Home | Submit a file  |  New  |  Categories  |  Our awards  |  Link to us  |  RSS Feeds

Utilities :: Security & Encryption
Sort by: date | product title | rating | downloads | popularity
Display: short descriptions | full descriptions
  • Encrypt and convert pptx or ppsx to exe with password protected, support PowerPoint 2003, PowerPoint 2007, PowerPoint 2010 and later. You can add additional files required by this PowerPoint file into one single exe, such as flash, video, audio or other files, all files can be protected distributed. The encrypted file support One Computer One Password license to your user's computer, Only you can create open password for your users.
  • Today in the engineered world many users have major problems with the multitude of passwords. With the software abylon LOGON SSO Pro, the user only authenticate once at the windows logon and have additionally an automatic access to password protected applications. The program boasts with high flexibility, centralized administration and enhanced protection against keyloggers and phishing attacks.
  • Effective and Cost effective Mac Monitoring Utility downloads trail demo from www.macmonitoring.net and you can monitors all internet, USB insertion or removal activities from your Mac system which are performed by other person on your computer machine without your permission. Time saving Internet recording application captures keystrokes, clipboard activities and voice chat conversation along with accessed desktop screenshots at regular interval of time. Comprehensive computer monitoring utility provides best methodology to monitors all USB mass storage devices insertion and removal activities from your Mac machine when you not available on your system which are performed by hackers. Easy to use monitoring internet utility provides user friendly Graphical GUI interface with help menu and non technical or technical operator easily drive to monitoring tool with any training or supports. Innovative or highly technical Mac monitoring software is beneficial for all colleges, universities, institutes, investigatio ...
  • The all-in-one spy program which intercepts everything that is typed on keyboard, monitors visited websites, scans Windows clipboard for changes, makes screenshots every few minutes. It can also monitor both sides of IM chats and activity in social networks. And this program is absolutely invisible for everyone except you. You just have to press a speical hotkey, and enter your password to show the keylogger. You can easily read spy reports.
  • Belkasoft Facebook Profile Saver is a free tool to save the content of Facebook users' profiles for offline use. Designed for computer forensic and IT security specialists, Belkasoft Facebook Profile Saver automates the routine of downloading Facebook pages and resources for offline examination and printout. Local copies of Facebook profiles can be used as court evidence.
  • CryptDecrypt provides an easy way to protect your sensitive information. CryptDecrypt securely encrypts your data with a password that you select. CryptDecrypt includes several encryption algorithms to protect your data: AES (USA Government Standard) Triple-DES, GOST, RC2, RC4 and Windows Data Protection API.
  • Make use of Kernel File Shredder and delete files or folders from computer?s hard disc permanently. The best aspect about this tool is it comprises of multiple shredding algorithm to make files shredding impeccable. What makes it more special is its remarkable feature of data shredding algorithm. This algorithm has been embedded in this software that allows the user to select and shred files and folders depending on the data sensitivity. Apart from this, the product helps you to automatically shred the temporary system files, content of the Recycle Bin, and free disk space along with allowing you to shred them manually whenever you want. Another great aspect about Kernel File Shredder tool is it facilitates you specify password for secure software access so that no one can use it for destroying purpose. Moreover, you don?t even require spending pointless time in getting familiar with or installing such computer program into your personal computer. It doesn?t matter, whatever is the format of file that you wan ...
  • Power Spy secretly logs Facebook, keystrokes, chats & IMs, emails, web visits, video talk, logins, passwords, applications, searches and more. It also takes screenshots like a surveillance camera. Let you see exactly what they see on a computer screen. Automatically sends log reports to your email or ftp. Starts monitoring with system startup. Runs silently and invisibly. Only administrator of the software can manage it with hotkey.
  • Stealth Parental Control offers a complete Internet Monitoring and Parental Control Software solution. Stealth Parental Control can secretly record information on your computer and allows you to specify what days and hours your children may access the computer, internet or any game on your system! Our advanced stealth technology ensures that Stealth Parental Control remains completely hidden from everyone except you.
  • Keylogger Detector can provide every computer with strong protection against most types of unauthorized activity monitoring software, both known and unknown. It effectively finds and removes keyloggers, trojans and other spy software. Keylogger Detector is not using a signature-based detection, instead it detects a suspicious software behaviour. Remember - antivirus software often cannot detect the newest or private-built keyloggers!
  • This is a free monitoring software designed for covert invisible surveillance. The main function of the program is keystrokes recording, but it can also capture visited web pages and save text data from Windows clipboard (copied text). WIth this program, you will always know what the users are doing on computer. This is a prefect solution for parents who care about their child's online safety; for system administrators, chiefs and so on.
  • If you need an easy way to send private email messages from Microsoft Outlook that will not inconvenience the recipient, then download PDF Postman. This add-in for MS Outlook will encrypt email messages and file attachments using the PDF envelope AES-256 bit encryption. More info at http://www.encryptomatic.com/pdfpostman PDF Postman is an easy way to send email messages securely by email using PDF documents.
  • JiJi Password Expiration Notification is a simple tool to notify users, managers and administrators through e-mail before their password and account expire. Administrator can receive the summary report to the specific email ids. Administrator can define the notification task for any specified target (Domain, an OU, Group, Set of Users).
  • zebNet Windows Keyfinder 2012 is a utility that retrieves your Windows Product Key used to install Windows from your registry. Another feature is the ability to save your Windows Product Key in a text file.
  • Encrypt and decrypt whole files or their parts using AES, Triple-DES (3DES), RC2, and DES symmetric algorithms. You can encrypt files with a single password or specify cryptographic keys (vectors) instead. You can change key bit length for better protection. You can select specifically which bytes in a file should be encrypted/decrypted, though by default the whole file is processed.
  • 1 Free Keylogger offers full invisible remote control of user activity on PC: keystroke logger, makes screenshots, web camera snapshots, website visits, online searches, social networks - Facebook, myspace, google+, vkontakte, capture login/password for web sites, apps activity, IM/chat etc. 1 Free Keylogger allows remote monitoring in three ways: sending logs via email or FTP and online logs view via secure web account on 1freekeylogger.com.
  • Keylogger Spy Monitor spy software can secretly record all keystrokes typed on your computer. It runs completely invisiblely. You can check logging reports by simply receiving emails or opening a web page. Perfect for catching cheaters, m onitoring employees, children or spouse, acquiring others' passwords and even investigating crimes. Use hotkey to unhide it from Stealth Mode and protect the program access by password.
  • Remo File Eraser a secure data eraser application, which erases important and confidential files / folders beyond recovery. The software is also capable of wiping free disk space to erase deleted data using various shredding patterns leaving no traces of critical data. Superior drive wipe feature facilitates you to wipe entire hard drive permanently.
  • Video to EXE Converter, Pack video & codec & player, Three-In-One, Encrypt and pack your video to exe with embedding codec and player, User needn't install any codec or player to play your video. Supports various types of video or audio (e.g., wmv, avi, mpg, rm, rmvb, mp4, flv, Vob) into exe files that can only be played when a Playback Password is provided, and users can only play the encrypted media files after obtaining the Playback Password.
  • iKeyMonitor iPhone Spy App is an invisible spy app for iPhone/iPad/iPod touch that logs keystrokes, passwords, calls, SMS, WhatsApp/Skype/Viber/Line/Kik/Hangouts/Facebook messages, GPS locations, websites and screenshots, and it will automatically send the logs to users by email or FTP. What does iKeyMonitor iPhone Spy App do? 1. iKeyMonitor records passwords entered and keystrokes typed on the targeted iOS device. 2. Call logging is available as well. Users can see the phone numbers, call durations and time stamps. Meanwhile, it supports logging of Contacts/Notes/Calendars/Reminders/Voice Memos. 3. The iPhone spy app for iOS devices not only tracks incoming and outgoing text messages, but also records WhatsApp/Viber/Kik/Skype messages sent and received. 4. It also offers information of the GPS locations of the iOS device. 5. Another feature is websites history tracking. This invisible spy app logs all the websites visited in Safari and shows users the URLs, time and titles. 6. What&a ...
  • Roborub Software helps you secure your private data in a way that when you are deleting your data from your Computer, this Software would not made it recover again. That means, it removes your deleted data permanently from your Computer's Hard disk. It is very useful for computer and laptop users, especially the ones who has total concern with computer and has important & secret data to deal with. It is so because this software helps you to permanently delete those data from your Computer which you have deleted making it irrecoverable. Features: Works in background The software works in background in order to make it inaccessible for unauthorized users. Confirmation message before deleting You can set an option which shows the confirmation message before deleting any data from the Hard disk. Set User Id & Password for security You can set User Id & Password for accessing the Software Removes deleted data permanently The data that you are ...
  • Windows Spy Software secretly logs Facebook, keystrokes, chats, IMs, emails, websites visited, microphone, video talk, logins, passwords, applications, searches, documents and more. Logs Skype, Yahoo Messenger, MSN, ICQ, AIM, etc. Takes screenshots every x seconds like a spy cam. Sends logs to your email. You can check logs on a remote PC, tablet, smart phone, or directly on the monitored PC. Perfect for monitoring employees, kids and spo
  • Need to break & unlock MDB security from access documents? Get the wonderful software that can break or unlock MDB security. The Unlock MDB security software is created to break or unlock MBD security from Access files. With this program you will able to break or unlock MDB security and get the ability to read and open access files. Unlock MDB security support for Microsoft access 95/97/2000/2002/2003 database. Trial version is available to check on the ability of MDB security unlocker. But, to unlock full MDB securities you have to purchase full version of unlock MDB security software. You can get full version of unlock MDB security in just 25$
  • Encrypt exe with password protected, You may specify the icon of encrypted file. You can set a password with PC-binding to your users. Only you can create open password for your users. Easily distribute EXE files and protect it.
  • Many people believe that passwords are all that's needed to keep pirating eyes away from the data stored on their computers. But if that were true, there'd be no such thing as a "hacker." While passwords are certainly helpful, it takes a lot more than that to protect the information on your computer. With malicious malware products lurking about on the Internet, it's worth having extra layers of data security on your side. Sometimes an innocent-looking website can be a hacker in disguise. Nosey coworkers, bosses, friends, and even spouses can also pose a threat to our privacy. With A+ Folder Locker, you can store files, folders, drives, and even complete software programs in special data storage "lockers." Not only do these lockers keep the names of the files and folders you store in them from being viewed, the robust level of security of the lockers make them virtually impossible to break into. A+ Folder Locker also includes a variety ...

Page 10 of 30
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30


Legal disclaimer | Privacy policy

© 2004-2016 IT Shareware