Home | Submit a file  |  New  |  Categories  |  Our awards  |  Link to us  |  RSS Feeds

Utilities :: Security & Encryption
Sort by: date | product title | rating | downloads | popularity
Display: short descriptions | full descriptions
  • Keylogger Spy Monitor spy software can secretly record all keystrokes typed on your computer. It runs completely invisiblely. You can check logging reports by simply receiving emails or opening a web page. Perfect for catching cheaters, m onitoring employees, children or spouse, acquiring others' passwords and even investigating crimes. Use hotkey to unhide it from Stealth Mode and protect the program access by password.
  • Pdf encryption software lock pdf data with strong 128 bit encryption security level protection. Program is responsible for protecting batch pdf documents with open password security and owner password restrictions. Pdf encryption software facilitates to restrict desired function in any pdf file i.e. you can enable or disable pdf printing, copying, form filling, signing, commenting, editing, modifying etc permissions according to requirement. Application is Windows compatible, support RC4 40 bit & 128 bit encryption protection. In fact, you can secure bulk pdf documents only with open (user) password without applying any restrictions. This easy to use and awesome utility has inbuilt user help manual and does not require any extra technical skills for operating. Download free evaluation version of pdf security software, protect your private and confidential data from un-authorized access, prevent piracy & fraudulent. Program prompt for open password once set into the pdf and only intended person ...
  • PCMate Free Privacy Cleaner is a safe & easy-to-use privacy protection tool to protect your privacy by cleaning up all Internet traces and past computer activities. As you work on computer or browse the Internet, you leave behind traces. With a simple click, this free privacy cleaner can find and remove the internet tracks like cache, cookies, temporary internet files, run history and more from browsers like Internet Explorer, Opera, etc.
  • Effective and Cost effective Mac Monitoring Utility downloads trail demo from www.macmonitoring.net and you can monitors all internet, USB insertion or removal activities from your Mac system which are performed by other person on your computer machine without your permission. Time saving Internet recording application captures keystrokes, clipboard activities and voice chat conversation along with accessed desktop screenshots at regular interval of time. Comprehensive computer monitoring utility provides best methodology to monitors all USB mass storage devices insertion and removal activities from your Mac machine when you not available on your system which are performed by hackers. Easy to use monitoring internet utility provides user friendly Graphical GUI interface with help menu and non technical or technical operator easily drive to monitoring tool with any training or supports. Innovative or highly technical Mac monitoring software is beneficial for all colleges, universities, institutes, investigatio ...
  • PassBoom presents a completely free password generator for your computer. It creates easily memorable yet extremely secure and complex passwords which you can use for the online services and other password-protected features that you access. The software is extremely easy to use and, best of all; it is available completely free for both home and commercial use.
  • MessageLock adds email encryption and zip file compression to Microsoft Outlook. MessageLock provides 1-click encryption of email messages and file attachments within Microsoft Outlook. It combines strong U.S. Gov't approved AES-256 bit encryption with the universal compatibility of the Zip file format. MessageLock delivers email encryption and zip compression for your message and/or file attachments.
  • zebNet Windows Keyfinder 2012 is a utility that retrieves your Windows Product Key used to install Windows from your registry. Another feature is the ability to save your Windows Product Key in a text file.
  • Forensic Studio Ultimate extracts more types of digital evidence from suspects' hard drives than ever, speeding up investigations by creating still presentations of lengthy videos. In addition to Web browsing data including favorites, history and cookies, instant messenger communications, chats and office documents, Forensic Studio Ultimate can analyze pictures and videos, detecting files that contain pornography, human faces or scanned documents
  • Safe Deleter is a secure data erase tool for Windows. It completely removes sensitive data from your hard drive by overwriting it several times with military strength selected patterns.
  • Secure Erase: ProtectStar Data Shredder 3 Professional is a state-of-the-art and professional tool that has won numerous awards and that allows for secure deletion of data from hard drives and external data storage devices. This user-friendly solution, which runs under Microsoft Windows, enables users to efficiently delete their data in such a way as to preclude reconstruction, even by government agencies.
  • Remo File Eraser a secure data eraser application, which erases important and confidential files / folders beyond recovery. The software is also capable of wiping free disk space to erase deleted data using various shredding patterns leaving no traces of critical data. Superior drive wipe feature facilitates you to wipe entire hard drive permanently.
  • Power Spy software secretly logs Facebook use, keystrokes, chats & IMs, emails, web visits, games, searches, shopping history, user names, passwords and more. It supports Windows Live Messenger, Yahoo Messenger, Skype, ICQ and more. It's invisible to monitored users. However, it is easy for you to unhide its interface with hotkeys. You can receive reports remotely via email or ftp. Perfect for monitoring employees, kids and spouse.
  • PCBooster Free Keylogger provides you the ability to secretly capture all keystrokes to keep your employees, kids & spouse in check. Just launch it in the computer you have access to and it will, in real-time, record the words typed, the webpage visited and even the program used. With the detailed report, you won't miss any keystroke happened. Most of all, it can work silently in hidden mode, making your monitoring invisible.
  • NTFS Permissions management on Windows File Servers is now made easy with Vyapin?s NTFS Security Manager ? a powerful NTFS permissions management tool to secure your Shares, Folders and Files on windows servers and workstations across your entire network. NTFS Security Manager helps to manage the security of your Windows File servers by allowing you to grant, revoke and modify NTFS permissions for users and groups across your organization by using the built-in rules for assigning permissions. Protect your unstructured data across file servers by removing unwanted permissions and allowing access to only authorized accounts to your confidential folders and files.
  • Keylogger silently and untraceably records every moment PC actions and make encrypted reports about them. Keylogger is hidden application not visible to the user being monitored and not shown in control panel-add pr remove programs, task manager, start menu, no file or folder and not anywhere on your computer system. Keylogger generates password protected log file reports in HTML and provides options to categorize, insert, delete or display reports in accordance with corresponding date and time attributes. Keylogger is surveillance software with which other users cannot know that their activities are being controlled and original user can get all tracked information with date and time parameters. Why Keylogger is Important? 1. Tracks and controls every action carried out by other users on your computer system. 2. Record chats acted upon using various chat programs like Yahoo Messenger, Skype, Gmail, Orkut, Facebook and others. 3. Take visual picture of all chats, every mouse click and all typed keyst ...
  • The Internet is a dangerous place to your kids. With JuniorWatch you may have the peace of mind. You will sure your kids are safe. After you sign up the service, and install the client software on your junior's computer, the client software will consistently report locations, screen and webcam shots, and even key strokes from the computer. You can access the reports from any computer.
  • bio-iVault uses the well respected myBiometrix Biometric platform to deliver Finger, Face and Voice recognition to securely create and manage biometric Encrypted Virtual Drives on a computer and other external storage devices by simply scanning ones biometric. The bio-iVault drives appears just like a normal drive in Explorer, so you can create, edit and delete files and folders just as you would on a normal drive however data is encrypted
  • JiJi Password Expiration Notification is a simple tool to notify users, managers and administrators through e-mail before their password and account expire. Administrator can receive the summary report to the specific email ids. Administrator can define the notification task for any specified target (Domain, an OU, Group, Set of Users).
  • SkyCrypt is a FIPS 140-2 validated Cloud Encryption Gateway. It allows users to add 256 bit AES encryption to local drives, Google Drive, Dropbox, Bitcasa, SkyDrive or most any other cloud storage service. SkyCrypt features include : NIST FIPS 140-2 validation, AES 256 bit encryption, optional 2 factor authentication via Google Authenticator for IOS or Android, and encrypted file names
  • PC TimeWatch manages access to the computer, to the Internet and to programs on the computer. You can define a set of rules for every person who uses the computer. The idea for the utility was inspired by requests from parents wanting to manage childrens' time on the computer. PC TimeWatch allows parents to define rules that should be discussed with their children. Once the rules are accepted by everyone, PC TimeWatch enforces them automatically, thus defusing any conflict between parents and children. Most similar programs have major security holes, and are easily disabled by anyone with a moderate degree of knowledge about computers. Not PC TimeWatch, which is much safer. And you don't need to be a computer geek in order to use it. PC TimeWatch was developed in collaboration with the team that created the classic PC Magazine Utilities, and this is reflected in its carefully chosen feature set and very simple, user-friendly interface. Businesses also find it useful for preventing ...
  • Lazesoft Recover My Password Home Edition is a very easy to use Windows password recovery freeware. With its simple sleek interface, novice users can enjoy the step-by-step wizard in recovering Windows password job. It allows home users to reset their lost Windows logon password easy and instantly. It allows users to retrieve product keys from unbootable Windows installations. It creates a Windows password recovery CD. And most of all, it's the most popular and safe solution for recovering your Windows password until now. New Features: * Resets passwords with a bootable USB drive. * Retrieve product keys from unbootable Windows installations! * WinPE Recovery CD Builder! Main Features of Lazesoft Recover My Password Home Edition: * 100% recovery rate. * Let you recover your administrator's password with a few clicks. * Easy to install and use with a very handy and clear user interface. * Automatically detects several operating systems installed on t ...
  • Login to your PC without touching a thing! Luxand Blink! Pro is a tool to let you log in to your Windows account by simply looking into a webcam - no passwords to type and no fingers to scan. The innovative face recognition technology developed by Luxand recognizes users' faces quickly and reliably, and is able to match the user with an associated account even with different haircuts, beards or mustaches grown or shaved off.
  • EBook protection software can lock multiple PDF documents with owner and user password encryption. Owner password is used to prevent accessing of document features like printing, copying, modifying, commenting, signing, extracting images, assembling and copying content for accessibility and user password is used to block opening of PDF documents. It works on all Windows 32 bit and 64 bit operating system like XP, Vista and 7.
  • The notes nsf local security software enables the user to access that NSF database which is under local security. That is, by using the notes nsf local security removal tool the user can remove local security which is set on the NSF database. It is susceptible of handling the numerous error messages which the user face while accessing the unauthorized NSF database such as "You are not authorized to access that database" and "You are not authorized to perform that operation". Despite of having such a wondrous capability to solve such complicated errors, this software is extremely simple to use and does not require much technical efficiency to get operated by the user. Moreover, it provides quick access to the NSF database and is available at a really affordable price. Furthermore, the notes nsf local security removal tool is compatible to use with almost all versions of Lotus notes. For more information please visit www.nucleusdatarecovery.org
  • Spyrix Free Keylogger logs every activity:keystrokes, passwords, screenshots, web sites visited, chats, emails, IM at periodic intervals. This tool is valuable for parents wanting to monitor their kids' PC use. We also recommend Spyrix Free Keylogger to business owners concerned about liability from use of company PCs.

Page 10 of 30
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30


Legal disclaimer | Privacy policy

© 2004-2014 IT Shareware