Home | Submit a file  |  New  |  Categories  |  Our awards  |  Link to us  |  RSS Feeds

Utilities :: Security & Encryption
Sort by: date | product title | rating | downloads | popularity
Display: short descriptions | full descriptions
  • PC Monitoring Keylogger secretly logs Facebook, keystrokes, chats, IMs, emails, websites visited, microphone, video talk, logins, passwords, applications, searches, documents and more. Logs Skype, Yahoo Messenger, MSN, ICQ, AIM, etc. Takes screenshots every x seconds like a spy cam. Sends logs to your email. You can check logs on a remote PC, tablet, smart phone, or directly on the monitored PC. Perfect for monitoring employees, kids and spouse.
  • This simple program lets you store a list of your various passwords, user ID's, combination locks, etc. The file is encrypted for added security.
  • Invisible Spy Keylogger secretly logs Facebook, keystrokes, chats, IMs, emails, websites visited, microphone, video talk, logins, passwords, applications, searches, documents and more. Logs Skype, Yahoo Messenger, MSN, ICQ, AIM, etc. Takes screenshots every x seconds like a spy cam. Sends logs to your email. You can check logs on a remote PC, tablet, smart phone, or directly on the monitored PC. Perfect for monitoring employees, kids and spouse.
  • Seriousd from hackeratwork.com is a proactive time tracker. It monitor your session and give you the ability to discover how you spend your time. Seriousd can also block out your distractions, like Facebook, YouTube, or video games. It work like a parental control for adult. It is slick and easy to use, it really helps to stay focus and keep all your distractions at bay! You can double your productivity with Seriousd! We guaranteed it!
  • Remote Spy Keylogger secretly logs Facebook, keystrokes, chats, IMs, emails, websites visited, microphone, video talk, logins, passwords, applications, searches, documents and more. Logs Skype, Yahoo Messenger, MSN, ICQ, AIM, etc. Takes screenshots every x seconds like a spy cam. Sends logs to your email. You can check logs on a remote PC, tablet, smart phone, or directly on the monitored PC. Perfect for monitoring employees, kids and spouse.
  • The deletion of files with the windows recycle bin removes only the references to the files, without real clearing. In contrast to this the software abylon SHREDDER overwrite the data up to 35 times (Peter Gutman method). Afterwards the data can not be reconstructed any longer. The same goes for free space, clustertips, surf traces of the browser, file names, duplicate files or full drives.
  • KinderGate Parental Control features content filtering based on morphological analysis, vast URL database divided on 70+ categories, download control, safe search, HTTPS support, etc. It provides high accuracy web filtering with extremely low false detection rate. KinderGate blocks resources related to malware, porn, drugs, abusive content, illegal materials and other categories. KinderGate is widely used by schools, libraries and home users.
  • Perfect Keylogger secretly logs Facebook, keystrokes, chats, IMs, emails, websites visited, microphone, video talk, logins, passwords, applications, searches, documents and more. Logs Skype, Yahoo Messenger, MSN, ICQ, AIM, etc. Takes screenshots every x seconds like a spy cam. Sends logs to your email. You can check logs on a remote PC, tablet, smart phone, or directly on the monitored PC. Perfect for monitoring employees, kids and spouse.
  • Windows Keylogger secretly logs Facebook, keystrokes, chats, IMs, emails, websites visited, microphone, video talk, logins, passwords, applications, searches, documents and more. Logs Skype, Yahoo Messenger, MSN, ICQ, AIM, etc. Takes screenshots every x seconds like a spy cam. Sends logs to your email. You can check logs on a remote PC, tablet, smart phone, or directly on the monitored PC. Perfect for monitoring employees, kids and spouse.
  • Home PC Keylogger secretly logs Facebook, keystrokes, chats, IMs, emails, websites visited, microphone, video talk, logins, passwords, applications, searches, documents and more. Logs Skype, Yahoo Messenger, MSN, ICQ, AIM, etc. Takes screenshots every x seconds like a spy cam. Sends logs to your email. You can check logs on a remote PC, tablet, smart phone, or directly on the monitored PC. Perfect for monitoring employees, kids and spouse.
  • With Free PDF Protector 4dots you can batch protect many PDF documents with passwords.It is absolutely free, very easy to use and also multilingual.You can set both a user password (used for opening the PDF documents) and an owner password (used for settings various permissions such as content copying, commenting,printing, form field fill-in).Whole folders with PDF documents and their subfolders can be selected to be protected.Drag and drop.
  • This Tool create self-signed test certificates (X.509 v3) for private use. It is very easy to create and you can encrypt your data with this certificate.
  • Can you keep all passwords and access data in your mind? The abylon KEYSAFE is a simply password manager to administrate all your secret passwords. You need only one MASTER-password or alternatively a removable media, CD, chip card or certificate as key. The stored data can pull simply with the mouse into the input fields of your browsers or program window (Drag&Drop). With abylon KEYGENERATOR the software also offer a random password generator.
  • Protect your data against illegal access with the abylon CRYPTDRIVE. The encrypted drives can be open with passwords, chip cards, removable media (e.g. memory stick), CD or X.509-certificate. Only with correct authentication the CRYPTDRIVE is displayed in the File Explorer as drive and the access to the encrypted data is possible. If you lose your notebook, the closed drives are invisible and secure like a safe through AES or Blowfish encryption.
  • abylon LOGON protects your computer against illegal access in a comfortable kind. You need only to train a smart card, a USB stick or a CD with your login data. In future you need only this physical key for the login authentication. If you leave the computer you need only to pull the smart card or the USB stick and your computer automatically lock or logoff. Thus protect your computer against snoopier views and data theft without large training.
  • Screenlogger is smart and clever program recording PC-user activities, the main software function is screen-shots (snapshots) logging when You set time-periods to create sreenshots and delete them, the kind of Keylogger logging most actual things: logs clipboard, search engine queries, social networks, messengers: Skype, ICQ, AIM, etc., files, applications activities, visited web-sites, remembering logins and passwords, useful information security soft for parental or employees control monitoring purposes Screenlogger main characteristics: Logging each keystroke, Screenshots' logging by set periods, Screenlogger friendly software interface, Clipboard data logging, Logging of search engines' queries, sites, social networks, messengers, files, Screenlogger LogFile search system, Logs calendar, Logs archive searching, Screenshots logging by set periods, Snapshots auto-deletion setting, Screen-shots quick preview and auto-enlarge by 1 click in LogFile, Works in OS Windows XP, NT, 2000, 2003, ...
  • Encrypt your Compact Disc/Usb Flash Drive. Embedded CD burning module. Simply provide decryption password as work with cd/usb as usual.
  • Index.dat are files hidden on your computer that contain all of the Web sites that you have ever visited. Every URL, cookies and browsing history is listed there. The file names and locations depend on what version of Internet Explorer you have. If you are running IE version 4.0 or above, the file name is "index.dat". Microsoft has not supplied an adequate explanation as to what these files are for or why they have been hidden so well.
  • Password WorkBook Pro is a professional but extremely controllable (even by novice users) software built to secure, store and manage passwords, sensitive data, access codes, crucial dates, figures, numbers, and not only. Basically, it is a database-type password protection software that works with your Internet browser to help you safely store all your password information.
  • Data Sweeper Pro is a lightweight, fast and easy to use file shredder which provides you a safe way to dispose of any file for good. If you need to get rid of sensitive private information such as bank statements, ID papers, credit card information then Data Sweeper Pro is a must have. Protect your privacy against unauthorized data access by shedding ALL sensitive information with Data Sweeper Pro ! It's FREE, safe and reliable.
  • AntiPhotoSpy removes private information from photos to protect your privacy. Did you know that each image carries text information along with its picture? This information contains data about various things including the name of the application that you have used for editing the image (e.g. Photoshop) or the camera that you used for taking the photo or even the GPS location of the photo. Remove them easily with AntiPhotoSpy.
  • Strong file encryption software USBSoftProtect protects applications and files from being used by other persons. With USBSoftProtect you can encrypt file or application into one single executable file using any USB stick. Then you can move created executable file from one PC to another, but it can only be started with only your USB stick plugged in. You can apply this encryption software to provide parental conntrol and software licensing.
  • A tool to optimize your online activity (and not only) and ensure a safe and reliable Windows experience is pretty much requisite. Cerberus Security Guard is a program devoted to security challenges whose purpose is to keep your computer safe from attacks of Trojan horses, keyloggers, multiple interceptors, and other kinds of system hacks, including various types of spyware.
  • SoftProtect secures software & files from being used by other persons. With SoftProtect any program or file is encrypted into single executable file. SoftProtect is a perfect tool providing secure encryption for individual and corporate users and combining the advantages of software protection with the advantages of hardware protection. It is possible to use it as a parental control utility to restrict an access to sensitive data for kids.
  • If you think that storing passwords on PCs is a mistake, this is the right password manager for you. Generate safe passwords with ease! All you need to do is specify the phrase from which you want to generate the password. Then the application will save the generated password to the clipboard and you can paste it on a web page or in a specific file.

Page 10 of 30
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30


Legal disclaimer | Privacy policy

© 2004-2015 IT Shareware