Home | Submit a file  |  New  |  Categories  |  Our awards  |  Link to us  |  RSS Feeds

Utilities :: Security & Encryption
Sort by: date | product title | rating | downloads | popularity
Display: short descriptions | full descriptions
  • Today in the engineered world many users have major problems with the multitude of passwords. With the software abylon LOGON SSO Pro, the user only authenticate once at the windows logon and have additionally an automatic access to password protected applications. The program boasts with high flexibility, centralized administration and enhanced protection against keyloggers and phishing attacks.
  • Wise Password Manager Free is free password manager to store ID & password securely and create securer passwords designed to help manage your login IDs and passwords systematically. With Wise Password Manager Free, you can put all your passwords in one database, which is locked with one master key. It gives you an opportunity to remember one master password instead keeping in mind heaps of them.
  • History Clean is an award-winning evidence cleaning software that securely removes all recent activities of your PC and browsers' history. It supports all major browsers like Internet Explorer, Firefox, Safari, Google Chrome and Opera, and offers customized cleaning options to let you decide what to keep and what to delete everytime you use the program. Other features include third-party software history cleaning and file and folder shredding.
  • All-in-one 'smart' interface for ultimate PC security and private data protection. 9 levels of PC protection for your maximum security. Nobody can see, copy or delete your private data! Make your private files and folders invisible. Encrypt files and folders for ultimate protection. Lock your PC to prevent unauthorized access. Prevent access to any local/removable drives. Prevent data loss with secure cloud storage. Erase files permanently.
  • Hard drives, Flash Drives, SSD's nor USB sticks are safe from File Shredder Ultra. Within a few clicks, your selected data is set to be renamed and irretrievably shredded and overwritten, multiple times. Combined with the extra Free Space Shredder feature included free, your data has no where to hide. Works well for traditional mechanical hard disks and newer technologies such as SSD's.
  • Based on strong cryptography, Kryptelite combines convenience of a single-click solution with power of serious file encryption software based on military grade ciphering technologies. It offers one-click encryption operations for files and folders, as well as the ability to process arbitrarily large file sets in a single operation. Just do what you want to do, and Kryptelite will care of the rest - www.kryptel.com
  • JiJi Account Lockout Tool is a Account Lockout and Management Tool. Account Lockout Threshold Policy helps in further Active Directory Account Lockout. Account Lockout and Management Tools will Audit Account Management Computer, Audit Account Management Policy, Audit Account Management Security. Easy to use Account Lockout Policy Security Configuration. Security Audit Policy helps to prevent Active Directory Account Lockout. Account Lockout Duration, Account Lockout Status, Account Lockout Policy are important in Account Lockout analysis. Account Lockout is a note-worthy security standard in windows, established solely to prevent intruder's access on systems. Account lockout prevents the breach, however it doesn't explain you the sources and causes for the actions explicitly. Unlocking the accounts for an unknown cause opens the gate again. The unknown cause could very well be a potential threat or a program with the expired credential. Also on the other side of the lock out action, the ...
  • Anybody has private data, so in the modern online world encryption software is a necessity. Kryptel is based on the modern Advanced Encryption Standard, and provides features for basic encryption, encrypted backups, and much more. Kryptel combines convenience of a single-click solution with power of serious file encryption software based on military grade ciphering technologies. Just drag a file or a folder to the Kryptel icon and it is secured.
  • File encryption tools such as CyberSafe Files Encryption software provide you with the ultimate solution to protect your data from prying eyes whether it is being stored on an unprotected computer or sent over insecure communication channels. This software provides three automated modes of data encryption, with the highest level protecting your data with a Public Key value for the Microsoft Cryptography Service.
  • SPYERA is an application that you install on a mobile phone. After installation, SPYERA secretly records events that happen on the phone and delivers this information to a web account, where you can view these reports 24x7 from any Internet enabled computer or mobile phone. SPYERA PHONE version also allows you to listen live calls, listen surroundings of the target mobile, and to know the location of the device.
  • CryptBox creates secure Safes, that can be used just like normal drives and which can be filled with your data. All content of those safes are encrypted. Safes can only be opened if you know the password.
  • Roborub Software helps you secure your private data in a way that when you are deleting your data from your Computer, this Software would not made it recover again. That means, it removes your deleted data permanently from your Computer's Hard disk. It is very useful for computer and laptop users, especially the ones who has total concern with computer and has important & secret data to deal with. It is so because this software helps you to permanently delete those data from your Computer which you have deleted making it irrecoverable. Features: Works in background The software works in background in order to make it inaccessible for unauthorized users. Confirmation message before deleting You can set an option which shows the confirmation message before deleting any data from the Hard disk. Set User Id & Password for security You can set User Id & Password for accessing the Software Removes deleted data permanently The data that you are ...
  • This nice free security utility enables you to protect your PC by disabling some features like: use of the MS-DOS command prompt in Windows and real mode DOS applications from within the Windows shell, and disable function keys on boot up like the F5, F6 and F8 keys. The program is very useful if you want to disable the lowlevel access to your system. It's easy to use, excellent online help is also available. Try our password and security tools,
  • Program Protector is unique, state of art security utility that allows you to password protect programs. You can easily password protect any Windows application. Program Protector is very easy to use and does not require any special computer knowledge.
  • A lost VBA project password means you can't access the source code anymore. Don't guess the correct password - use VBA Password Recovery Master to recover VBA project passwords in MS Office documents virtually instantly! The tool flawlessly supports Word, Excel, PowerPoint and Outlook VBA projects, and can crack multiple documents at once. Add a well-designed and simple interface and you've got the ultimate tool to restore access to your work!
  • This software allows you to record all user activities by capturing keystrokes and Internet navigation. With Free Keylogger you will always know what's happening on your computer. You will be able to unveil all secret information including emails, chats, IM sessions, text documents. Plus you can catch all visited websites. The reports are stored into encrypted files, and you can view them anytime with the handy integrated Viewer.
  • Use Easy Disk Drive Safeguard to hide and lock your local, network, Floppy and USB drives as well as disable the AutoRun feature for them. A password protection can be applied to the program to prevent your users from changing the security settings you enforce.
  • CD-DVD Lock is intended for restricting read or write access to removable media devices such as CD, DVD, floppy and flash, as well as for restricting access to certain partitions of hard disk drives. CD-DVD Lock will allow you avoid many of headaches connected with unauthorized software installations from any removable media, and also prevent data leak by removable media.
  • Installing this program before your browsers are infected by malware or viruses gives you a free browser to surf the internet. Don't wait until your system is disabled to download this tool that is necessary to have before your browser is crippled and disabled. This rescue utility browser will run even when your system is infected. Regain the ability to surf the net and download software with this protected browser. You need this tool installed while your system is free from malware. Built in pop up blocker included kills any new window that appears. Saves you frustration by giving you access to the internet again. New app killer added that searches constantly for unauthorized applicatons and shuts them down for you to delete them. Use as a malware shield and app killer for constant protection. Saves endless hours reloading damaged programs from malware attacks. Buy any one program from our home page and get one program of equal or lesser value free!
  • With Free Keylogger 2014 you have a chance to uncover the truth. Record all user activities, including keystrokes, clipboard changes; monitor Web navigation and capture screen; record both sides of IM chats. This programs operates invisibly, allowing you to stay away from computer. It records every key typed on keyboard along with other activities, into special reports, every day. You can view recorded information later, using an special Viewer.
  • For most people, deleted files are like zombies: they're not really dead. When you delete a file, Windows changes a special byte and marks the occupied space as free space. But the file content remains unchanged on the disk. In this case, Free File Eraser is a big help for you, as it ensures the permanent deletion of multiple files/folders saved in different locations of computer system.
  • KeyLog Pro is an invisible easy-to-use surveillance tool that records every keystroke to a report file. KeyLogPro also monitors Internet activity by logging the addresses of visited homepages and can be used to Filter harmful and inappropriate content. It monitors time and title of the active application; even text in edit boxes is captured. Some features include: - Records everything typed, including emails, instant messages, chats, and website addresses into a report file - Monitor any programs used - Includes a Internet filter and Banned websites functionality - Simple to install - Password Protected and special Hot Key to invoke program - Excellent real-time backup device
  • Setup an Internet kiosk or a public access PC; disable access to vital files and allow only necessary applications to be run including Internet Explorer. Lock access to the desktop using username and password authentication, time-locked code (allows users to access PC for a given period of time only) or a combination of both. The program is ideal for public libraries, Internet cafes, information terminals or homePCs to limit children activities.
  • Protect Files and Folders is a an easy-to-use password-protected security utility you can use to password-protect certain files and folders, or to hide them from viewing and searching. Upon accessing any protected file or folder, dialog box querying password appears on the screen, and by entering a valid password, user gets access to the selected file or folder.
  • Access Lock is a system-tray security utility, which enables you to lock your PC with a password by two methods. The first one hides your desktop and shows a screen saver while the second one does not hide it allowing others to watch what happens there. It also prevents unauthorized access on boot, logs the attemps of breaking the lock and allows people around to leave messages while the system is locked.

Page 11 of 30
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30


Legal disclaimer | Privacy policy

© 2004-2015 IT Shareware