Home | Submit a file  |  New  |  Categories  |  Our awards  |  Link to us  |  RSS Feeds

Utilities :: Security & Encryption
Sort by: date | product title | rating | downloads | popularity
Display: short descriptions | full descriptions
  • Fleet tracking software by RedBrickSecurity uses GPS signals and manages the data as per the required rule set. Fleet tracking software module will upload data, convert into encoded text and send the coordinate via a data bearer such as SMS, Email and Byte array to any desired location. Obtains GPS Data in NMEA format. Can handle data as per defined rule sets. Data can be logged on local device for delayed analysis or retrieved real time mapping.
  • Supreme Folder Hider will hide files and folders and keep users from accessing and viewing the files from within Windows Explorer. This folder security software allows you to password protect folders with a simple keyboard hotkey. Supreme Folder Hider runs in stealth mode and doesn't show up in the applications tab when you press Control-Alt-Delete. Hide adult videos and adult pictures with a keyboard combo.
  • InfoBox is a freeware to store your important and sensitive information securely on your computer. You can safely store stuff like passwords, bank account details, credit card details, logins to various web sites, access codes and other important personal and business information. The information is stored on your computer in a secure Box which is password protected. It's a portable app which you can carry on a pen drive.
  • SkyCrypt is a FIPS 140-2 validated Cloud Encryption Gateway. It allows users to add 256 bit AES encryption to local drives, Google Drive, Dropbox, Bitcasa, SkyDrive or most any other cloud storage service. SkyCrypt features include : NIST FIPS 140-2 validation, AES 256 bit encryption, optional 2 factor authentication via Google Authenticator for IOS or Android, and encrypted file names
  • USB Copy Protection is a one-stop-solution program to prevent all your files in a USB flash drive or other types of mobile storage devices from unauthorized copy and distribution. It can COPY PROTECT a wide range of file formats such as EXE, DOC, XLS, PPT, PDF, TXT, FLASH, CAD, PSD and other video, audio, image formats. With the adoption of the strongest military standard encryption technology your data cannot be illegally copied, deleted, moved.
  • Web Patrol software provides a customizable approach to filter your children online activities so that you can keep them safe in an increasingly dangerous online world. Our software allows you to block your child?s unsafe activities from instant messengers to games and even chats. You can use website filters to restrict access to age appropriate sites, block online applications and also receive reports on your child?s online activities remotely. One other great feature is time controls. With time controls you specify which hours of the day for each day of the week your child is allowed Internet access. This feature can be used to block your child from being online when you are not available to monitor his activities. By using Web Patrol on your computer you can rest assured that your child is using the Internet in a safe and appropriate environment.
  • Password Box is one of the best password managers and private information to keep you safe. It is easy to use and yet powerful multipurpose program allows users to create their own arbitrary number of categories and fields that can be flexibly configured to fit your goals. This approach provides new ways to store and organize information. Password Box allows you to store all the important information in one file, which is securely encrypted.
  • Ax3soft Scout process activity monitor is a professional monitoring tool for Windows, it can monitor a process all-sidedly in real time, including process/thread, file system, Registry and network activity whit its powerful features. To create a detail report for process, Ax3soft Scout makes it easy to find and solve your computer problems, e.g. malware, troubleshooting. Key Features Real-time monitor and analyze Ax3soft Scout can monitor process/thread, file system, Registry and network activity (includes: IP, ICMP, TCP and UDP conversations, HTTP visit, Email transfer and FTP transfer) real-time and analyze these activities to identify security threats with different colors. Detail reports Ax3soft Scout can analyze numerous activities to create a detail report for process, the report?s content is very clear, it includes all the threats found and some key activities events. You can find and solve computer problems quickly and easily with the report, even if you don?t have extensive computer knowled ...
  • FoxyVPN provides a secure anonymous proxy VPN tunnel between you and the Internet, for free. Hide your IP address, surf the web anonymously, and protect your online identity by encrypting all your Internet traffic. With it's parent company in the online privacy market for more than 6 years, our experience at FoxyVPN allows us to provide the highest quality proxy VPN experience for an amazing value. Download FoxyVPN now for free!
  • iKeyMonitor iPhone Spy App is an invisible spy app for iPhone/iPad/iPod touch that logs keystrokes, passwords, calls, SMS, WhatsApp/Skype/Viber/Line/Kik/Hangouts/Facebook messages, GPS locations, websites and screenshots, and it will automatically send the logs to users by email or FTP. What does iKeyMonitor iPhone Spy App do? 1. iKeyMonitor records passwords entered and keystrokes typed on the targeted iOS device. 2. Call logging is available as well. Users can see the phone numbers, call durations and time stamps. Meanwhile, it supports logging of Contacts/Notes/Calendars/Reminders/Voice Memos. 3. The iPhone spy app for iOS devices not only tracks incoming and outgoing text messages, but also records WhatsApp/Viber/Kik/Skype messages sent and received. 4. It also offers information of the GPS locations of the iOS device. 5. Another feature is websites history tracking. This invisible spy app logs all the websites visited in Safari and shows users the URLs, time and titles. 6. What&a ...
  • Anykeylogger, as one of hot monitor software in the world, is widely applied to parental control, employee monitoring and private detective service. The keylogger allows you to record entire activities, including online chat details, typed keystrokes, clipboard contents and other activities performed on your PC. It can also captures screenshots at regular time of interval so that you can easily know what is happening on computers in your absence.
  • ShareRight is a network administration tool providing detailed analysis of all file shares and documents on the network and their associated NTFS permissions, together with discovery and quick launch of each shared folder,document and VNC viewer. In addition, notes may be recorded for each machine for support and maintenance purposes.
  • Save your secret data in secure storage. Unlimited data entry and grouping system with Dynamic search engine feature. Now it's time you take a break from a displease thing. By using the "Manager Password Pro", it's become a satisfying thing.
  • SECUDRIVE Privacy Protection is a powerful, easy-to-use security software suite, designed to protect your privacy and prevent data loss. This simple and light security software allows you to enhance your PC usage experience with data encryption, folder hiding, file synchronization and permanent file deletion features.
  • In the modern work place, managers effectively use network pc monitoring to ensure employee productivity and to keep an eye on undesirable system activities. Kernel Computer Activity Monitor is an advanced tool designed for this purpose. It is invisible to the PC users, as it does not appear in the Task Manager, Process List, Desktop, and Add/Remove Programs. It is a useful tool for organizations as well as individuals - investigators can use it to spy system happenings, and parents can use it to monitor the activities of children. It invisibly takes screenshots, records key strokes, monitors internet and email activities, gives information about Application accesses, saves clipboard activities, tracks passwords and notifies of print activities. Using this tool is an easy thing because of its user-friendly interface. You can configure this application to monitor and record the activities, so that your physical presence is not necessary at the time of monitoring. In addition, there is an option to receive reco ...
  • The generation of cryptographic keys and certificate requests X.509, and other service functions associated with the formation and maintenance of key systems of the carriers in PKI (Public Key Infrastructure - PKI), supporting secure applications built on the basis 2-keys cryptographic algorithms. Support: GOST R34.10-2001, RSA, DSA, eToken, Rutoken EDS, KRYPTON, Accord-AMDZ, Sobol...
  • Automatically clear the list of recent documents history at specified intervals. You can choose clearing interval. You can enabled and disable the clear documents history procedure. This application sits in the system tray at the bottom right corner of the screen. Once you install it, it will start automatically with system boot.
  • Hard drives, Flash Drives, SSD's nor USB sticks are safe from File Shredder Ultra. Within a few clicks, your selected data is set to be renamed and irretrievably shredded and overwritten, multiple times. Combined with the extra Free Space Shredder feature included free, your data has no where to hide. Works well for traditional mechanical hard disks and newer technologies such as SSD's.
  • Keylogger Plus will let you know that other people are doing on your computer when you are not in place. Do you want to protect your children from internet dangers? Do you want to monitor your employee's computer and internet activities? If Yes - just download a Keylogger Plus. Keylogger Plus allows you to track all keystrokes typed, ICQ, Skype, IM conversations, screens, passwords, emails, clipboards, internet and desktop activities.
  • A stealth facebook chat keylogger that will capture keystrokes and record computer activity. Record facebook chat and monitor facebook activity by selecting the option to capture screenshots. Rewind and watch recorded computer activity like a DVD. This im monitor will allow you to see what has been typed within an email, chat, and IM. It will also monitor internet activity as it tracks the URLs that were visited.
  • Login to your PC without touching a thing! Luxand Blink! is a free tool to let you log in to your Windows account by simply looking into a webcam - no passwords to type and no fingers to scan. The innovative face recognition technology developed by Luxand recognizes users' faces quickly and reliably, and is able to match the user with an associated account even with different haircuts, beards or mustaches grown or shaved off.
  • PC Ports and connections data monitoring, logging and analyzing software. Device Monitor is an USB, Serial and Network protocol analyzer, data logger software and may be used to capture, log, view and analyze data coming to and out of your computer. Recorded log files can be replayed later even on another computer. Device Monitoring Studio provides you with complete set of features to figure out what's going on when device is connected to the PC
  • Effective and Cost effective Mac Monitoring Utility downloads trail demo from www.macmonitoring.net and you can monitors all internet, USB insertion or removal activities from your Mac system which are performed by other person on your computer machine without your permission. Time saving Internet recording application captures keystrokes, clipboard activities and voice chat conversation along with accessed desktop screenshots at regular interval of time. Comprehensive computer monitoring utility provides best methodology to monitors all USB mass storage devices insertion and removal activities from your Mac machine when you not available on your system which are performed by hackers. Easy to use monitoring internet utility provides user friendly Graphical GUI interface with help menu and non technical or technical operator easily drive to monitoring tool with any training or supports. Innovative or highly technical Mac monitoring software is beneficial for all colleges, universities, institutes, investigatio ...
  • Today in the engineered world many users have major problems with the multitude of passwords. With the software abylon LOGON SSO Pro, the user only authenticate once at the windows logon and have additionally an automatic access to password protected applications. The program boasts with high flexibility, centralized administration and enhanced protection against keyloggers and phishing attacks.
  • 1 Free Keylogger offers full invisible remote control of user activity on PC: keystroke logger, makes screenshots, web camera snapshots, website visits, online searches, social networks - Facebook, myspace, google+, vkontakte, capture login/password for web sites, apps activity, IM/chat etc. 1 Free Keylogger allows remote monitoring in three ways: sending logs via email or FTP and online logs view via secure web account on 1freekeylogger.com.

Page 9 of 30
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30

Legal disclaimer | Privacy policy

© 2004-2016 IT Shareware