Home | Submit a file  |  New  |  Categories  |  Our awards  |  Link to us  |  RSS Feeds

Utilities :: Security & Encryption
Sort by: date | product title | rating | downloads | popularity
Display: short descriptions | full descriptions
  • Simple application that prevents launch of any processes that you specify. It can be used, for example, in order that the children could not play games in your absence. You can register in the autorun, it will run in stealth mode, call using hot key Ctrl-Shift-F5. You can use it for free.
  • AdSysNet Self-Service Password Reset is a web based active directory self service password reset tool. User web console lets the users to reset password and submitting the requests to the help desk admins. HelpDesk console lets help desk admins to process the password reset and update profile requests from the users. Admin console helps to configure the security settings and view the audit report. Logon screen password reset feature is supported.
  • iKeylogger PRO has deservedly earned its reputation as the most trusted monitoring software in the world, the most feature-rich, being easy and intuitive... even for beginners! The World's Best-Selling Monitoring Software Free Download!Monitor everything they do on they do on computer and internet invisibly Monitor Facebook,Chat/IM, password, web sites visited, keystroke, email Record all voice chats and video chats smartly (Microphone Spy)
  • PC Ports and connections data monitoring, logging and analyzing software. Device Monitor is an USB, Serial and Network protocol analyzer, data logger software and may be used to capture, log, view and analyze data coming to and out of your computer. Recorded log files can be replayed later even on another computer. Device Monitoring Studio provides you with complete set of features to figure out what's going on when device is connected to the PC
  • Secure Erase: ProtectStar Data Shredder 3 Professional is a state-of-the-art and professional tool that has won numerous awards and that allows for secure deletion of data from hard drives and external data storage devices. This user-friendly solution, which runs under Microsoft Windows, enables users to efficiently delete their data in such a way as to preclude reconstruction, even by government agencies.
  • Forensic IM Analyzer helps forensic professionals extract more digital evidence from suspects' hard drives. Extract and analyze log files, communication histories and contact databases of a wide range of instant messenger applications. More than 80 messenger apps are supported including Skype, AOL, ICQ, MSN Messenger, Yahoo! Messenger, RQ, Miranda, MySpace IM, SIM, QIP, QIP Infium, Trillian, AIM, Digsby, Rambler Virtus, Mail.Ru Agent, QQ etc.
  • The notes nsf local security software enables the user to access that NSF database which is under local security. That is, by using the notes nsf local security removal tool the user can remove local security which is set on the NSF database. It is susceptible of handling the numerous error messages which the user face while accessing the unauthorized NSF database such as "You are not authorized to access that database" and "You are not authorized to perform that operation". Despite of having such a wondrous capability to solve such complicated errors, this software is extremely simple to use and does not require much technical efficiency to get operated by the user. Moreover, it provides quick access to the NSF database and is available at a really affordable price. Furthermore, the notes nsf local security removal tool is compatible to use with almost all versions of Lotus notes. For more information please visit www.nucleusdatarecovery.org
  • Effective and Cost effective Mac Monitoring Utility downloads trail demo from www.macmonitoring.net and you can monitors all internet, USB insertion or removal activities from your Mac system which are performed by other person on your computer machine without your permission. Time saving Internet recording application captures keystrokes, clipboard activities and voice chat conversation along with accessed desktop screenshots at regular interval of time. Comprehensive computer monitoring utility provides best methodology to monitors all USB mass storage devices insertion and removal activities from your Mac machine when you not available on your system which are performed by hackers. Easy to use monitoring internet utility provides user friendly Graphical GUI interface with help menu and non technical or technical operator easily drive to monitoring tool with any training or supports. Innovative or highly technical Mac monitoring software is beneficial for all colleges, universities, institutes, investigatio ...
  • Facebook Spy Monitor is a Facebook profile monitoring and parental control software. It secretly records PC users' Facebook private profile, emails, chats & IMs, photos, interests, contatcts and events by taking screen snapshots periodically. It also records popular Facebook instant messenging clients and Facebook related web sites and searches. See exactly what users were doing just like watching a surveillance video playback.
  • Lock your desktop with one mouse and prevent anyone from accessing your programs and your importand data, no one can access your locked desktop without the valid password, mte desktop locker provide the following features: - lock your desktop with virtual desktop, - you must enter valid password to access the desktop, - show custom alert to any one try access your locked desktop, - you can select from many virtual desktop lockers, - mte desktop locker prevent access to task manager program in the locker mode, - mte desktop locker prevent access to the following keys: (CTRL+ALt+Del), (Alt+F4) to prevent closing the application, - you can lock your desktop with transparent desktop locker, - mte desktop locker provide log feature that enable you record all mouse clicks and invalid passwords input to know if someone try to open your protected desktop, - program allows you to set password to protect the options dialog for more security, - you can set the program to run at windows startup, - program allows you to p ...
  • Location Safe obtain the GPS location of your child's phone by sending a SMS to the Target device. Location Safe can track the location of your phone at any time, obtain exact location on the planet of your child/employee, GPS information that can be plugged into any popular mapping software, Ensure that your child is safe and your employees are where they are supposed to be. Location Safe is very easy to use and Install in your mobile.
  • Pdf encryption software lock pdf data with strong 128 bit encryption security level protection. Program is responsible for protecting batch pdf documents with open password security and owner password restrictions. Pdf encryption software facilitates to restrict desired function in any pdf file i.e. you can enable or disable pdf printing, copying, form filling, signing, commenting, editing, modifying etc permissions according to requirement. Application is Windows compatible, support RC4 40 bit & 128 bit encryption protection. In fact, you can secure bulk pdf documents only with open (user) password without applying any restrictions. This easy to use and awesome utility has inbuilt user help manual and does not require any extra technical skills for operating. Download free evaluation version of pdf security software, protect your private and confidential data from un-authorized access, prevent piracy & fraudulent. Program prompt for open password once set into the pdf and only intended person ...
  • PassBoom presents a completely free password generator for your computer. It creates easily memorable yet extremely secure and complex passwords which you can use for the online services and other password-protected features that you access. The software is extremely easy to use and, best of all; it is available completely free for both home and commercial use.
  • Purpose of NotRun: - prevent start selected programs ( is working with more programs). - provide you a user-friendly interface - be simple and easy to operate Customized capabilities of NotRun software. - run NotRun when started Windows (this function is active by default) - password protected access to NotRun (this function is not active by default) - when NotRun is started, it minimized to system tray
  • Employee Desktop Live Viewer is an eminent, comprehensive, and completely reliable PC spy software that helps you keep track of your employees’ computer desktop activities by monitoring them from a distance. In order to monitor the users, you first need to install the software on the employees’ computer systems. You can install the PC spy software on your employees’ computers from a distant computer system; the only condition is that your employees’ computer systems must be in a network. Also, as you install the software from a distance, your employees would never come to know that any such software is installed on their computer system. Another amazing feature of this PC spy software is that while you monitor your employees’ from a remote machine, your employees do not even know that they are being monitored. Although your employees would never come to know that they are being monitored, you can deliberately send notification messages to your employees that they are being monitored. Yet another ...
  • JiJi Password Expiration Notification is a simple tool to notify users, managers and administrators through e-mail before their password and account expire. Administrator can receive the summary report to the specific email ids. Administrator can define the notification task for any specified target (Domain, an OU, Group, Set of Users).
  • AntiPhotoSpy removes private information from photos to protect your privacy. Did you know that each image carries text information along with its picture? This information contains data about various things including the name of the application that you have used for editing the image (e.g. Photoshop) or the camera that you used for taking the photo or even the GPS location of the photo. Remove them easily with AntiPhotoSpy.
  • Deleted files can always be recovered if nothing is overwritten over the harddrive sector where they were before deletion. PCBooster Free File Shredder could lend you a hand in case you have some private files of high importance and you want them gone forever so that nobody can retrieve them. It provides thorough deletion of all types of files - no one, even the hackers with most advanced recovery tools, can get them back.
  • Free Text Encrypt is a freeware secure text encryption software. It uses the Advanced Encryption Standard (AES) specification to protect your confidential data. The AES encryption algorithm secures the sensitive and unclassified information from illegal access. Free Text Encrypt will encrypt your document and convert into a text form that can be copied and pasted into any text editor, or e-mailed.
  • MessageLock adds email encryption and zip file compression to Microsoft Outlook. MessageLock provides 1-click encryption of email messages and file attachments within Microsoft Outlook. It combines strong U.S. Gov't approved AES-256 bit encryption with the universal compatibility of the Zip file format. MessageLock delivers email encryption and zip compression for your message and/or file attachments.
  • The OKcookie is a plugin that allows webmasters to comply with the new EU Cookie Law. The Cookie Law requires informed consent to place cookies on a users browser. It takes your website essential First Party Cookies and securely stores them until the user agrees to the use of Cookies. It allows essential functions of your site to remain working by placing the Master cookie on the browser. Which acts as a Master Cookie to all of the functions.
  • This is a free monitoring software designed for covert invisible surveillance. The main function of the program is keystrokes recording, but it can also capture visited web pages and save text data from Windows clipboard (copied text). WIth this program, you will always know what the users are doing on computer. This is a prefect solution for parents who care about their child's online safety; for system administrators, chiefs and so on.
  • Forensic Studio Ultimate extracts more types of digital evidence from suspects' hard drives than ever, speeding up investigations by creating still presentations of lengthy videos. In addition to Web browsing data including favorites, history and cookies, instant messenger communications, chats and office documents, Forensic Studio Ultimate can analyze pictures and videos, detecting files that contain pornography, human faces or scanned documents
  • Lazesoft Recover My Password Home Edition is a very easy to use Windows password recovery freeware. With its simple sleek interface, novice users can enjoy the step-by-step wizard in recovering Windows password job. It allows home users to reset their lost Windows logon password easy and instantly. It allows users to retrieve product keys from unbootable Windows installations. It creates a Windows password recovery CD. And most of all, it's the most popular and safe solution for recovering your Windows password until now. New Features: * Resets passwords with a bootable USB drive. * Retrieve product keys from unbootable Windows installations! * WinPE Recovery CD Builder! Main Features of Lazesoft Recover My Password Home Edition: * 100% recovery rate. * Let you recover your administrator's password with a few clicks. * Easy to install and use with a very handy and clear user interface. * Automatically detects several operating systems installed on t ...
  • Power Spy software secretly logs Facebook use, keystrokes, chats & IMs, emails, web visits, games, searches, shopping history, user names, passwords and more. It supports Windows Live Messenger, Yahoo Messenger, Skype, ICQ and more. It's invisible to monitored users. However, it is easy for you to unhide its interface with hotkeys. You can receive reports remotely via email or ftp. Perfect for monitoring employees, kids and spouse.

Page 10 of 30
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30


Legal disclaimer | Privacy policy

© 2004-2015 IT Shareware