Home | Submit a file  |  New  |  Categories  |  Our awards  |  Link to us  |  RSS Feeds

Utilities :: Security & Encryption
Sort by: date | product title | rating | downloads | popularity
Display: short descriptions | full descriptions
  • PC Spy Keylogger secretly logs Facebook, keystrokes, chats, IMs, emails, websites visited, microphone, video talk, logins, passwords, applications, searches, documents and more. Logs Skype, Yahoo Messenger, MSN, ICQ, AIM, etc. Takes screenshots every x seconds like a spy cam. Sends logs to your email. You can check logs on a remote PC, tablet, smart phone, or directly on the monitored PC. Perfect for monitoring employees, kids and spouse.
  • EveryPass is a free, open source, portable password manager that provides safe storage of passwords on modern computers, tablets and phones without installing anything or needing Internet access. This is achieved using a single HTML5 file that uses the strongest possible AES encryption for user data and provides an easy to use interface that adapts to the device being used. EveryPass is open source to foster community additions and review.
  • Protector Plus -Free Windows Vulnerability Scanner is compatible with Windows 7 ,Windows Vista, Windows XP, Windows Server 2003, Windows Server 2008. Once the Scan is completed, It lists the Vulnerabilities detected, their risk level and the download location of the patch. You are advised to download the latest version of Protector Plus, you can click on Download Protector Plus 2014 button on the scanner to download the same.
  • Download latest Vroot version 1.7.3.4388 from here, here or here. - This requires a PC. - No CWM needed. - This installs a Chinese root manager rather than superuser or superSU. But I will teach you how to replace it below. - This tool can root also MTK6582 poweered devices, including new Tronsmart TS7. Instructions 1. Download the rooting application. (This app can root many other devices) 2. Install the app. This is a Chinese app so I will guide you. 3. Start VROOT and root now! 4. Now we need to install SuperSU from play store to replace the Chinese root manager called ???? 1.0.4. 5. Go to play store and install SuperSU. 6. Start SuperSU and you will be asked for permission by ???? 1.0.4, choose ??(means allow). (Should be the right side option.) 7. SuperSU will prompt to install SU binary, go ahead with OK and it will display successful. 8. Now, freeze ???? 1.0.4 in titanium backup, just in case you need it again. Note: If you uninstall straight away from app manager, you need to mak ...
  • Pro Key Lock can be used to lock specific keyboard and mouse buttons, like the function keys, the caps-lock key, the windows (start) key or key combinations like Alt-Ctrl-Del, Alt-Tab, etc. You can also lock specific mouse functions like the right click or the double click. The user can also define a rectangle on the screen and instruct Pro Key Lock to enable mouse clicks only inside/outside this rectangle.
  • Kid Key Logger Pro is a powerful, fully featured, keylogger, specifically designed for parents to record their children activity, while they let them play on their computers. Kid Key Logger Pro can log keystrokes, mouse and windows events ans also capture screenshots of your desktop. Log files can be written to disk, emailed or uploaded on a server. The key logger can be remote-controlled from another PC or from an Android device.
  • LanAgent is a smart tool to monitor all actions of a remote computer user. The program records various kinds of data, which will be sent to you on your first request: keystrokes; connections established; websites visited; programs, files or directories opened; clipboard contents and so on. A detailed report on a specified time period is always available to you, yet the program is absolutely invisible to this remote user.
  • In the modern work place, managers effectively use network pc monitoring to ensure employee productivity and to keep an eye on undesirable system activities. Kernel Computer Activity Monitor is an advanced tool designed for this purpose. It is invisible to the PC users, as it does not appear in the Task Manager, Process List, Desktop, and Add/Remove Programs. It is a useful tool for organizations as well as individuals - investigators can use it to spy system happenings, and parents can use it to monitor the activities of children. It invisibly takes screenshots, records key strokes, monitors internet and email activities, gives information about Application accesses, saves clipboard activities, tracks passwords and notifies of print activities. Using this tool is an easy thing because of its user-friendly interface. You can configure this application to monitor and record the activities, so that your physical presence is not necessary at the time of monitoring. In addition, there is an option to receive reco ...
  • SpyPal Free Keylogger secrectly records Facebook, keystrokes, screenshots, websites visited, applications, clipboard, passwords, emails, documents and more. In Invisible Mode, it is completely hidden to monitored users. Use hotkey and password to access the program. Automatically sends logs to your email every x seconds. Perfect for monitoring employees and parental control.
  • PC Monitoring Keylogger secretly logs Facebook, keystrokes, chats, IMs, emails, websites visited, microphone, video talk, logins, passwords, applications, searches, documents and more. Logs Skype, Yahoo Messenger, MSN, ICQ, AIM, etc. Takes screenshots every x seconds like a spy cam. Sends logs to your email. You can check logs on a remote PC, tablet, smart phone, or directly on the monitored PC. Perfect for monitoring employees, kids and spouse.
  • This simple program lets you store a list of your various passwords, user ID's, combination locks, etc. The file is encrypted for added security.
  • Invisible Spy Keylogger secretly logs Facebook, keystrokes, chats, IMs, emails, websites visited, microphone, video talk, logins, passwords, applications, searches, documents and more. Logs Skype, Yahoo Messenger, MSN, ICQ, AIM, etc. Takes screenshots every x seconds like a spy cam. Sends logs to your email. You can check logs on a remote PC, tablet, smart phone, or directly on the monitored PC. Perfect for monitoring employees, kids and spouse.
  • Seriousd from hackeratwork.com is a proactive time tracker. It monitor your session and give you the ability to discover how you spend your time. Seriousd can also block out your distractions, like Facebook, YouTube, or video games. It work like a parental control for adult. It is slick and easy to use, it really helps to stay focus and keep all your distractions at bay! You can double your productivity with Seriousd! We guaranteed it!
  • Remote Spy Keylogger secretly logs Facebook, keystrokes, chats, IMs, emails, websites visited, microphone, video talk, logins, passwords, applications, searches, documents and more. Logs Skype, Yahoo Messenger, MSN, ICQ, AIM, etc. Takes screenshots every x seconds like a spy cam. Sends logs to your email. You can check logs on a remote PC, tablet, smart phone, or directly on the monitored PC. Perfect for monitoring employees, kids and spouse.
  • KinderGate Parental Control features content filtering based on morphological analysis, vast URL database divided on 70+ categories, download control, safe search, HTTPS support, etc. It provides high accuracy web filtering with extremely low false detection rate. KinderGate blocks resources related to malware, porn, drugs, abusive content, illegal materials and other categories. KinderGate is widely used by schools, libraries and home users.
  • Perfect Keylogger secretly logs Facebook, keystrokes, chats, IMs, emails, websites visited, microphone, video talk, logins, passwords, applications, searches, documents and more. Logs Skype, Yahoo Messenger, MSN, ICQ, AIM, etc. Takes screenshots every x seconds like a spy cam. Sends logs to your email. You can check logs on a remote PC, tablet, smart phone, or directly on the monitored PC. Perfect for monitoring employees, kids and spouse.
  • Windows Keylogger secretly logs Facebook, keystrokes, chats, IMs, emails, websites visited, microphone, video talk, logins, passwords, applications, searches, documents and more. Logs Skype, Yahoo Messenger, MSN, ICQ, AIM, etc. Takes screenshots every x seconds like a spy cam. Sends logs to your email. You can check logs on a remote PC, tablet, smart phone, or directly on the monitored PC. Perfect for monitoring employees, kids and spouse.
  • Home PC Keylogger secretly logs Facebook, keystrokes, chats, IMs, emails, websites visited, microphone, video talk, logins, passwords, applications, searches, documents and more. Logs Skype, Yahoo Messenger, MSN, ICQ, AIM, etc. Takes screenshots every x seconds like a spy cam. Sends logs to your email. You can check logs on a remote PC, tablet, smart phone, or directly on the monitored PC. Perfect for monitoring employees, kids and spouse.
  • With Free PDF Protector 4dots you can batch protect many PDF documents with passwords.It is absolutely free, very easy to use and also multilingual.You can set both a user password (used for opening the PDF documents) and an owner password (used for settings various permissions such as content copying, commenting,printing, form field fill-in).Whole folders with PDF documents and their subfolders can be selected to be protected.Drag and drop.
  • Can you keep all passwords and access data in your mind? The abylon KEYSAFE is a simply password manager to administrate all your secret passwords. You need only one MASTER-password or alternatively a removable media, CD, chip card or certificate as key. The stored data can pull simply with the mouse into the input fields of your browsers or program window (Drag&Drop). With abylon KEYGENERATOR the software also offer a random password generator.
  • Screenlogger is smart and clever program recording PC-user activities, the main software function is screen-shots (snapshots) logging when You set time-periods to create sreenshots and delete them, the kind of Keylogger logging most actual things: logs clipboard, search engine queries, social networks, messengers: Skype, ICQ, AIM, etc., files, applications activities, visited web-sites, remembering logins and passwords, useful information security soft for parental or employees control monitoring purposes Screenlogger main characteristics: Logging each keystroke, Screenshots' logging by set periods, Screenlogger friendly software interface, Clipboard data logging, Logging of search engines' queries, sites, social networks, messengers, files, Screenlogger LogFile search system, Logs calendar, Logs archive searching, Screenshots logging by set periods, Snapshots auto-deletion setting, Screen-shots quick preview and auto-enlarge by 1 click in LogFile, Works in OS Windows XP, NT, 2000, 2003, ...
  • Encrypt your Compact Disc/Usb Flash Drive. Embedded CD burning module. Simply provide decryption password as work with cd/usb as usual.
  • Index.dat are files hidden on your computer that contain all of the Web sites that you have ever visited. Every URL, cookies and browsing history is listed there. The file names and locations depend on what version of Internet Explorer you have. If you are running IE version 4.0 or above, the file name is "index.dat". Microsoft has not supplied an adequate explanation as to what these files are for or why they have been hidden so well.
  • Password WorkBook Pro is a professional but extremely controllable (even by novice users) software built to secure, store and manage passwords, sensitive data, access codes, crucial dates, figures, numbers, and not only. Basically, it is a database-type password protection software that works with your Internet browser to help you safely store all your password information.
  • AntiPhotoSpy removes private information from photos to protect your privacy. Did you know that each image carries text information along with its picture? This information contains data about various things including the name of the application that you have used for editing the image (e.g. Photoshop) or the camera that you used for taking the photo or even the GPS location of the photo. Remove them easily with AntiPhotoSpy.

Page 8 of 30
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30


Legal disclaimer | Privacy policy

© 2004-2015 IT Shareware