Home | Submit a file  |  New  |  Categories  |  Our awards  |  Link to us  |  RSS Feeds

Utilities :: Security & Encryption
Sort by: date | product title | rating | downloads | popularity
Display: short descriptions | full descriptions
  • Invisible messenger spy software that logs all incoming and outgoing AIM text chat messages. View log records from the program or send a report to a preset email / ftp. You can check all recorded incoming and outgoing messages by simply receiving emails or opening a web page. Use hotkey to unhide it from Stealth Mode and protect program access by password.
  • Invisible messenger spy software that logs all incoming and outgoing AIM text chat messages. View log records from the program or send a report to a preset email / ftp. You can check all recorded incoming and outgoing messages by simply receiving emails or opening a web page. Use hotkey to unhide it from Stealth Mode and protect program access by password.
  • Invisible messenger spy software that logs all incoming and outgoing AIM text chat messages. View log records from the program or send a report to a preset email / ftp. You can check all recorded incoming and outgoing messages by simply receiving emails or opening a web page. Use hotkey to unhide it from Stealth Mode and protect program access by password.
  • Invisible messenger spy software that logs all incoming and outgoing AIM text chat messages. View log records from the program or send a report to a preset email / ftp. You can check all recorded incoming and outgoing messages by simply receiving emails or opening a web page. Use hotkey to unhide it from Stealth Mode and protect program access by password.
  • Invisible messenger spy software that logs all incoming and outgoing AIM text chat messages. View log records from the program or send a report to a preset email / ftp. You can check all recorded incoming and outgoing messages by simply receiving emails or opening a web page. Use hotkey to unhide it from Stealth Mode and protect program access by password.
  • Thank you for using our product. This popular application perfectly removes unnecessary files from computer disks. Thanks to it, thousands of people save to their disks even more of those things that they really need and value. Lots of things can cause temporary files to remain forever. The main problem is that they occupy space for no reason. There is a simple solution. Start searching for temporary files using the "Find temporary files" link.
  • Thank you for using our product. This popular free application perfectly clears the history of your programs. Thousands of people use it to keep their confidential information in secret. It is really easy to do it. Start searching the program history using the link "History search". Use the "Program history" link to select the history you want to delete. Clear the history using the "Clear history" link.
  • If you're not the only one who has access to your computer then I'd bet that there are certain programs and files you don't want others accessing. There are a multitude of options on how to go about doing this. There are encryption programs, programs that restrict access to portions of your computer, programs that make your files invisible. You get the general idea. A novel approach to the problem lies in Akala EXE Lock. Akala EXE Lock password protects any program currently residing on your hard drive. An attempt to run a program that's locked down will result in a dialoge box launching asking for the password. Failure to provide the correct password prevents the program from fully launching. Akala EXE Lock is most useful in situations where you want to stop people from getting to certain files but don't want to deal with hassle of constantly encrypting and decrypting those files every time you want to use them. For example, password protecting your copy of the Real Player ne ...
  • AKeeper is an easy to use Personal Password, Username and Serial Database. Use it to record all your usernames, passwords, urls, serials, registrations and more all in the one easy to use program.
  • Aldenate Secure Disk enables you to create password-protected containers that can be mounted as virtual disk and used to store your sensitive documents. While mounted, the containers can be used like any other drive to manage your files. You can quickly lock the containers with the click of a button or by pressing a hot key and the drives will no longer be visible. Aldenate Secure Disk uses AES encryption to store your files securely.
  • AlertMobile is a special software for computer security incidents response. It monitors all attempts of unauthorized computer activity, sends SMS alerts to mobile device, receives and handles response commands. AlertMobile can be used by security administrators for control of the corporate security policy, by parents for monitoring of their children computer activity, or by anyone else.
  • All In One Keylogger implements the state-of-art technology, and guarantees you full control over your computer. Have you ever thought what site your children are surfing when you are not at home? Who the 'girlfriend' your wife is chatting with all the time really is? What your employees are doing when you are not at home? Now you can monitor chats,e-mails,keystrokes typed,desktop activities, microphone...It can even send you logs by email/FTP.
  • Works in stealth mode, silently and smoothly. It can secretly record user's all computer activities and internet activities, such as email, instant message (MSN and Yahoo Messenger), keystrokes, screenshots, websites visited, searching keywords, file or program downloaded, etc. It also can block unwanted or harmful websites,, block chat conversations from unwanted people. Additionally it can Send logging reports to a pre-set mail box.
  • All In One Keylogger implements the state-of-art technology, and guarantees you full control over your computer. Have you ever thought what site your children are surfing when you are not at home? Who the 'girlfriend' your wife is chatting with all the time really is? What your employees are doing when you are not at home? Now you can monitor chats,e-mails,keystrokes typed,desktop activities, microphone...It can even send you logs by email/FTP.
  • By activating All-In-One Perfect Keylogger, you can monitor everything including blocking unwanted sites/programs. The Key Logger allows you to register all keystrokes typed, including language-specific characters, talk and messages conversations, passwords, e-mails, clipboard, microphone sounds, screenshots captured, desktop and Internet activity (such as sites your kids have visited).
  • Protect Flash, PDF, Powerpoint, Excel, EXE ,E-Book, Video, Audio, Images . Every document which can be printed with a printer driver can be protected. Predefined workflow without programming. Available in 13 languages. Content Protection / DRM / Time limited versions / Software Copy Protection / Network licence per PC, User, Floating Licence / Shop Integration / Screencapture Protection / Delivery on USB Stick, CD or Download Link
  • All-In-One Spy Keylogger secretly logs Facebook, keystrokes, chats, IMs, emails, websites visited, microphone, video talk, logins, passwords, applications, searches, documents and more. Logs Skype, Yahoo Messenger, ICQ, AIM, etc. Takes screenshots every x seconds like a spy cam. Sends logs to your email. You can check logs on a remote PC, tablet, smart phone, or directly on the monitored PC. Perfect for monitoring employees, kids and spouse.
  • All-Spy Keylogger is a spy software that record every activity on a computer like websites visited, chat conversation, application running, files created or modified. . The application helps you find out who has used a computer. All-Spy Keylogger runs completely invisible, so that the user of your computer will not suspect that his/her activity is closely monitored, and does not consume computer resources.
  • The Internet is nobody's business but your own! Clean up your tracks to protect your PC and Internet privacy. AllCleaner for Windows is the original and most advanced privacy and PC cleaning tool. We invented this software category more than two years ago and since then more than one million customers worldwide have installed Windows AllCleaner on their PCs!
  • AllSpyMonitor Spy Software makes it easy for you to accurately monitor the activities of others using your PC.AllSpyMonitor secretly monitors all activity while it is completely hidden from others--No trace in Add/Remove Programs, Start menu, Applications, and no icons. AllSpyMonitor secrectly logs screenshots, web sites visited, keystrokes, passwords and more. Usages: monitors employees, children, spouse and investigate crimes.
  • AllSpyMonitor is a stealthy computer keylogger software which allows you to secretly record all activities of computer users including web sites visited, all keystroke (including login/password of ICQ, MSN, AOL, AIM, and Yahoo Messenger or Webmail), file operations, online chat conversation, and take screen snapshot at set intervals just like a surveillance camera directly point at the computer monitor.AllSpyMonitor lets you know EXACTLY what others do on your PC while you are away.It secretly monitors all activity while it is completely hidden from others--No trace in Add/Remove Programs, Start menu, Applications, and Desktop. AllSpyMonitor is designed for the hidden computer monitoring and the monitoring of the computer activity.AllSpyMonitor is the perfect tool for catching a cheating spouse, it is also perfect for long-term child monitoring. Imagine being able to see EXACTLY what your child is doing online. Are they being safe online? Now you'll be able know for sure so you can take action.
  • Creates a virtual encrypted disk within a file and mounts it as a real disk. Supports Smartcards and Software Certificates
  • Aloaha PDFCrypter seals your PDF with the public key of the recipient. Non PDF files are beeing compressed and PKCS#7 enveloped. No special decryption client needed. Adobe Reader 6 or 7 is enough. Seal PDF Documents secure that they can only be displayed with the right private key. Encryption of non PDF files and S/MIME Mailer are FREEWARE
  • Aloahasīs Smart Card Connector, including a Microsoft approved CSP and a PKCS #11, provides native, plug & play security enhancement to Microsoft Windows operating systems and Applications using various Smart Cards such as the German Health Insurance Card, Health Professional Card, Belgium e-ID (Belpic), Swiss GS1, Italian Infocamere, SagemOrga Micardo, CardOS, Sicrypt, and more...
  • Logon to Windows with Smart Card, PKCS #11 Token, I2c Card or USB Memory Stick. Active Directory supported but Active Directory not required. RDP, Hyper-V, Remote Shares, etc supported. Secure RDP Launcher included

Page 9 of 30
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30


Legal disclaimer | Privacy policy

© 2004-2016 IT Shareware