification to Manager Password and account expiration auditing solution for Active Directory. Useful for VPN users, Outlook Web Access(OWA) users, Mac/Linux Users, File share users, Service accounts. Automatically checks the AD daily and send password and account expiry status message and report. Send Custom Email Notifications to Users,Managers and Admins Send password expiry warning message to users Send Password Expiration Notification to Manager Send Password Expiration Summary Report to Admins Daily Calculates Password Expiry Date of Users depends on the Domain ...
  • Power Spy Keylogger secretly logs Facebook, keystrokes, chats, IMs, emails, websites visited, microphone, video talk, logins, passwords, applications, searches, documents and more. Logs Skype, Yahoo Messenger, ICQ, AIM, etc. Takes screenshots every x seconds like a spy cam. Sends logs to your email. You can check logs on a remote PC, tablet, smart phone, or directly on the monitored PC. Perfect for monitoring employees, kids and spouse.
  • PC Spy Monitor secretly monitors Facebook, chats, emails, keystrokes, passwords and sends reports to your email or ftp. It logs Skype, Yahoo Messenger and other IMs. It also takes photo shots of online video talk like a surveillance camera. PC Spy Monitor runs so stealthily that the monitored user won't even know it. You can use hotkey to unhide it and change settings. It is a must have tool for you to reveal the truth.
  • Free Password Box is free password store software to store and manage all your login IDs and passwords, saving you from trouble of remembering tons of passwords. It can generate unbreakable passwords randomly or according to the template you specify keep logins safe from all passwords cracking tools. And you can use one master password to unlock all the archives that store your IDs & passwords.
  • Lock My PC Free Edition is a good and free alternative to standard Win+L Windows lock. Use it every time when you leave your computer unattended.
  • Free Key Log is free keylogger to record all keyboard actions, the exact words typed, the applications used and even the websites visited. It can run in hidden mode with no trace of the software, seemingly invisible to anyone and secretly monitor email, chats, internet navigation and all other behaviors of your employees, children, spouse, etc. Besides, it can backup the text you type, generate a log of entire keystroke activities automatically.
  • The encrypted file clipboard abylon SHAREDDRIVE is shown in the File Explorer on the desktop level and protect your secret files. The complete integration into the Explorer environment simplify using of the software. The encryption and decryption with the AES algorithm is done for each file operation automatically in the background. The file-based structure allow the simultaneous access of several users and reduce the backup data transfer volume.
  • Can't you remember all your passwords and write them on slips of paper? The alternative solution is the software abylon LOGON SSO Home. During the Windows login you must insert only a smart card, a CD or a USB flash drive and an optional password. The windows login and all further password and user-name inputs will be done automatically by the software. And when you remove your key, the computer will be logoff or shutdown immediately.
  • The file-safe automatically encrypts all files in the CRYPT-folder without entering the password every time. The the one-time entry of the password is sufficient to access the saved files and unauthorized users can not open this. Changes in the files will be updateded in the encrypted files automatically and the file-based design enables simultaneous access to multiple authorized users.
  • With this free file encryptor, you can protect your business documents, movies, music, photos, and other personal files from snoopers. Integrate with powerful algorithms to make sure there is no possibility to decrypt these files without our free file encryptor or your authorization.
  • Data Protecto is the world's best file encryption software for your computers which also features the most Secure Online Cloud Storage Service with Encrypted File Sharing with your friends. Data Protecto has 9 of the most advanced data protection features to protect their files, folders, drives, and applications from unauthorized access, use, and sharing. Data Protecto consistently protects your data in SAFE MODE, and runs in Stealth Mode.
  • Free EXE Lock provides optional encryption modes to lock your EXE programs: Speed priority - faster but not compressed; Security priority - slower mode, secure & compressed. It is able to lock executable programs on your computer to password-protect any executable file from non-authorized execution.
  • Free File Lock is a safe file encrypter program that can protect your important or sensitive files with uncrackable encryption algorithms. You can lock your files like images, music, movies as well as executable files & compressed files. It makes sure that no one can mess with your files without your authorization. Variety of cipher-methods make the encryption far more secure that nobody can decrypt it without the original password.
  • The all-in-one spy program which intercepts everything that is typed on keyboard, monitors visited websites, scans Windows clipboard for changes, makes screenshots every few minutes. It can also monitor both sides of IM chats and activity in social networks. And this program is absolutely invisible for everyone except you. You just have to press a speical hotkey, and enter your password to show the keylogger. You can easily read spy reports.
  • Keylogger secretly logs all Facebook use, keystrokes, chats & IMs, emails, web visits, video talk, microphone, user names, passwords, searches and more. It records instant messenger, such as Skype, Yahoo Messenger, ICQ and others. It takes screenshots like a surveillance camera. Runs silently and monitored users won't know it. Log reports will be sent to you via email or ftp.
  • Windows Spy Software secretly logs Facebook, keystrokes, chats, IMs, emails, websites visited, microphone, video talk, logins, passwords, applications, searches, documents and more. Logs Skype, Yahoo Messenger, ICQ, AIM, etc. Takes screenshots every x seconds like a spy cam. Sends logs to your email. You can check logs on a remote PC, tablet, smart phone, or directly on the monitored PC. Perfect for monitoring employees, kids and spouse.
  • Malicious File Hunter, or MFH for short, is a security software that runs on Windows and allows IT Security Administrators to search for the presence of one or multiple files across their entire network of Windows systems. For example, if a known malicious file is found on one computer, an IT Administrator can use MFH to check if any other system on the network is infected with the same malware. Search query is based on full, partial or wild card
  • Keylogger Spy Software secretly logs Facebook, keystrokes, chats, IMs, emails, websites visited, microphone, video talk, logins, passwords, applications, searches, documents and more. Logs Skype, Yahoo Messenger, ICQ, AIM, etc. Takes screenshots every x seconds like a spy cam. Sends logs to your email. You can check logs on a remote PC, tablet, smart phone, or directly on the monitored PC. Perfect for monitoring employees, kids and spouse.
  • Family Spy software is a keylogger, Facebook and system spy software for home PC monitoring. It secretly monitors and logs all their chats, emails, web site visits, videos watched, downloads, apps used, user names, passwords and more. It monitors Skype, Yahoo Messenger and other IMs. It sends log reports to your email every hour or sooner as you wish.

Page 11 of 30
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30


Legal disclaimer | Privacy policy

© 2004-2016 IT Shareware