Home | Submit a file  |  New  |  Categories  |  Our awards  |  Link to us  |  RSS Feeds

Utilities :: Security & Encryption
Sort by: date | product title | rating | downloads | popularity
Display: short descriptions | full descriptions
  • Secret File Messenger is a steganography software and you can easily encrypt file or text message and hide it in a picture. Once a file is hidden in an image the saved picture is still a picture, it will load just like any other image and appear as it did before, the only difference will be that it contains hidden file. The image can be saved, emailed, uploaded to the web as before the only difference will be that it contains hidden data. You can also decrypt and extract your hidden file or message. It is extremely user-friendly tool and help you step by step with its wizard. File security and integrity are currently the most important issues in the world of information technology. Keep your private data safe with the help of Secret File Messenger. Key Features : Hide Secret and Confidential File into an Image. Support JPG/PNG/BMP/GIF/TIF Image format. Support ALL Major File Format like (DOC/DOCX/XLS/XLSX/PPT/PPTX/TXT/INI/RTF/PDF) Encrypt File Before Hiding. Extract & Decrypt Hidden File ...
  • InfoBox is a freeware to store your important and sensitive information securely on your computer. You can safely store stuff like passwords, bank account details, credit card details, logins to various web sites, access codes and other important personal and business information. The information is stored on your computer in a secure Box which is password protected. It's a portable app which you can carry on a pen drive.
  • SECUDRIVE Privacy Protection is a powerful, easy-to-use security software suite, designed to protect your privacy and prevent data loss. This simple and light security software allows you to enhance your PC usage experience with data encryption, folder hiding, file synchronization and permanent file deletion features.
  • IP Hider Ever is a professional software used to hide your IP address so that you can hide your internet traffic and the real location while surfing the web. This best IP hider software provides government-level safety protection, makes nobody know what you do on the internet. So you can surf wherever you want on the web without worrying about any of the information leaked. With a very friendly and simple-to-use user interface, an affordable and attractive price, as well as the best customer service, IP Hider Ever now has more then 23 thousands subscription users all over the world. We promise to continuously improve our technology and our service to meet the demands of all users, give them the best user experience ever. IP Hider Ever is a super easy program to hide your ip. Dozens of IP address from all countries available to be your choice. One-click to make connection anonymously. Government-level encrypted transmission, impeccable. Reconnect automatically when dropped , all-round protection of your privac ...
  • SkyCrypt is a FIPS 140-2 validated Cloud Encryption Gateway. It allows users to add 256 bit AES encryption to local drives, Google Drive, Dropbox, Bitcasa, SkyDrive or most any other cloud storage service. SkyCrypt features include : NIST FIPS 140-2 validation, AES 256 bit encryption, optional 2 factor authentication via Google Authenticator for IOS or Android, and encrypted file names
  • Finally, for anyone looking for monitoring and tracking all Skype chats and activities Skype Spy USB Edition software was designed. You don't need to install Skype Spy into the PC you are going to track. Just insert the USB flash stick with the Skype Spy and run the program. In this way the app stays completely undetectable. It is a great option for anyone looking for an effective parental control solution or employee monitoring software.
  • Password Box is one of the best password managers and private information to keep you safe. It is easy to use and yet powerful multipurpose program allows users to create their own arbitrary number of categories and fields that can be flexibly configured to fit your goals. This approach provides new ways to store and organize information. Password Box allows you to store all the important information in one file, which is securely encrypted.
  • ShareRight is a network administration tool providing detailed analysis of all file shares and documents on the network and their associated NTFS permissions, together with discovery and quick launch of each shared folder,document and VNC viewer. In addition, notes may be recorded for each machine for support and maintenance purposes.
  • LanAgent is a smart tool to monitor all actions of a remote computer user. The program records various kinds of data, which will be sent to you on your first request: keystrokes; connections established; websites visited; programs, files or directories opened; clipboard contents and so on. A detailed report on a specified time period is always available to you, yet the program is absolutely invisible to this remote user.
  • Folder password protect software keeps your data safe even under the DOS and Windows Safe Mode. Folder password protect can be also used for password protecting portable drives such as USB, memory cards and CD/DVD drives. This application will only password protect files and folders, it does not encrypt the protected files and folders.
  • JiJi Password Expiration Notification is a simple tool to notify users, managers and administrators through e-mail before their password and account expire. Administrator can receive the summary report to the specific email ids. Administrator can define the notification task for any specified target (Domain, an OU, Group, Set of Users).
  • State of the art software for risk assessment and management, it conducts security audit and security assessment for SQL database security within minutes, by using the most comprehensive SQL database security regulatory compliance tools
  • A-KEYLOGGER Reliability, and ease of use, This software will give you a simple to use control panel where you have total control, Jargon free instructions make this tool one of the simplest out there when it comes to operation, Total invisibility means the user will be unaware they are being monitored and so will act as normal in there false "private" environment.
  • Ax3soft Scout process activity monitor is a professional monitoring tool for Windows, it can monitor a process all-sidedly in real time, including process/thread, file system, Registry and network activity whit its powerful features. To create a detail report for process, Ax3soft Scout makes it easy to find and solve your computer problems, e.g. malware, troubleshooting. Key Features Real-time monitor and analyze Ax3soft Scout can monitor process/thread, file system, Registry and network activity (includes: IP, ICMP, TCP and UDP conversations, HTTP visit, Email transfer and FTP transfer) real-time and analyze these activities to identify security threats with different colors. Detail reports Ax3soft Scout can analyze numerous activities to create a detail report for process, the report?s content is very clear, it includes all the threats found and some key activities events. You can find and solve computer problems quickly and easily with the report, even if you don?t have extensive computer knowled ...
  • Supports Adobe Standard 40-bit Encryption and Adobe Advanced 128-bit Encryption. Supports AES encryption. Password protect opening of the document. Supports user password and owner password. Prevent printing of the document. Prevent copying of text/graphics. Prevent changes to the document. Supports add printing, copying and changing permissions to an encrypted PDF file. Set the document title,subject,author,keywords,creator,producer to the encrypted PDF file(s). Supports PDF1.8 protocol . Adobe Acrobat doesn?t need to be installed. Convert without any software support. Support Batch convert. Fast speed conversion. FREE upgrade.
  • The generation of cryptographic keys and certificate requests X.509, and other service functions associated with the formation and maintenance of key systems of the carriers in PKI (Public Key Infrastructure - PKI), supporting secure applications built on the basis 2-keys cryptographic algorithms. Support: GOST R34.10-2001, RSA, DSA, eToken, Rutoken EDS, KRYPTON, Accord-AMDZ, Sobol...
  • Hibosoft BossComing Boss Key is a professional and reliable application designed to protect your privacy and hide sensitive information. It is a powerful, intuitive and easy to use boss key application based on virtual desktop techniques. Hibosoft BossComing Boss Key can hide window, protect your privacy and hide sensitive information from prying eyes in seconds.
  • Automatically clear the list of recent documents history at specified intervals. You can choose clearing interval. You can enabled and disable the clear documents history procedure. This application sits in the system tray at the bottom right corner of the screen. Once you install it, it will start automatically with system boot.
  • Anykeylogger, as one of hot monitor software in the world, is widely applied to parental control, employee monitoring and private detective service. The keylogger allows you to record entire activities, including online chat details, typed keystrokes, clipboard contents and other activities performed on your PC. It can also captures screenshots at regular time of interval so that you can easily know what is happening on computers in your absence.
  • In the modern work place, managers effectively use network pc monitoring to ensure employee productivity and to keep an eye on undesirable system activities. Kernel Computer Activity Monitor is an advanced tool designed for this purpose. It is invisible to the PC users, as it does not appear in the Task Manager, Process List, Desktop, and Add/Remove Programs. It is a useful tool for organizations as well as individuals - investigators can use it to spy system happenings, and parents can use it to monitor the activities of children. It invisibly takes screenshots, records key strokes, monitors internet and email activities, gives information about Application accesses, saves clipboard activities, tracks passwords and notifies of print activities. Using this tool is an easy thing because of its user-friendly interface. You can configure this application to monitor and record the activities, so that your physical presence is not necessary at the time of monitoring. In addition, there is an option to receive reco ...
  • Power Spy secretly logs Facebook, keystrokes, chats & IMs, emails, web visits, video talk, logins, passwords, applications, searches and more. It also takes screenshots like a surveillance camera. Let you see exactly what they see on a computer screen. Automatically sends log reports to your email or ftp. Starts monitoring with system startup. Runs silently and invisibly. Only administrator of the software can manage it with hotkey.
  • A stealth facebook chat keylogger that will capture keystrokes and record computer activity. Record facebook chat and monitor facebook activity by selecting the option to capture screenshots. Rewind and watch recorded computer activity like a DVD. This im monitor will allow you to see what has been typed within an email, chat, and IM. It will also monitor internet activity as it tracks the URLs that were visited.
  • Encrypt and convert pptx or ppsx to exe with password protected, support PowerPoint 2003, PowerPoint 2007, PowerPoint 2010 and later. You can add additional files required by this PowerPoint file into one single exe, such as flash, video, audio or other files, all files can be protected distributed. The encrypted file support One Computer One Password license to your user's computer, Only you can create open password for your users.
  • M3 Bitlocker Decryption Free is the World's first free Bitlocker drive decryption software to decrypt data from inaccessible, corrupted, damaged or failed Bitlocker encrypted hard drive under Windows 8.1/8/7/Vista and Windows Server 2012/2008 32 bit and 64 bit.
  • Hard drives, Flash Drives, SSD's nor USB sticks are safe from File Shredder Ultra. Within a few clicks, your selected data is set to be renamed and irretrievably shredded and overwritten, multiple times. Combined with the extra Free Space Shredder feature included free, your data has no where to hide. Works well for traditional mechanical hard disks and newer technologies such as SSD's.

Page 9 of 30
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30


Legal disclaimer | Privacy policy

© 2004-2017 IT Shareware