Home | Submit a file  |  New  |  Categories  |  Our awards  |  Link to us  |  RSS Feeds

Utilities :: Security & Encryption
Sort by: date | product title | rating | downloads | popularity
Display: short descriptions | full descriptions
  • FILExtinguisher securely deletes all confidential information. You can securely erase passwords, credit card numbers, customer information, tax records and other types of sensitive data. This software offers different 14 delete methods that vary from a fast zero-write to an extremely high security NATO level. Upon completion a certificate is created as a printable log file that displays deleted files, delete dates and method used.
  • Hibosoft BossComing Boss Key is a professional and reliable application designed to protect your privacy and hide sensitive information. It is a powerful, intuitive and easy to use boss key application based on virtual desktop techniques. Hibosoft BossComing Boss Key can hide window, protect your privacy and hide sensitive information from prying eyes in seconds.
  • Keeping your web servers secure from hackers is absolutely essential for keeping sensitive data belonging to your company or your customers safe. The Google Hack Database is a free tool from SecPoint which will scan your web domains for security vulnerabilities and match them to Google. You will then be able to find out if any sensitive information was leaked to Google.
  • Best and easy to download internet monitor application easily allows both technical and non-technical user to use such type software without taking extraordinary technical classes in advance. Simple to operate data tracking tool allows user to save all visited details into different file format like txt or html and also able to save them at safe location in system or at user defined another desktop. Amazing PC monitoring utility operates in hidden mode that is not visible in task manager, start up menu, file, add or remove program, installation folder etc. Special http://www.monitoringsoftware.mobi site allows user to take a trial version of tool for understand software. Safe and economical personal computer data manager program allows user to record all actions performed by kids in stealth mode including typed keyword, URLs, visited websites, sending and receiving mails, chat conversation, screenshots and many others in efficient manner. Superior monitoring software supports all Windows OS based system suc ...
  • FNOWare Password Generator, generate more secure passwords. Ability to generate passwords of different lengths.
  • StaffCop Home Edition - Parental Control Software designed specifically for home use. Software helps parents to watch and analyze their children's internet-activity. Software is designed to track website visits, IM chats (ICQ, Skype, AIM), social network activity. All records, statistics and screenshots can be reached through the password protected administrative module which can't be accessed by children.
  • CyberSafe is one of the perfect solutions for data encryption software. It provides the ultimate data security features including support for many different algorithms and encryption methods. You can hide files and folders and encrypt them so that no one can ever access your data unexpectedly. Skype chat messages, emails and Amazon S3 encryption are also supported by this powerful all-in-one solution.
  • PDF Protection Tool from SysInfoTools is very flexible and powerful tool that allows you to impose various security parameters to your PDF file easily. This tool allows user to encrypt (using standard 40-bit or 128-bit supported by Acrobat Reader 5.0 and up) the existing PDF documents, set permissions, add user and owner password. PDF Protection Tool from SysInfoTools is stand-alone application which means that Adobe Acrobat (or any other product) is not required. PDF Protection Tool from SysInfoTools is 100% result oriented and very fast than any other PDF protection imposer tool. It does not modify the existing content of the file and keep the document original as before. This sophisticated software tool take a simple PDF file as input and create a copy of it for user's security( users original document's accessibility is out top priority), then it perform security insertation operations on the copy of original. Within seconds this tool do all the desired operations. PDF Protection from ...
  • NSF Local Security Remover from SysInfoTools is a robust and powerful tool that allows user to remove local security restrictions from secured NSF database files of lotus Notes. This tool removes security in no time with just few mouse clicks and key strokes. NSF Local Security Remover from SysInfoTools is a perfect solution for removing security from secured NSF database file of Lotus Notes. Lotus Notes has an attribute named as Access Control List (ACL) using which administrator set access rights to particular NSF file. Using this attribute file owner manages the NSF file. But sometimes situation arises when Lotus Domino server act inaccessible stops responding and the user or administrator is not able to access the NSF file. Every time when they try to do so the above mentioned errors are flashed making situation worse. NSF Local Security Remover from SysInfoTools is especially designed to deal with such type of situations. It erases NSF security aptly and helps you to open and read Lotus Notes NSF file ...
  • Using USB Security, network administrators can place an essential extra safeguard over their computers and networks. USB Security allows you to block off access to potentially harmful USB devices while white-listing other devices such as USB printers and input devices so you can otherwise continue to use the computers normally. With centralized installation and configuration, it makes this program and ideal choice for USB security.
  • Innovative Spy software allows business users with best option to secretly trace and record overall office employees performed internet activities during their working hours. www.dd-spy.com facilitates users with highly developed feature to prominently monitor each and every typed keystrokes details including presses login id, password, open web pages, composed text documents, search engine search, online chat conversation, send or received emails, changes done in any saved text files, visited websites, played online games and many other similar activities. Key logger application enables users to run program in secretly capture external user performed activities by running utility in complete stealth or hidden mode and remains invisible from start up menu, control panel, computer system screen or desktop items, program files and folders, add or remove list, task manager, installation files and folders and many more. PC data manager program offer user to save encrypted logged files at particular location for f ...
  • Is it possible to find out what web sites recently visited by kids even after they deleted all internet browser's history, cache, temp files, cookies and everything from PC? Yes, download highly reliable windows spy software from www.v-spy.com and start recording all online and offline activities of child without being noticing them. Keylogger software allowed business owners to catch all those employees sneaking around to look at websites that not related to office work. All-in-one windows spy software empowers schools and universities to keep eyes to students to know what they surfing around on the internet using computer lab PCs. Advance spyware utility allowed you to scrutinize and record web browsing habits of your spouse to catch him/her red handed in real time. Windows spy software records all typed instant messages, websites with login/password details, opened/modified documents, system logon and switch off time, chat conversation, social networking sites comments, blog posting, download/upl ...
  • Download reasonable priced Monitoring Software from http://www.digitalpccare.com that facilitates user to have full control over their computer system when they are outside and unable to monitor and come to know what activities were performed on PC by kids, friends, spouse, cousins, relatives, staff colleagues, business partners, classmate or others with the help of recorded log file of each key pressed. Most innovative PC monitoring tool automatically records all typed chat records, email conversations, website visited, password, each keystrokes typed in any application, browsing history even deleted by user, documents lists, download and accessed files. Comprehensive Monitoring Software runs as a background process in your system and nobody can detect its existence except system owner as it hides its visibility from desktop icons, start menu, add-remove programs, installation files-folders, control panel program and even from hidden files too. Outstanding Keystroke logger activities monitoring utility effec ...
  • Folder protect software password protects folders on hard drives and external drives with no extra software required. It doesn't matter if your folders are on hard drives, CD, flash drives, or other types of removable storage media, you can always password protect them using this folder protection software. There are no tricks to bypass security applied by folder protect software.
  • Clean cache, clear history automatically with NetShred X, the easy-to-use internet cache cleaner for Mac OS X that will erase files your browser and email programs leave behind. This internet eraser software is easy to use, fast and cleaner. Easy because it runs automatically - you don't have to remember to use it. Fast because you don't have to wait for it. Cleaner because it will erase, not just delete cache, history, deleted email, and more
  • JiJi Password Expiration Notification is a simple tool to notify users, managers and administrators through e-mail before their password and account expire. Administrator can receive the summary report to the specific email ids. Administrator can define the notification task for any specified target (Domain, an OU, Group, Set of Users).
  • JiJi Password Expiration Notification is a simple tool to notify users, managers and administrators through e-mail before their password and account expire. Administrator can receive the summary report to the specific email ids. Administrator can define the notification task for any specified target (Domain, an OU, Group, Set of Users).
  • AWinware Pdf encryption software locks pdf documents with user password and owner password security. User password ensures you that only authorized person can view locked pdf. Encrypt pdf password with strong RC4 and AES encryption. Owner password protection ensures that the document is restricted for editing, printing & copying. If you are having lots of private and confidential pdf documents and you wish all them to protect with password security, AWinware pdf encryption software is best choice because program is very easy to use, affordable and reliable for everyone. Tool provides option to lock pdf with file open password security and owner restrictions. You can set the restrictions on document according to need; like program lets you to disable pdf printing, deny content copying, block pdf editing, restrict pdf form filling, signing and commenting. Using this application, you can lock document with 40 bit and 128 bit encryption security.
  • JiJi Password Expiration Notification is a simple tool to notify users, managers and administrators through e-mail before their password and account expire. Administrator can receive the summary report to the specific email ids. Administrator can define the notification task for any specified target (Domain, an OU, Group, Set of Users).
  • ShareRight is a network administration tool providing detailed analysis of all file shares and documents on the network and their associated NTFS permissions, together with discovery and quick launch of each shared folder,document and VNC viewer. In addition, notes may be recorded for each machine for support and maintenance purposes.
  • JiJi Password Expiration Notification is a simple tool to notify users, managers and administrators through e-mail before their password and account expire. Administrator can receive the summary report to the specific email ids. Administrator can define the notification task for any specified target (Domain, an OU, Group, Set of Users).
  • iKeyMonitor is an iOS Keylogger for iPhone/iPad/iPodTouch that logs keystrokes, websites, screenshots and automatically sends the logs to you by email or FTP. And iKeyMonitor is the only Keylogger for iPhone/iPad/iPodTouch with the features of Keystrokes, websites, screenshots logging and email/FTP delivery. iKeyMonitor can be installed on any Jail-broken iOS devices.
  • Employee ID Cards utility provides facility to create Identity cards for professional users like company employee, security, visitors, staffs and other office members in efficient and organized way. Comprehensive card maker software offers easily adjustable font, image, color and style settings to build customized identity cards in easiest manner. Software offers password setting features to protect ID card maker utility from unauthorized users during designing process. Business oriented ID card maker application facilitates to modify existing card or create new card from scratch as per user requirements. Highly reliable ID card generator program offers wide range of designing tools such as pencil, arc, text, line, image, ellipse, picture, star and many more to built preferred style ID cards according to business needs. Users can generate stylish and innovative ID cards in different shapes like rectangle, ellipse, circle, triangle and rounded rectangle format. Versatile card designing application facilitates ...
  • JiJi Password Expiration Notification is a simple tool to notify users, managers and administrators through e-mail before their password and account expire. Administrator can receive the summary report to the specific email ids. Administrator can define the notification task for any specified target (Domain, an OU, Group, Set of Users).
  • Safe Deleter is a secure data erase tool for Windows. It completely removes sensitive data from your hard drive by overwriting it several times with military strength selected patterns.

Page 8 of 30
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30


Legal disclaimer | Privacy policy

© 2004-2014 IT Shareware