Home | Submit a file  |  New  |  Categories  |  Our awards  |  Link to us  |  RSS Feeds

Utilities :: Security & Encryption
Sort by: date | product title | rating | downloads | popularity
Display: short descriptions | full descriptions
  • A must have windows security software for information security professionals to conduct in-depth security auditing and risk assessments of network-based windows systems. Regulatory compliance and the latest network auditing tools, all come as a package with this computer security software.
  • Puran Wipe Disk is a free utility that can completely delete everything on your disk including the file system so that no data can be recovered or it can just wipe the free space so that already deleted files cannot be recovered.
  • Spyrix Free Parental Control gives parents full control over children computer. Any parent without depth knowledge of computers can easily block access to the sites by several ways: blacklist of prohibited sites, blacklist of sites categories (e.g. adult, dating), blocking access on keywords blacklist (e.g. porn, sex, drugs). Spyrix Free Parental Control can not only block sites but provides powerful tools for detailed monitoring of child's activ
  • Employee Desktop Live Viewer is an eminent, comprehensive, and completely reliable PC spy software that helps you keep track of your employees’ computer desktop activities by monitoring them from a distance. In order to monitor the users, you first need to install the software on the employees’ computer systems. You can install the PC spy software on your employees’ computers from a distant computer system; the only condition is that your employees’ computer systems must be in a network. Also, as you install the software from a distance, your employees would never come to know that any such software is installed on their computer system. Another amazing feature of this PC spy software is that while you monitor your employees’ from a remote machine, your employees do not even know that they are being monitored. Although your employees would never come to know that they are being monitored, you can deliberately send notification messages to your employees that they are being monitored. Yet another ...
  • Chatting online is not just a passing phase. More and more people are communicating through chat. And that means loads of digital evidence. As an examiner, you need a specialized tool to perform a thorough analysis of chat logs. Paraben's Chat Examiner is another specialized component of Paraben's P2 Forensic Collection that adds one more powerful program to your toolkit. Supports ICQ, Yahoo, MSN, Trilliann, Hello, Skype, or Miranda.
  • cBlasterPRO is the Best Cell Phone Surveillance Software which provide monitoring child/Employee communication, ensure security and location, corporate Reporting Available, Remote server to handle requests. cBlaster provides SMS/Text Message, Web History/BBM, Location, Voice Call Log, Remote control for parents and employers and Photo clicked by your Child's Camera.
  • Defender - a system that will better protect your listening room, using the standard speakers of your computer. And when completing devaysom Real House, the complete set of software scrambler conversations, additional loops of piezoelectric and electromagnetic sources, greatly increases the effectiveness of the protection of your premises from listening.
  • Installing this program before your browsers are infected by malware or viruses gives you a free browser to surf the internet. Don't wait until your system is disabled to download this tool that is necessary to have before your browser is crippled and disabled. This rescue utility browser will run even when your system is infected. Regain the ability to surf the net and download software with this protected browser. You need this tool installed while your system is free from malware. Built in pop up blocker included kills any new window that appears. Saves you frustration by giving you access to the internet again. New app killer added that searches constantly for unauthorized applicatons and shuts them down for you to delete them. Use as a malware shield and app killer for constant protection. Saves endless hours reloading damaged programs from malware attacks. Buy any one program from our home page and get one program of equal or lesser value free!
  • iKeyMonitor is an iOS Keylogger for iPhone/iPad/iPodTouch that logs keystrokes, websites, screenshots and automatically sends the logs to you by email or FTP. And iKeyMonitor is the only Keylogger for iPhone/iPad/iPodTouch with the features of Keystrokes, websites, screenshots logging and email/FTP delivery. iKeyMonitor can be installed on any Jail-broken iOS devices.
  • PDF Postman offers an easy way to send private emails with MS Outlook. Messages and files are placed in a PDF file then encrypted with strong AES-256 encryption. Since most recipients already have a PDF viewer, they only need to click on the encrypted pdf file and enter a password. Works across devices and platforms. No expensive or complex S/MIME certificates to install. Download a free trial of PDF Postman.
  • Effective and Cost effective Mac Monitoring Utility downloads trail demo from www.macmonitoring.net and you can monitors all internet, USB insertion or removal activities from your Mac system which are performed by other person on your computer machine without your permission. Time saving Internet recording application captures keystrokes, clipboard activities and voice chat conversation along with accessed desktop screenshots at regular interval of time. Comprehensive computer monitoring utility provides best methodology to monitors all USB mass storage devices insertion and removal activities from your Mac machine when you not available on your system which are performed by hackers. Easy to use monitoring internet utility provides user friendly Graphical GUI interface with help menu and non technical or technical operator easily drive to monitoring tool with any training or supports. Innovative or highly technical Mac monitoring software is beneficial for all colleges, universities, institutes, investigatio ...
  • Save your secret data in secure storage. Unlimited data entry and grouping system with Dynamic search engine feature. Now it's time you take a break from a displease thing. By using the "Manager Password Pro", it's become a satisfying thing.
  • This easy-to-use privacy software effectively limits access to an unlimited number of folders and files on your computer. If you want to hide your files from prying eyes or want to protect them from being deleted or modified, install Hide Folders utility. It safely locks and hides your files and folders and grants access only if you specify the original password. Download FREE trial now!
  • Win Spy Software is a Complete Stealth Monitoring Software that can both monitor your Local PC and Remote PC. WinSpy Software also includes Remote Install. WinSpy Software will capture anything the user sees or types on the keyboard. Win-spy will also capture WebCam shots and record surrounding sounds. Now Works behind Firewalls and Routers. New: Powerful Anti Spy. v11 includes - Sim Card Undelete - undelete data from Sim Card.
  • Lock your desktop with one mouse and prevent anyone from accessing your programs and your importand data, no one can access your locked desktop without the valid password, mte desktop locker provide the following features: - lock your desktop with virtual desktop, - you must enter valid password to access the desktop, - show custom alert to any one try access your locked desktop, - you can select from many virtual desktop lockers, - mte desktop locker prevent access to task manager program in the locker mode, - mte desktop locker prevent access to the following keys: (CTRL+ALt+Del), (Alt+F4) to prevent closing the application, - you can lock your desktop with transparent desktop locker, - mte desktop locker provide log feature that enable you record all mouse clicks and invalid passwords input to know if someone try to open your protected desktop, - program allows you to set password to protect the options dialog for more security, - you can set the program to run at windows startup, - program allows you to p ...
  • PDF Decrypt is a perfect tool that lets you to decrypt protected Adobe Acrobat PDF files, which have "owner" password set, preventing the file from editing(changing), printing, selecting text and graphics(and copying them into the Clipboard), or adding/changing annotations and form fields. Decrypted file can be opened in any PDF viewer(e.g. Adobe Acrobat Reader)without any restrictions -- i.e. with edit/copy/print functions enabled. All versions of Adobe Acrobat are supported. The standard security provided by PDF consists of two different methods and two different passwords. A PDF document may be protected by password for opening ('user' password) and the document may also specify operations that should be restricted even when the document is decrypted: printing; copying text and graphics out of the document; modifying the document; and adding or modifying text notes and AcroForm fields (using 'owner' password).
  • The notes nsf local security software enables the user to access that NSF database which is under local security. That is, by using the notes nsf local security removal tool the user can remove local security which is set on the NSF database. It is susceptible of handling the numerous error messages which the user face while accessing the unauthorized NSF database such as "You are not authorized to access that database" and "You are not authorized to perform that operation". Despite of having such a wondrous capability to solve such complicated errors, this software is extremely simple to use and does not require much technical efficiency to get operated by the user. Moreover, it provides quick access to the NSF database and is available at a really affordable price. Furthermore, the notes nsf local security removal tool is compatible to use with almost all versions of Lotus notes. For more information please visit www.nucleusdatarecovery.org
  • Kernel file shredder is a professional tool that acts as a data privacy tool as it ensures that organization sensitive information is not been misused by any malicious users. It ensures this as it permanently deletes or removes crucial files and folders from your computer system after use. The free file shredder software performs efficient as well as impeccable file shredding in such a manner that once the files and folders are shred, they cannot be recovered back using any powerful data recovery tool. Kernel file shredder offers multiple file shredding options to the users. Moreover, it also enables you to create a list of files that you want to permanently remove from your computer system. This file has a .cfs format. Kernel file shredder comes with a free evaluation or free trial version which enables you to shred files on one hand and on the other hand lets you evaluate the features as well as performance of the tool. However, the limitation of this free trial version is that it is available for a time ...
  • Forensic IM Analyzer helps forensic professionals extract more digital evidence from suspects' hard drives. Extract and analyze log files, communication histories and contact databases of a wide range of instant messenger applications. More than 80 messenger apps are supported including Skype, AOL, ICQ, MSN Messenger, Yahoo! Messenger, RQ, Miranda, MySpace IM, SIM, QIP, QIP Infium, Trillian, AIM, Digsby, Rambler Virtus, Mail.Ru Agent, QQ etc.
  • AthTek Keylogger secretly monitor everything - instant messages, emails, websites, internet activities, facebook and twitter, pictures, keystrokes, programs, CD-Rom, documents and files, USB drives, printers, clipboard, any website they visited, any program they run, any character they typed on the computer. With AthTek Keylogger, you can easily know that who is doing what on the computer. The logs will automatically be emailed to your
  • Put an end to forgotten passwords and insecure password storage! Easy Password Storage keeps your passwords safe but accessible. One master password protects and encrypts all of your valuable information on Windows and Mac. Your passwords are protected with your choice of three industry standard encryption types with up to 448 bit encryption: Advanced Encryption Standard (AES), Blowfish or Serpent.
  • Power Spy software secretly logs Facebook use, keystrokes, chats & IMs, emails, web visits, games, searches, shopping history, user names, passwords and more. It supports Windows Live Messenger, Yahoo Messenger, Skype, ICQ and more. It's invisible to monitored users. However, it is easy for you to unhide its interface with hotkeys. You can receive reports remotely via email or ftp. Perfect for monitoring employees, kids and spouse.
  • PC Ports and connections data monitoring, logging and analyzing software. Device Monitor is an USB, Serial and Network protocol analyzer, data logger software and may be used to capture, log, view and analyze data coming to and out of your computer. Recorded log files can be replayed later even on another computer. Device Monitoring Studio provides you with complete set of features to figure out what's going on when device is connected to the PC
  • Encrypt and convert pptx or ppsx to exe with password protected, support PowerPoint 2003, PowerPoint 2007, PowerPoint 2010 and later. You can add additional files required by this PowerPoint file into one single exe, such as flash, video, audio or other files, all files can be protected distributed. The encrypted file support One Computer One Password license to your user's computer, Only you can create open password for your users.
  • Purpose of NotRun: - prevent start selected programs ( is working with more programs). - provide you a user-friendly interface - be simple and easy to operate Customized capabilities of NotRun software. - run NotRun when started Windows (this function is active by default) - password protected access to NotRun (this function is not active by default) - when NotRun is started, it minimized to system tray

Page 10 of 30
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30

Legal disclaimer | Privacy policy

© 2004-2015 IT Shareware