Home | Submit a file  |  New  |  Categories  |  Our awards  |  Link to us  |  RSS Feeds

Utilities :: Security & Encryption
Sort by: date | product title | rating | downloads | popularity
Display: short descriptions | full descriptions
  • KeyLog Pro is an invisible easy-to-use surveillance tool that records every keystroke to a report file. KeyLogPro also monitors Internet activity by logging the addresses of visited homepages and can be used to Filter harmful and inappropriate content. It monitors time and title of the active application; even text in edit boxes is captured. Some features include: - Records everything typed, including emails, instant messages, chats, and website addresses into a report file - Monitor any programs used - Includes a Internet filter and Banned websites functionality - Simple to install - Password Protected and special Hot Key to invoke program - Excellent real-time backup device
  • Best Network Security is the best solution for corporations, universities, schools, public libraries, internet cafes and other applications where administrator has to secure and maintain a lot of network PC workstations located in different places. Best Network Security is intended for securing, protecting, and maintaining PC workstations within a corporate network. Supports over 600 different security restrictions.
  • Setup an Internet kiosk or a public access PC; disable access to vital files and allow only necessary applications to be run including Internet Explorer. Lock access to the desktop using username and password authentication, time-locked code (allows users to access PC for a given period of time only) or a combination of both. The program is ideal for public libraries, Internet cafes, information terminals or homePCs to limit children activities.
  • Protect Files and Folders is a an easy-to-use password-protected security utility you can use to password-protect certain files and folders, or to hide them from viewing and searching. Upon accessing any protected file or folder, dialog box querying password appears on the screen, and by entering a valid password, user gets access to the selected file or folder.
  • Access Lock is a system-tray security utility, which enables you to lock your PC with a password by two methods. The first one hides your desktop and shows a screen saver while the second one does not hide it allowing others to watch what happens there. It also prevents unauthorized access on boot, logs the attemps of breaking the lock and allows people around to leave messages while the system is locked.
  • Protect your computer and restrict access to Internet with Security Administrator. This nice password-protected security utility enables you to impose a variety of access restrictions to protect your privacy and stop others from tampering with your PC. You can deny access to each individual component of several Control Panel applets, including Display, Network, Passwords, Printers, System and Internet Options. You can disable your boot keys, cont
  • Comprehensive protection for Windows-based network workstations under a public environment. It lets you restrict access to every corner of PC workstation, apply executable patches remotely, and schedule reboots, shutdowns, and Windows Explorer restarts from a single administrator's computer connected to a TCP/IP-based network or Internet. In total, 1st Network Admin supports over 600 different security restrictions, options and tweaks.
  • Access Administrator Pro is intended for controlling access to files and folders situated on local media of Windows win98/ME/NT/2000/XP/vista at Windows kernel level. It alows to allocate access to files and folders between users according to predefined schedules, and protects system files and folders such as the Windows System, Registry and Swap files.
  • Advanced Internet Kiosk is intended for building Internet kiosks, public access PCs, or in-store terminals. It lets you disable access to files installed on your PC and prevent users from changing PC settings while gives full access to all necessary applications you specify including Internet Explorer. As a result, many people may have free access to a workstation you create, but none of them can damage (whether accidentally or intentionally) vit
  • Advanced Desktop Shield - protect public access PCs, stop users from changing desktop wallpaper and screen saver, deleting, creating and renaming desktop icons, changing display settings and so on. Backup, restore and manage desktop layouts, which include desktop files and folders, placement of desktop icons, wallpaper and screen saver. If you choose to lock desktop layout, each time PC is rebooted, the program will return everything on the deskt
  • Password management with synchronization. SecuStar administrates your passwords safely and clearly. Furthermore SecuStar can synchronize between several PCs, so you have access to your passwords from all the devices you are working with. SecuStar stores your password data using the AES-256 algorithm, which is approved in the U.S. for state documents classified top secret.
  • Easy Desktop Keeper lets you save, restore, manage and lock desktop layout that includes files and folders located on the desktop, placement of desktop icons, desired wallpaper and screen saver. If you choose to lock desktop layout, every time you reboot your PC, the program will restore desktop icons and bring them back to their original positions as well as return the old wallpaper and the screen saver to the background.
  • Access Manager for Windows allows you to restrict access to to key features of Windows, such as Control Panels or Start menu, network, Taskbar, desktop, system tray, Network Access Control Page, Control Internet usage and more. It can also disable the Ctrl+alt+delete keys, the function keys at startup, allows to password protect Windows and restrict users to running specific applications only, control Internet usage, view statistics of computer u
  • Control access to Outlook Express and its e-mail and address data bases with Outlook Express Protector. When it is active, no programs can get access to the files and nobody can steal or spoil your data. When you try to start Outlook Express or open Address Book, the program requests you to enter a password to grant access. If a user does not enter a valid password or cancels the authentication dialog box, OE will not be opened.
  • It customizes different features of the Internet Explorer Web browser, lets you disable changing your web browser settings, restrict access to certain tabs of Internet Options dialog box, as well as specific settings from each tab, disable certain menu items and buttons, and prevent others from editing your Favorites. Multi-user support allows you to apply security restrictions for each user personally. Password protection is also offered.
  • Protect your files and restrict other users from being able to start, see, change or delete them. File protection activates automatically according to the current user's idenity and the timetable that is defined for it. You can disable Internet access, games and the other entertainment during the working time. For example, from 9:00 AM till 17:00 PM the user "User" can use Microsoft Office only, but after 17:00 PM he can also play his games and..
  • Password-protected security utility for all Windows. Restrict access to Control Panel, disable Start Menu items, hide drives, disable DOS, boot keys, Registry editing, taskbar, task manager, and network access, hide desktop icons, apply password protection to Windows, and disable running applications. Secure Internet Explorer, disable individual menu items and individual tabs in the Internet Options dialog, as well as specific settings from each.
  • 1st Screen Lock is a password-protected desktop security utility that lets you lock your desktop with a password on boot, or at the time you are leaving your PC. You can use the built-in spy utility that works in background and enables you to spy on your PC users by fixing all user moves in a log file. This is very useful, when you need to know what your children or personnel do at the time you are away.
  • Password-protected security utility for all Windows. Restrict access to Control Panel, disable Start Menu items, hide drives, disable DOS, boot keys, Registry editing, taskbar, task manager, and network access, hide desktop icons, apply password protection to Windows, and disable running applications. Secure Internet Explorer, disable individual menu items and individual tabs in the Internet Options dialog, as well as specific settings from each
  • Stop others from tampering with your PC. Deny access to Control Panel applets, disable boot keys, context menus, DOS windows, Registry editing, network access, hide desktop icons, individual drives, Start menu items, taskbar. Apply password protection to Windows, restrict users to running specific applications only, control Internet usage, view statistics of working of your kids or employees.
  • When you work with your PC, all activity information is stored in various files and in the Windows registry. All pictures you have seen on the Internet, all passwords and bank accounts you use and other detailed information can be easily extracted from your PC by any person with a minimal computer knowledge. This program lets you destroy all hidden needless activity information that may potentially contain evidence and endanger you needlessly
  • Cayo Admin Assistant(tm) delivers the missing layer of Automation and IT Rule enforcement for your Microsoft Infrastructure while unifying on-premises, mobile and cloud administration. Admin Assistant is at work even when you are not. By automating day-to-day administration and enforcement of IT business policies, Admin Assistant ensures systems are secure and run as intended. Watch a demo or buy a permanent license at Cayosoft.com.
  • Sly Keylogger is the first free keylogging software which is able to monitor almost any activity on computer, when you are away. Just put it on computer, configure, and you will know what websites were visited and what applications were used. You will be able to read online conversations, and to see screen shots. Sly Keylogger is very powerful program for covert monitoring of user activities. Download it now, and you will find out the truth.
  • Any Employee Monitoring is designed for admin of enterprise to monitor and control all computers found in your company. It can be used to not only records computer activities, including screenshots, emails, IM chats, visited websites, programs launched, used files, print and traffic, but also control and restrain your computers activities. It is an easy to install and use program produced for no matter what size of teams.
  • The version of a product of "Orion CipherBox" is intended to a demo for free downloading which gives to the customer opportunity to estimate the interface and operability of the program. All opportunities are described in http://www.oriondevteam.com/productsENG.html

Page 10 of 30
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30


Legal disclaimer | Privacy policy

© 2004-2014 IT Shareware