Home | Submit a file  |  New  |  Categories  |  Our awards  |  Link to us  |  RSS Feeds

Utilities :: Security & Encryption
Sort by: date | product title | rating | downloads | popularity
Display: short descriptions | full descriptions
  • Puran Wipe Disk is a free utility that can completely delete everything on your disk including the file system so that no data can be recovered or it can just wipe the free space so that already deleted files cannot be recovered.
  • Secure Erase: ProtectStar Data Shredder 3 Professional is a state-of-the-art and professional tool that has won numerous awards and that allows for secure deletion of data from hard drives and external data storage devices. This user-friendly solution, which runs under Microsoft Windows, enables users to efficiently delete their data in such a way as to preclude reconstruction, even by government agencies.
  • KeyLog Pro is an invisible easy-to-use surveillance tool that records every keystroke to a report file. KeyLogPro also monitors Internet activity by logging the addresses of visited homepages and can be used to Filter harmful and inappropriate content. It monitors time and title of the active application; even text in edit boxes is captured. Some features include: - Records everything typed, including emails, instant messages, chats, and website addresses into a report file - Monitor any programs used - Includes a Internet filter and Banned websites functionality - Simple to install - Password Protected and special Hot Key to invoke program - Excellent real-time backup device
  • Kernel file shredder is a professional tool that acts as a data privacy tool as it ensures that organization sensitive information is not been misused by any malicious users. It ensures this as it permanently deletes or removes crucial files and folders from your computer system after use. The free file shredder software performs efficient as well as impeccable file shredding in such a manner that once the files and folders are shred, they cannot be recovered back using any powerful data recovery tool. Kernel file shredder offers multiple file shredding options to the users. Moreover, it also enables you to create a list of files that you want to permanently remove from your computer system. This file has a .cfs format. Kernel file shredder comes with a free evaluation or free trial version which enables you to shred files on one hand and on the other hand lets you evaluate the features as well as performance of the tool. However, the limitation of this free trial version is that it is available for a time ...
  • P2 Commander is a fully automated digital forensic analysis tool designed to forensically analyze computer data. With a focus on email and network email analysis, internet history analysis, chat log analysis, data triage, deleted data recovery, file sorting and viewing, hash database filtering, email converstion, pornography detection, and much more, P2 Commander allows anyone to perform computer investigations.
  • Location Safe obtain the GPS location of your child's phone by sending a SMS to the Target device. Location Safe can track the location of your phone at any time, obtain exact location on the planet of your child/employee, GPS information that can be plugged into any popular mapping software, Ensure that your child is safe and your employees are where they are supposed to be. Location Safe is very easy to use and Install in your mobile.
  • Put an end to forgotten passwords and insecure password storage! Easy Password Storage keeps your passwords safe but accessible. One master password protects and encrypts all of your valuable information on Windows and Mac. Your passwords are protected with your choice of three industry standard encryption types with up to 448 bit encryption: Advanced Encryption Standard (AES), Blowfish or Serpent.
  • The generation of cryptographic keys and certificate requests X.509, and other service functions associated with the formation and maintenance of key systems of the carriers in PKI (Public Key Infrastructure - PKI), supporting secure applications built on the basis 2-keys cryptographic algorithms. Support: GOST R34.10-2001, RSA, DSA, eToken, Rutoken EDS, KRYPTON, Accord-AMDZ, Sobol...
  • AthTek Keylogger secretly monitor everything - instant messages, emails, websites, internet activities, facebook and twitter, pictures, keystrokes, programs, CD-Rom, documents and files, USB drives, printers, clipboard, any website they visited, any program they run, any character they typed on the computer. With AthTek Keylogger, you can easily know that who is doing what on the computer. The logs will automatically be emailed to your
  • PDF Decrypt is a perfect tool that lets you to decrypt protected Adobe Acrobat PDF files, which have "owner" password set, preventing the file from editing(changing), printing, selecting text and graphics(and copying them into the Clipboard), or adding/changing annotations and form fields. Decrypted file can be opened in any PDF viewer(e.g. Adobe Acrobat Reader)without any restrictions -- i.e. with edit/copy/print functions enabled. All versions of Adobe Acrobat are supported. The standard security provided by PDF consists of two different methods and two different passwords. A PDF document may be protected by password for opening ('user' password) and the document may also specify operations that should be restricted even when the document is decrypted: printing; copying text and graphics out of the document; modifying the document; and adding or modifying text notes and AcroForm fields (using 'owner' password).
  • Simple application that prevents launch of any processes that you specify. It can be used, for example, in order that the children could not play games in your absence. You can register in the autorun, it will run in stealth mode, call using hot key Ctrl-Shift-F5. You can use it for free.
  • The notes nsf local security software enables the user to access that NSF database which is under local security. That is, by using the notes nsf local security removal tool the user can remove local security which is set on the NSF database. It is susceptible of handling the numerous error messages which the user face while accessing the unauthorized NSF database such as "You are not authorized to access that database" and "You are not authorized to perform that operation". Despite of having such a wondrous capability to solve such complicated errors, this software is extremely simple to use and does not require much technical efficiency to get operated by the user. Moreover, it provides quick access to the NSF database and is available at a really affordable price. Furthermore, the notes nsf local security removal tool is compatible to use with almost all versions of Lotus notes. For more information please visit www.nucleusdatarecovery.org
  • Forensic IM Analyzer helps forensic professionals extract more digital evidence from suspects' hard drives. Extract and analyze log files, communication histories and contact databases of a wide range of instant messenger applications. More than 80 messenger apps are supported including Skype, AOL, ICQ, MSN Messenger, Yahoo! Messenger, RQ, Miranda, MySpace IM, SIM, QIP, QIP Infium, Trillian, AIM, Digsby, Rambler Virtus, Mail.Ru Agent, QQ etc.
  • Facebook Spy Monitor is a Facebook profile monitoring and parental control software. It secretly records PC users' Facebook private profile, emails, chats & IMs, photos, interests, contatcts and events by taking screen snapshots periodically. It also records popular Facebook instant messenging clients and Facebook related web sites and searches. See exactly what users were doing just like watching a surveillance video playback.
  • PC Ports and connections data monitoring, logging and analyzing software. Device Monitor is an USB, Serial and Network protocol analyzer, data logger software and may be used to capture, log, view and analyze data coming to and out of your computer. Recorded log files can be replayed later even on another computer. Device Monitoring Studio provides you with complete set of features to figure out what's going on when device is connected to the PC
  • iKeylogger PRO has deservedly earned its reputation as the most trusted monitoring software in the world, the most feature-rich, being easy and intuitive... even for beginners! The World's Best-Selling Monitoring Software Free Download!Monitor everything they do on they do on computer and internet invisibly Monitor Facebook,Chat/IM, password, web sites visited, keystroke, email Record all voice chats and video chats smartly (Microphone Spy)
  • Lock your desktop with one mouse and prevent anyone from accessing your programs and your importand data, no one can access your locked desktop without the valid password, mte desktop locker provide the following features: - lock your desktop with virtual desktop, - you must enter valid password to access the desktop, - show custom alert to any one try access your locked desktop, - you can select from many virtual desktop lockers, - mte desktop locker prevent access to task manager program in the locker mode, - mte desktop locker prevent access to the following keys: (CTRL+ALt+Del), (Alt+F4) to prevent closing the application, - you can lock your desktop with transparent desktop locker, - mte desktop locker provide log feature that enable you record all mouse clicks and invalid passwords input to know if someone try to open your protected desktop, - program allows you to set password to protect the options dialog for more security, - you can set the program to run at windows startup, - program allows you to p ...
  • Purpose of NotRun: - prevent start selected programs ( is working with more programs). - provide you a user-friendly interface - be simple and easy to operate Customized capabilities of NotRun software. - run NotRun when started Windows (this function is active by default) - password protected access to NotRun (this function is not active by default) - when NotRun is started, it minimized to system tray
  • AdSysNet Self-Service Password Reset is a web based active directory self service password reset tool. User web console lets the users to reset password and submitting the requests to the help desk admins. HelpDesk console lets help desk admins to process the password reset and update profile requests from the users. Admin console helps to configure the security settings and view the audit report. Logon screen password reset feature is supported.
  • Effective and Cost effective Mac Monitoring Utility downloads trail demo from www.macmonitoring.net and you can monitors all internet, USB insertion or removal activities from your Mac system which are performed by other person on your computer machine without your permission. Time saving Internet recording application captures keystrokes, clipboard activities and voice chat conversation along with accessed desktop screenshots at regular interval of time. Comprehensive computer monitoring utility provides best methodology to monitors all USB mass storage devices insertion and removal activities from your Mac machine when you not available on your system which are performed by hackers. Easy to use monitoring internet utility provides user friendly Graphical GUI interface with help menu and non technical or technical operator easily drive to monitoring tool with any training or supports. Innovative or highly technical Mac monitoring software is beneficial for all colleges, universities, institutes, investigatio ...
  • JiJi Password Expiration Notification is a simple tool to notify users, managers and administrators through e-mail before their password and account expire. Administrator can receive the summary report to the specific email ids. Administrator can define the notification task for any specified target (Domain, an OU, Group, Set of Users).
  • Pdf encryption software lock pdf data with strong 128 bit encryption security level protection. Program is responsible for protecting batch pdf documents with open password security and owner password restrictions. Pdf encryption software facilitates to restrict desired function in any pdf file i.e. you can enable or disable pdf printing, copying, form filling, signing, commenting, editing, modifying etc permissions according to requirement. Application is Windows compatible, support RC4 40 bit & 128 bit encryption protection. In fact, you can secure bulk pdf documents only with open (user) password without applying any restrictions. This easy to use and awesome utility has inbuilt user help manual and does not require any extra technical skills for operating. Download free evaluation version of pdf security software, protect your private and confidential data from un-authorized access, prevent piracy & fraudulent. Program prompt for open password once set into the pdf and only intended person ...
  • PassBoom presents a completely free password generator for your computer. It creates easily memorable yet extremely secure and complex passwords which you can use for the online services and other password-protected features that you access. The software is extremely easy to use and, best of all; it is available completely free for both home and commercial use.
  • Power Spy software secretly logs Facebook use, keystrokes, chats & IMs, emails, web visits, games, searches, shopping history, user names, passwords and more. It supports Windows Live Messenger, Yahoo Messenger, Skype, ICQ and more. It's invisible to monitored users. However, it is easy for you to unhide its interface with hotkeys. You can receive reports remotely via email or ftp. Perfect for monitoring employees, kids and spouse.
  • This is a free monitoring software designed for covert invisible surveillance. The main function of the program is keystrokes recording, but it can also capture visited web pages and save text data from Windows clipboard (copied text). WIth this program, you will always know what the users are doing on computer. This is a prefect solution for parents who care about their child's online safety; for system administrators, chiefs and so on.

Page 10 of 30
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30


Legal disclaimer | Privacy policy

© 2004-2015 IT Shareware