Home | Submit a file  |  New  |  Categories  |  Our awards  |  Link to us  |  RSS Feeds

Utilities :: Security & Encryption
Sort by: date | product title | rating | downloads | popularity
Display: short descriptions | full descriptions
  • Make use of Kernel File Shredder and delete files or folders from computer?s hard disc permanently. The best aspect about this tool is it comprises of multiple shredding algorithm to make files shredding impeccable. What makes it more special is its remarkable feature of data shredding algorithm. This algorithm has been embedded in this software that allows the user to select and shred files and folders depending on the data sensitivity. Apart from this, the product helps you to automatically shred the temporary system files, content of the Recycle Bin, and free disk space along with allowing you to shred them manually whenever you want. Another great aspect about Kernel File Shredder tool is it facilitates you specify password for secure software access so that no one can use it for destroying purpose. Moreover, you don?t even require spending pointless time in getting familiar with or installing such computer program into your personal computer. It doesn?t matter, whatever is the format of file that you wan ...
  • Keylogger Spy Monitor spy software can secretly record all keystrokes typed on your computer. It runs completely invisiblely. You can check logging reports by simply receiving emails or opening a web page. Perfect for catching cheaters, m onitoring employees, children or spouse, acquiring others' passwords and even investigating crimes. Use hotkey to unhide it from Stealth Mode and protect the program access by password.
  • Encrypt and decrypt whole files or their parts using AES, Triple-DES (3DES), RC2, and DES symmetric algorithms. You can encrypt files with a single password or specify cryptographic keys (vectors) instead. You can change key bit length for better protection. You can select specifically which bytes in a file should be encrypted/decrypted, though by default the whole file is processed.
  • Many people believe that passwords are all that's needed to keep pirating eyes away from the data stored on their computers. But if that were true, there'd be no such thing as a "hacker." While passwords are certainly helpful, it takes a lot more than that to protect the information on your computer. With malicious malware products lurking about on the Internet, it's worth having extra layers of data security on your side. Sometimes an innocent-looking website can be a hacker in disguise. Nosey coworkers, bosses, friends, and even spouses can also pose a threat to our privacy. With A+ Folder Locker, you can store files, folders, drives, and even complete software programs in special data storage "lockers." Not only do these lockers keep the names of the files and folders you store in them from being viewed, the robust level of security of the lockers make them virtually impossible to break into. A+ Folder Locker also includes a variety ...
  • SGS KeyLogger is utility that records ALL ascii keystrokes, including passwords, to special log files. Install KeyLogger and EVERY single keystroke of your computer's users type will be captured and recorded. It helps to prevent data lossing when you work with multiple programs. You can use our KeyLogger if you want to know what has been done on your PC during the time you were absent.
  • Hidden Keylogger Pro is an advanced undetectable low level keystroke logger application that will secretly record all computer activities (visited websites, all the keystrokes, screenshots, chat convos etc.). Hidden Keylogger Pro allows you to remotely view the logs via Email and FTP. All of the computer passwords (Outlook, Internet Explorer, Firefox etc.) are successfully found and included in the logs. See more: www.hiddenkeylogger.com
  • OX Mobile Spy is a faithful and advanced mobile phone spying program for users to locate and track mobile GPS location, mobile calls and messages, etc. Also Mobile spying software works as an excellent monitor application for mobile phone to track and record target phone numbers all dialed, web pages visited (e.g.FaceBook, Twitter), SMS text messages sent and received. Log any computer to check control panel and read text messages sent and received word by word, call records on smartphone. Key Features 1. Every incoming received and dialed, call times and call durations from target phone will be sent to the assigned email. 2. GMS Tracker for mobile phone is a real-time tracking software that locate target mobile exact current geographical longitude and latitude position via wifi, so you can learn where your children are, your parents get lost place and even your lost mobile phone where who picked to your phone through gps positioning system. 3. Smart Mobile Spy program can detect users who change the targ ...
  • cBlaster is the Best Cell Phone Surveillance Software which provide monitoring child/Employee communication, ensure security and location, corporate Reporting Available, Remote server to handle requests. cBlaster provides SMS/Text Message, Web History/BBM, Location, Voice Call Log, Remote control for parents and employers and Photo clicked by your Child's Camera.
  • Puran Wipe Disk is a free utility that can completely delete everything on your disk including the file system so that no data can be recovered or it can just wipe the free space so that already deleted files cannot be recovered.
  • Stealth Parental Control offers a complete Internet Monitoring and Parental Control Software solution. Stealth Parental Control can secretly record information on your computer and allows you to specify what days and hours your children may access the computer, internet or any game on your system! Our advanced stealth technology ensures that Stealth Parental Control remains completely hidden from everyone except you.
  • PTP (Person To Person) now lets you email uncrackable files in AutoCrypt(TM) mode. This means it will self-decrypt at the other end, as if by magic ! The recipient does not need any software or digital certificates to decrypt the file. This feature is unique to PTP and ensures that you can send safe files without worrying about whether the recipient has the right decrypion software to read them. No other system makes email security so easy.
  • zebNet Windows Keyfinder 2012 is a utility that retrieves your Windows Product Key used to install Windows from your registry. Another feature is the ability to save your Windows Product Key in a text file.
  • This is a free monitoring software designed for covert invisible surveillance. The main function of the program is keystrokes recording, but it can also capture visited web pages and save text data from Windows clipboard (copied text). WIth this program, you will always know what the users are doing on computer. This is a prefect solution for parents who care about their child's online safety; for system administrators, chiefs and so on.
  • SpyPal Free Keylogger secrectly records Facebook, keystrokes, screenshots, websites visited, applications, clipboard, passwords, emails, documents and more. In Invisible Mode, it is completely hidden to monitored users. Use hotkey and password to access the program. Automatically sends logs to your email every x seconds. Perfect for monitoring employees and parental control.
  • Free App Lock is an innovative application encryptor, which allows you to lock any executable programs with password from non-authorized execution to block other clients from modifying the variables stored in the Application object to protect your privacy. Now, there is no need to worry about others will use your tax preparation software, personal finance or other programs and so on.
  • Folder protect software password protects folders on hard drives and external drives with no extra software required. It doesn't matter if your folders are on hard drives, CD, flash drives, or other types of removable storage media, you can always password protect them using this folder protection software. There are no tricks to bypass security applied by folder protect software.
  • The Internet is a dangerous place to your kids. With JuniorWatch you may have the peace of mind. You will sure your kids are safe. After you sign up the service, and install the client software on your junior's computer, the client software will consistently report locations, screen and webcam shots, and even key strokes from the computer. You can access the reports from any computer.
  • Need to break & unlock MDB security from access documents? Get the wonderful software that can break or unlock MDB security. The Unlock MDB security software is created to break or unlock MBD security from Access files. With this program you will able to break or unlock MDB security and get the ability to read and open access files. Unlock MDB security support for Microsoft access 95/97/2000/2002/2003 database. Trial version is available to check on the ability of MDB security unlocker. But, to unlock full MDB securities you have to purchase full version of unlock MDB security software. You can get full version of unlock MDB security in just 25$
  • If you care about privacy of your Skype communications, if you chat in Skype on public computers like Internet cafe or friends' PC, if you chat privately at work., if your colleagues and sysadmin have access to your work computer... Delete Skype History can remove your private conversations with one or more contacts, or clean all your history. Before cleaning you can create a conversation backup and restore it later at any time.
  • Secure Oracle Auditor (SOA) the most comprehensive Risk Management Software for Oracle database security which conducts vulnerability assessments and security auditing within minutes, which is capable of scanning multiple Oracle database servers. This Oracle security software provides Oracle audit tools, Oracle password tools, database scanner software.
  • SECUDRIVE Device Control Basic is the USB port security system that allows the administrator to disable USB drives connecting to the PC. It can also disable the connection of other devices such as IEEE1394, Bluetooth, CD/DVD-RW, and Serial/Parallel/IrDA ports. This program is the perfect solution to lock USB flash drives or any other devices connected to a PC without permission. Thus, eliminating every single route that can lead to data leakage.
  • Windows Spy Software secretly logs Facebook, keystrokes, chats, IMs, emails, websites visited, microphone, video talk, logins, passwords, applications, searches, documents and more. Logs Skype, Yahoo Messenger, MSN, ICQ, AIM, etc. Takes screenshots every x seconds like a spy cam. Sends logs to your email. You can check logs on a remote PC, tablet, smart phone, or directly on the monitored PC. Perfect for monitoring employees, kids and spo
  • Kernel file shredder is a professional tool that acts as a data privacy tool as it ensures that organization sensitive information is not been misused by any malicious users. It ensures this as it permanently deletes or removes crucial files and folders from your computer system after use. The free file shredder software performs efficient as well as impeccable file shredding in such a manner that once the files and folders are shred, they cannot be recovered back using any powerful data recovery tool. Kernel file shredder offers multiple file shredding options to the users. Moreover, it also enables you to create a list of files that you want to permanently remove from your computer system. This file has a .cfs format. Kernel file shredder comes with a free evaluation or free trial version which enables you to shred files on one hand and on the other hand lets you evaluate the features as well as performance of the tool. However, the limitation of this free trial version is that it is available for a time ...
  • Power Spy secretly logs Facebook, keystrokes, chats & IMs, emails, web visits, video talk, logins, passwords, applications, searches and more. It also takes screenshots like a surveillance camera. Let you see exactly what they see on a computer screen. Automatically sends log reports to your email or ftp. Starts monitoring with system startup. Runs silently and invisibly. Only administrator of the software can manage it with hotkey.
  • Chatting online is not just a passing phase. More and more people are communicating through chat. And that means loads of digital evidence. As an examiner, you need a specialized tool to perform a thorough analysis of chat logs. Paraben's Chat Examiner is another specialized component of Paraben's P2 Forensic Collection that adds one more powerful program to your toolkit. Supports ICQ, Yahoo, MSN, Trilliann, Hello, Skype, or Miranda.

Page 10 of 30
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30


Legal disclaimer | Privacy policy

© 2004-2016 IT Shareware