Home | Submit a file  |  New  |  Categories  |  Our awards  |  Link to us  |  RSS Feeds

Utilities :: Security & Encryption
Sort by: date | product title | rating | downloads | popularity
Display: short descriptions | full descriptions
  • Securely send emails to others on your network or on the internet. Messages are encrypted using the latest encryption algorithms and technology. Only the sender and receiver can decrypt and read an email.
  • Google Desktop, Google Toolbar, Chrome, Picasa and Earth: Almost every Google application sends information back home. GoogleClean prevents Google applications from sending unnecessary personal information. User IDs can be made anonymous, personal data can be deleted and spy cookies can be destroyed.
  • PDF Decrypt is a perfect tool that lets you to decrypt protected Adobe Acrobat PDF files, which have "owner" password set, preventing the file from editing(changing), printing, selecting text and graphics(and copying them into the Clipboard), or adding/changing annotations and form fields. Decrypted file can be opened in any PDF viewer(e.g. Adobe Acrobat Reader)without any restrictions -- i.e. with edit/copy/print functions enabled. All versions of Adobe Acrobat are supported. The standard security provided by PDF consists of two different methods and two different passwords. A PDF document may be protected by password for opening ('user' password) and the document may also specify operations that should be restricted even when the document is decrypted: printing; copying text and graphics out of the document; modifying the document; and adding or modifying text notes and AcroForm fields (using 'owner' password).
  • PDF Decrypt is a perfect tool that lets you to decrypt protected Adobe Acrobat PDF files, which have "owner" password set, preventing the file from editing(changing), printing, selecting text and graphics(and copying them into the Clipboard), or adding/changing annotations and form fields. Decrypted file can be opened in any PDF viewer(e.g. Adobe Acrobat Reader)without any restrictions -- i.e. with edit/copy/print functions enabled. All versions of Adobe Acrobat are supported. The standard security provided by PDF consists of two different methods and two different passwords. A PDF document may be protected by password for opening ('user' password) and the document may also specify operations that should be restricted even when the document is decrypted: printing; copying text and graphics out of the document; modifying the document; and adding or modifying text notes and AcroForm fields (using 'owner' password).
  • PDF Decrypt is a perfect tool that lets you to decrypt protected Adobe Acrobat PDF files, which have "owner" password set, preventing the file from editing(changing), printing, selecting text and graphics(and copying them into the Clipboard), or adding/changing annotations and form fields. Decrypted file can be opened in any PDF viewer(e.g. Adobe Acrobat Reader)without any restrictions -- i.e. with edit/copy/print functions enabled. All versions of Adobe Acrobat are supported. The standard security provided by PDF consists of two different methods and two different passwords. A PDF document may be protected by password for opening ('user' password) and the document may also specify operations that should be restricted even when the document is decrypted: printing; copying text and graphics out of the document; modifying the document; and adding or modifying text notes and AcroForm fields (using 'owner' password).
  • Lotus 1-2-3 Password by Thegrideon Software is Lotus 1-2-3 workbook password recovery tool. It allows you to recover Lotus 1-2-3 files (*.123, *.wk1, *.wk3, *.wk4) passwords for all security levels. Lotus 123 Password recovers passwords instantly regardless of password length and complexity.
  • Network Hotfix Scanner is a free advanced hotfix check utility that scans network computers for missing hotfixes and patches, and helps you download and install them. NetHotfixScanner gives you a quick look at the hotfixes and patches installed or missed on any remote computer in your corporate network, it tells you by colored icons specific security bulletin rating ( critical, important, moderate ), title, description and bulletin URL.
  • OnlineVNC Server is a quality and easy-to-use program that allows you to control your desktop from Web-Browser in Windows, Linux or Mac OSX. VNC Viewer for the server uses Web Browser's technology and requires no installation at all. With this solution you can use your desktop from anywhere - from home, from work, from Internet cafes, hotels, everywhere where there is Internet and a Web Browser. It's supports FTP Server inside for File Sharing.
  • Monitor network connections to your shared resources, find out who opens your files over local network. Protect your servers, be notified when an intruder opens secure or private folders and files. The program writes a log file with information on remote user name, files and folders accessed, date and type of access. It also generates screen, sound, and e-mail notifications, runs external applications on connections to your shared folders.
  • Advance Spy Software Pro is a Complete Stealth Monitoring Software that can both monitor your Local PC and Remote PC. Advance Spy Software will monitor remote PC in realtime. Advance Spy Software will also capture WebCam shots and record surrounding sounds. Now Works behind Firewalls and Routers. New: Powerful Anti Spy. v13 includes - Sim Card Undelete - undelete data from Sim Card.
  • SpyPal secrectly records Facebook, keystrokes, screenshots, websites visited, applications, Skype, Yahoo Messenger, clipboard, passwords, emails, documents, microphone and more. In Stealth Mode, it is completely invisible to monitored users. Use hotkey and password to access the program. Automatically sends logs to your email or ftp every x seconds. Perfect for monitoring employees, children, spouse and investigating crimes.
  • OPSWAT Security Score is a free tool that evaluates the status of your installed applications and provides a score for a snapshot view of your security status. Your score is based on the antivirus, antiphishing, firewall, backup and other applications you have installed as well as the current status of those applications. The tool also shows you which of your applications are OPSWAT Certified and provides information on how to improve your score.
  • SGS KeyLogger is utility that records ALL ascii keystrokes, including passwords, to special log files. Install KeyLogger and EVERY single keystroke of your computer's users type will be captured and recorded. It helps to prevent data lossing when you work with multiple programs. You can use our KeyLogger if you want to know what has been done on your PC during the time you were absent.
  • ENC Encryption Software is easy-to-use program designed for reliable protection any files, using high-speed on-the-fly algorithm of encrypting.Why do you need encryption software?Practically each user of computer keeps confidential information on it. For example, personal data, credit card number, documents for working, personal pictures, movies and more.
  • Any Parental Control Software can help you to keep track of what your child is doing online. With its help, parents are able to see everything typed onto the keyboard, including but not limited to emails, instant messages, social networking activity, chat, etc., capture screenshots taken at certain intervals, set time limits for kids' Internet use, and block websites and applications.
  • FxCryptor is unique software which has a completely unbeatable security system which has many security features. 256 - Bit AES encryption based data security system that provides data protection using 256-bit AES encryption. It allows you to secure your data with various password protection schemes like text, all types of file like photo, song, etc or hardware based USB or flash drive as a password.
  • Trace My Notebook is a combination of software and website allowing to locate stolen notebooks and to establish countermeasures against such foul play like dishonest employees or industrial espionage. It silently surveils selected computers and collects evidence of illegal activities. All the evidence as well as notebook's location based on GPS, WiFi and IP, are reported to the legitimate computer's owner via the www.tracemynotebook.com website.
  • There are many ways and tools to delete the trail you leave on your computer when you visit websites - but this one already washes it away while you are surfing! The program runs nearly unrecognizable in the background. Just surf the web as always without any loss of comfort. 1-abc.net Surf Trail Washer lets your internet trail (temporary internet files, cookies, history, URLs) simply disappear as you would have not visited any websites at all!
  • Transferring sensitive data via e-mail or removable drives is not safe. Max File Encryption is a powerful yet easy-to-use encryption/steganography software that will help you protect your confidential information. With Max File Encryption, you can encrypt files of any type, hide files and also create self-decrypting packages. The program uses the strong and ultra-secure Blowfish encryption algorithm that ensures your data safety.
  • Secret File Messenger is a steganography software and you can easily encrypt file or text message and hide it in a picture. Once a file is hidden in an image the saved picture is still a picture, it will load just like any other image and appear as it did before, the only difference will be that it contains hidden file. The image can be saved, emailed, uploaded to the web as before the only difference will be that it contains hidden data. You can also decrypt and extract your hidden file or message. It is extremely user-friendly tool and help you step by step with its wizard. File security and integrity are currently the most important issues in the world of information technology. Keep your private data safe with the help of Secret File Messenger. Key Features : Hide Secret and Confidential File into an Image. Support JPG/PNG/BMP/GIF/TIF Image format. Support ALL Major File Format like (DOC/DOCX/XLS/XLSX/PPT/PPTX/TXT/INI/RTF/PDF) Encrypt File Before Hiding. Extract & Decrypt Hidden File ...
  • Smart Protector is an easy to use software, that completely erases history, cookies, temporary files(cache), typed URLs(the drop down address list), AutoComplete, recent document list, recycle bin and more. It allows you to choose which of these items to clear and which to keep. Other features: Cookie Manager; Save/Restore State; Scheduling; Stealth mode; Emergency Key; Deleting of custom files and folders; Recent Program Files.
  • Cayo Policy Manager(tm) provides the missing layer of automated IT Policy and business rule enforcement for Active Directory (AD). Demanded by compliance officers, auditors, security admins and busy day-to-day administrators, Policy Manager helps sustain security, compliance and efficiency twenty four hours a day, seven days a week. Watch a demo or buy a permanent license at Cayosoft.com.
  • Any Keylogger Free, as one of hot monitor software in the world, is widely applied to parental control, employee monitoring and private detective service. The keylogger allows you to record entire activities, including online chat details, clipboard contents and other activities performed on your PC. It can also captures screenshots at regular time of interval so that you can easily know what is happening on computers in your absence.
  • Spy Keystroke Logger is a secret keystroke recorder program to spy PC activity at home or workplace. This keyboard recorder help you know everyting happened on the PC at anytime as a surveillance tool. It logs all keystrokes and captures sthe screen activities stealthy; this keylogger software supports remote spy through logs report delivery with email. It's a best solution to spy your kids, spouse and employees as a power surveillance tool.
  • Hide ALL IP is the worlds best IP hide software, hide all your applications and games IP from snoopers & hackers, allows you to surf anonymously, prevent identity theft, and guard against hacker intrusions, all just a click. Hide ALL IP is unique hide ip software support UDP and http tunnel.

Page 11 of 30
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30


Legal disclaimer | Privacy policy

© 2004-2014 IT Shareware