Home | Submit a file  |  New  |  Categories  |  Our awards  |  Link to us  |  RSS Feeds

Utilities :: Security & Encryption
Sort by: date | product title | rating | downloads | popularity
Display: short descriptions | full descriptions
  • Information security Keylogger NET4 consists of Spying for users system activity module and Keylogger data Viewer module that can be installed as into the system and on a removable device(USB flash drive). Keylogger NET4 is powered with keyboard spy logging each keystroke, the module recording all Internet sites, search queries, system applications, clipboard data. Keylogger saves and sends to Viewer the collected data as the encrypted container protected by your password that knows noone but You to encrypt data in the spy module and to decrypt the received data in Viewer. KeyLogger NET4 is the Best program for parental and employees control purposes with the function of sending all collected data to your E-mail address. All data-transfer is proceed in the encrypted mode that secures it from been watched by any third part. Keylogger Viewer shows all structured data. Viewer Calendar allows to follow data by history. The built-in search system can easily find all data You need and add it into Favorites area. ...
  • Information security Keylogger NET system consists of Spying for users system activity module sending collected data in XLS format to your E-mail address. Keylogger NET is powered with the keyboard spy logging each keystroke, the module recording all Internet sites, search queries, system applications, clipboard. Keylogger saves collected data in encrypted mode and sends them to your E-mail address as a simple XLS file that You can easily open with MS Excel, OpenOffice and other applications. KeyLogger NET is the software product suitable first of all for people whose work is connected with huge data amount that can be restored anyway regardless of whether it was saved or just typed. You will not loose data typed on your computer keyboard. It is the good program for parental control and employees control purposes with the function of sending all collected data to your E-mail address. The software records each application start, remembers passwords, Internet addresses and search engines' queries ...
  • Information leakage becomes a social problem. Information leakage may be given a huge damage to a company or individual. So we need security software to protect our information (data,file). There are much security software for PC, but little security software for mobile device. USB Flash Security is security software for mobile device. It can help you to protect you mobile devices by encryption(AES256bit). AES encryption which is recognized by speedy and cipher strength of encryption algorithm has been adopted. Data will be encrypted automatically by writing in USB memory, and it will be decrypted automatically by reading from USB memory. USB Flash Security##g can be installed to five USB drives up to 2TB in trail period. If uninstall USB Flash Security##g from one USB drive, it can be installed to the other one. USB Flash Security##g is for group user, so the number of USB drive that can be protected by USB Flash Security##g will be set by the order of license. About encryption of USB Flash Security##g, a ...
  • Information leakage becomes a social problem. Information leakage may be given a huge damage to a company or individual. So we need security software to protect our information (data,file). There are much security software for PC, but little security software for mobile device. USB Flash Security is security software for mobile device. It can help you to protect you mobile devices by encryption(AES256bit). AES encryption which is recognized by speedy and cipher strength of encryption algorithm has been adopted. Data will be encrypted automatically by writing in USB memory, and it will be decrypted automatically by reading from USB memory. USB Flash Security#g can be installed to five USB drives up to 16GB in trail period. If uninstall USB Flash Security#g from one USB drive, it can be installed to the other one. USB Flash Security#g is for group user, so the number of USB drive that can be protected by USB Flash Security#g will be set by the order of license. About encryption of USB Flash Security#g, all o ...
  • Information leakage becomes a social problem. Information leakage may be given a huge damage to a company or individual. So we need security software to protect our information (data,file). There are much security software for PC, but little security software for mobile device. USB Flash Security is security software for mobile device. It can help you to protect you mobile devices by encryption(AES256bit). AES encryption which is recognized by speedy and cipher strength of encryption algorithm has been adopted. Data will be encrypted automatically by writing in USB memory, and it will be decrypted automatically by reading from USB memory. USB Flash Security++g can be installed to five USB drives up to 8GB in trail period. If uninstall USB Flash Security++g from one USB drive, it can be installed to the other one. USB Flash Security++g is for group user, so the number of USB drive that can be protected by USB Flash Security++g will be set by the order of license. About encryption of USB Flash Security++g, a ...
  • Information leakage becomes a social problem. Information leakage may be given a huge damage to a company or individual. So we need security software to protect our information (data,file). There are much security software for PC, but little security software for mobile device. USB Flash Security is security software for mobile device. It can help you to protect you mobile devices by encryption(AES256bit). AES encryption which is recognized by speedy and cipher strength of encryption algorithm has been adopted. Data will be encrypted automatically by writing in USB memory, and it will be decrypted automatically by reading from USB memory. USB Flash Security+g can be installed to five USB drives up to 4GB in trail period. If uninstall USB Flash Security+g from one USB drive, it can be installed to the other one. USB Flash Security+g is for group user, so the number of USB drive that can be protected by USB Flash Security+g will be set by the order of license. About encryption of USB Flash Security+g, all of ...
  • Information leakage becomes a social problem. Information leakage may be given a huge damage to a company or individual. So we need security software to protect our information (data,file). There are much security software for PC, but little security software for mobile device. USB Flash Security is security software for mobile device. It can help you to protect you mobile devices by encryption(AES256bit). AES encryption which is recognized by speedy and cipher strength of encryption algorithm has been adopted. Data will be encrypted automatically by writing in USB memory, and it will be decrypted automatically by reading from USB memory. There are five editions in 'USB Flash Security' for personal user. USB Flash Security (Free) USB Flash Security+ (Product) USB Flash Security++ (Product) USB Flash Security# (Product) USB Flash Security## (Product) Main differences of each edition are the disk capacity and the number of USB drives. USB Flash Security++ can be installed to TWO USB ...
  • Password Genie is a password manager that works across multiple computers and users and is designed for both security and convenience. You can easily save all of your usernames and passwords in one location which is securely protected and can only be accessed by you. Features include: Smart and Complex Logins, Password Generator, Bookmarks, Organized Folders, Safe and Secure Encryption, Automated Backups, 24/7 Support and a Browser Button.
  • Keylogger Software is an advanced monitoring software used track & record all events executed on computer systems, PCs, laptops in nonexistence of users. Keylogger tracks each and every moment carried out on desktops, Laptops etc such as all chat talks, visited videos, installed applications, downloaded files and many more. Keylogger Software is an advanced activity watcher utility allowing tracing sounds produced during PC microphone conversations. Keylogger performs complete controlling over PC actions and events by capturing screenshots on each mouse click and typed keystroke. Keylogger Software is efficient software capable of generating HTML reports containing records of all events operated on PCs, computers in user absence. Keylogger Software is keyboard activity controlling tool able to observe all voice chats of both sides operated on multiple chat programs such as Yahoo Messenger, ICQ, QIP, MSN, Miranda etc. Keylogger begins sound recording when the sound level is above the definite thres ...
  • Protect PDF copying software secures PDF with user password as well as owner password. Download free evaluation version of PDF encryption program to lock PDF document. Protecting PDF with open password ensures that only intended recipients will be able to open and view PDF files. Securing PDF with owner password ensures that only allowed permissions will be accessed by the user. PDF password encryptor tool works as file protector and restrictor utility which allow security encryption. PDF protector tool restrict permission such as PDF printing, content copying, form filling, document modifying, page extraction, commenting, signing and copying content for accessibility. If you know more knowledge to this software go link www.unprotectpdf.com to read and download trail version of software. Encrypt PDF content stream with strong RC4 40 bits & 128 bits and AES 128 bits strength security level. Software runs on several windows operating system such as Win2000, Win7 x32, Win7 x64, Win98, Win Vista, Win Vista x6 ...
  • This professional data wiping solution deletes files, drives, partitions and overwrites free space without the possibility of data recovery. It supports up-to-date wiping algorithms like DoD 5220.22, Gutman, Bruce Schneier, Single Pass, VSITR and custom pattern. Designed for professional use, it supports batch wiping and digital signed log files, which are required to legally proof the wipe process. DataErase is easy to use, fast and reliable.
  • Keystroke logger free is advanced computer monitoring software to monitor & record every moment performed on PCs, computers, desktops, laptops in non existence of authorized users. Keystroke recorder tracks each voice chat, installed programs, visited websites, downloaded files, username, passwords, sending and receiving electronic mails and many more. Keystroke logger free is keyboard activity watcher program observes each key pressed through keyboard by other users. Keystroke logger free records all sounds generated via PC microphone operated on computer system. Keystroke logger free is invisible software capturing screenshots on indication of any mouse click and typed keystroke. Keystroke logger free is surveillance software enables to stop taking screenshots throughout inactive hours of computer and pick up visual surveillance on further observation of any mouse click or key press event. Keystroke logger free creates HTML reports including descriptions of all records processed on PCs. Keystrok ...
  • iSafe Employee Monitoring Software records and monitors your employee's activities and provides you on-site and remote access to employee's logs and computer screens in real time. About computer monitoring software.Best WorldClass monitoring software - iSafe Employee Monitoring Protect your company's assets with employee monitoring. Install iSafe Employee Monitor and forget it, and it keeps monitoring for you!
  • There are times when users need to delete their important files and folders, so as to protect the stealing of their confidential data. Simply deleting files does not actually works to protect your data because even if they are deleted permanently from Recycle Bin, they still remain somewhere in the computer. This issue can be resolved using Kernel File Shredder. It is professionally designed file shredder Windows 7, which works in such a way that no other data recovery tool or software could retrieve and restore those files ever. The software is integrated with powerful algorithm for impeccable performance. Those algorithms are US Army AR380-19 (3 passes), Peter Gutmann (35 Passes), DoD 5220 + Peter Gutmann, and German VSITR (7 Passes). Kernel File Shredder can only work if the files are stored on the computer?s hard disk because the software does not allow shredding files and folders stored on network drive, pen drive, or any other storage media. The file shredder windows 7 software provides multiple options ...
  • PDF Encrypt Tool V4.0 can be used to protect your PDF files with 128-bit strength user and owner passwords, set all permissions(such as coping, editing, printing, selecting text and graphics, fill in etc), and prevent PDF files from being printed, changed, copied, extracted, signed, filled, assembled and/or merged. It is the fast, affordable way to encrypt a lot of pdf files to encrypted pdf files once time for saving your time! Its easy-to-use i It is very powerful and easy-to-use! PDF Encrypt Tool supports batch Encrypt mode. PDF Encrypt Tool supports all popular PDF formats. PDF Encrypt Tool supports 40-bit Encryption and Adobe Advanced 128-bit Encryption. PDF Encrypt Tool can be run independently,does not need Adobe Acrobat.
  • Chat Monitoring Spy secrectly logs all keystrokes, web visits, emails, chats & IMs: MSN Messenger, Windows Live Messenger, ICQ, AOL/AIM, Yahoo! Messenger and Skype. It displays exact activities, like MySpace, Facebook, PC games, online searches & shopping, file transfers and webmails. It takes screenshots every X seconds like a spy cam. You can receive reports remotely via emails or ftp.
  • With Private Folders you will find out how easy is to protect your private files. Private Folder protects your data in a natural way - it simply hides your files and folders. And your data will be hidden until you decide to reveal them. All you need to protect your data is to add your secret folders to the list. When you need to access your protected data, simply press a hotkey and type your password your files will become visible immediately!
  • The Flash Antidecompiler is a new generation of the flash obfuscators. It is very simple and at the same time secure enough. All Windows, Mac OS X, and Linux platforms are supported. All Flash, Flex, and ActionScripts versions supported. The commercial version supports all SWF standard web applications. The Flash Antidecompiler protects both ActionScript source code and multimedia content (images, audio, video, etc.) embedded in SWF file.
  • Kurupira Web Filter, free parental control software: block improper websites, filter content and control the time spent on the web. Your safety in the digital jungle.
  • Self Service Password Reset Tool JiJi Password Reset Suite, end-users can securely reset their own Active Directory passwords without having to involve highly technical helpdesk professionals. Gartner stated if a 10,000-employee company automated password-resetting alone, help desk calls could drop by one-third and the firm could save US$648,000 each year. According to Burton Group, studies show the management of passwords cost US$200 to US$300 per user, per year. With JSSPR end-users no longer have to wait for a member of the helpdesk staff to reset their forgotten or lost password. It raises helpdesk efficiency, the staff now has more time to focus on other issues rather than tying up valuable resources on the time consuming task and mundane of resetting passwords. JSSPR can help your organization to reduce costs, improve security and increase productivity. Features: 1. Self password management portal for domain users. 2. Supports Password Reset/Unlock account/Change Password through web without ...
  • PTP (Person To Person) now lets you email uncrackable files in AutoCrypt(TM) mode. This means it will self-decrypt at the other end, as if by magic ! The recipient does not need any software or digital certificates to decrypt the file. This feature is unique to PTP and ensures that you can send safe files without worrying about whether the recipient has the right decrypion software to read them. No other system makes email security so easy.
  • As we know, employees often do not use all their time on the job for work related activities. They chat with their friends, watch movies, take away company's secret and confidential data via flash drives. Employer Surveillance helps in improving the productivity of your employees by blocking activities that are not work related such as instant messengers, entertainment content, social networks. It helps in protecting your company's security.
  • MSN messenger spy secretly records all MSN Messenger, Windows Live Messenger and Windows Messenger's incoming and outgoing chat text messages. Best chat logger software (Best MSN messenger chatting spying software) tell you what your spouse, kids or employees have been doing on the computer in your absence. Best MSN messenger chatting spying tool hack and monitor all MSN chat messages in your network. Spy on MSN chat conversations software can record any conversation from any PC. Free MSN Chat Monitor Software spys all version MSN IM chatting records. MSN monitoring software for both company and home use, MSN Spy Monitor is designed to monitor msn chat history (conversation messages). MSN chat decoder easily decodes and view not only yours but others chat conversation, while offline, without their password. msn spy utility to hack and monitor all MSN chat messages retrieves all chat records that are stored on your PC. Read any MSN Chat file on your system even you don't know the password of ...
  • SpyPal Invisible Spy secrectly records keystrokes, screenshots, websites visited, windows opened, applications, MSN, ICQ, AIM, Yahoo! IM, Skype, clipboard, passwords, emails, documents and more. In Stealth Mode, it is completely invisible to computer users. Use hotkey and password to access the program. Auto send logs to a preset email or ftp at set interval. Usages: monitors employees, children, spouse and investigate crimes.
  • Bsecsoft Data Locker is professional file encryption and folder lock software which offers you best way of encrypting and password protecting files and folders. It can safely protect any file and folder on your PC from being seen, read or modified. The Data Locker is easy to use, just like a safety box, and support to drag and drop the folders or files you want to hide or protect.

Page 8 of 30
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30


Legal disclaimer | Privacy policy

© 2004-2014 IT Shareware