Home | Submit a file  |  New  |  Categories  |  Our awards  |  Link to us  |  RSS Feeds

Utilities :: Security & Encryption
Sort by: date | product title | rating | downloads | popularity
Display: short descriptions | full descriptions
  • System Keylogger secretly logs Facebook, keystrokes, chats, IMs, emails, websites visited, microphone, video talk, logins, passwords, applications, searches, documents and more. Logs Skype, Yahoo Messenger, ICQ, AIM, etc. Takes screenshots every x seconds like a spy cam. Sends logs to a specified email. You can check logs on a remote PC, tablet, smart phone, or directly on the monitored PC. Perfect for monitoring employees, kids and spouse.
  • PC Spy Monitor secretly monitors Facebook, chats, emails, keystrokes, passwords and sends reports to your email or ftp. It logs Skype, Yahoo Messenger and other IMs. It also takes photo shots of online video talk like a surveillance camera. PC Spy Monitor runs so stealthily that the monitored user won't even know it. You can use hotkey to unhide it and change settings. It is a must have tool for you to reveal the truth.
  • Aiseesoft FoneEraser is an exclusive eraser for iOS devices. It allows you to remove all data from your iPhone/iPad/iPod completely and permanently. Those data may be contacts, text messages, photo Albums, videos, music, settings, documents and so forth. And the erasing level is optional (Low level, Medium level and High level). In addition, it functions on two or more devices at the same time, which will save lots of time.
  • PC Spy Software logs all Facebook, PC & internet activity and emails log reports to you. PC Spy Software logs all keystrokes, chats & IMs, emails, websites visited, applications, usernames, passwords, documents opened, online searches, microphone sound and more. It takes screenshots like a spy cam. PC Spy Software runs invisibly and PC users won't know its existence. Great for monitoring employees, children, spouse and investigating crimes.
  • ScreenBackTracker saves compressed pictures of the desktop every time you click the mouse left button, therefore recording your past activities that you can consult fast and easy in a slide show fashion. ScreenBackTracker records all your steps in case you ever need them. The program is light and has a very low CPU consumption.
  • Secure Eraser uses the most renowned method of data disposal and overwrites sensitive information in such a sure way that it can never be retrieved - even with specialized software. Our multiple award-winning solutions for definitively destroying data also eliminate any cross-references that could leave traces of deleted files in the allocation table of your hard drive.
  • Invisible Spy Software secretly logs Facebook, keystrokes, chats, IMs, emails, websites visited, microphone, video talk, logins, passwords, applications, searches, documents and more. Logs Skype, Yahoo Messenger, ICQ, AIM, etc. Takes screenshots every x seconds like a spy cam. Sends logs to your email. You can check logs on a remote PC, tablet, smart phone, or directly on the monitored PC. Perfect for monitoring employees, kids and spouse.
  • Perfect Keylogger secretly logs Facebook, keystrokes, chats, IMs, emails, websites visited, microphone, video talk, logins, passwords, applications, searches, documents and more. Logs Skype, Yahoo Messenger, ICQ, AIM, etc. Takes screenshots every x seconds like a spy cam. Sends logs to your email. You can check logs on a remote PC, tablet, smart phone, or directly on the monitored PC. Perfect for monitoring employees, kids and spouse.
  • Project Password is advanced and extremely fast password recovery tool for MS Project files (.mpp) and templates (.mpt). All versions are supported. Passwords for MS Project files upto the version 2003 are recoverable instantly. Several configurable password recovery attacks are available for MS Project 2007-2016 files. Highly optimized code (SSE2, AVX, AVX2) and GPU (AMD, NVIDIA, Intel) utilization guarantees fastest recovery speed.
  • Hardwipe is a free data sanitization toolset used by activists, journalists, IT technicians and anyone needing to ensure that discarded, but sensitive, information can never be recovered by someone else. Hardwipe provides a slick user interface with optional support for 'right-click' context menus in Windows File Explorer. Use Hardwipe to conveniently and permanently erase (or 'hard wipe') data on disk and portable storage media.
  • Windows Spy Software secretly logs Facebook, keystrokes, chats, IMs, emails, websites visited, microphone, video talk, logins, passwords, applications, searches, documents and more. Logs Skype, Yahoo Messenger, ICQ, AIM, etc. Takes screenshots every x seconds like a spy cam. Sends logs to your email. You can check logs on a remote PC, tablet, smart phone, or directly on the monitored PC. Perfect for monitoring employees, kids and spouse.
  • Invisible Monitoring Spy secretly logs Facebook, keystrokes, chats, IMs, emails, websites visited, microphone, video talk, logins, passwords, applications, searches, documents and more. Logs Skype, Yahoo Messenger, ICQ, AIM, etc. Takes screenshots every x seconds like a spy cam. Sends logs to your email. You can check logs on a remote PC, tablet, smart phone, or directly on the monitored PC. Perfect for monitoring employees, kids and spouse.
  • Spy Patrol is a user-friendly spy software that runs hidden in the background. Spy Patrol records in stealth mode all th keystrokes typed, passwords, websites visited, chats etc. and takes screen shots of the active windows. Spy Patrol records all the user passwords (including the system logon password!). Spy Patrol captures the emails sent and received, and the messenger conversations are recorded as well! See more at www.spy-patrol.com
  • SpyPal secrectly records Facebook, keystrokes, screenshots, websites visited, applications, Skype, Yahoo Messenger, clipboard, passwords, emails, documents, microphone and more. In Stealth Mode, it is completely invisible to monitored users. Use hotkey and password to access the program. Automatically sends logs to your email or ftp every x seconds. Perfect for monitoring employees, children, spouse and investigating crimes.
  • With KeyLord you can keep your passwords, credit card and bank account numbers, and other sensitive information in a tree-like structure, secured with passwords or X.509 certificates for increased protection. Powerful and flexible password generator, included in KeyLord, lets you create unique and cryptographically strong passwords, which are possible to remember.
  • Have you got any doubts or concerns about productivity of your employees? Do you need to check on productivity of certain people in your company? Are you looking for a way of exposing exports of confidential data and information from your web?
  • StegHide UI allows you to easily hide a file inside another one using steganography. Not a replacement to encryption, but they can be combined to better serve your privacy. Can hide all types of files, including word documents, text files, password databases and others. It's an easy to use interface for the renowned command line application steghide, which is included in this package. Features - Simple GUI - Embed a File - Extract a File - Simple Command Line Interface - Encryption - Windows Context Menu - Desktop & Start Menu Shortcut
  • BizCrypto for BizTalk lets you secure the data and internet communications in your BizTalk orchestrations. The product includes SFTP, SSH, FTPS, OpenPGP, SMTP, POP3, AS2, HTTPS, S3 adapters and S/MIME, PGP, PKI, PDF, XML, ZIP pipelines.
  • Free Porn Blocker - a reliable program to protect children from pornographic content on the Internet. Free Porn Blocker - a very simple and intuitive software with no superfluous functions. The one and only feature that makes the Free Porn Blocker is to scan internet traffic in order to detect and protect against pornography content. Once the Free Porn Blocker detects that the user intends to visit a porn site, the program blocks the browser tab.
  • LuJoSoft DeskLockII is an easy in use and compact tool for quick computer locking when you leave it unattended. It shows a lock screen, disables any user from accessing your pc. You can lock your PC by double clicking on DesktLockII.exe. To unlock the computer you must enter correct password only. Unlike another similar computer lock software LuJoSoft DeskLockII won't be affect Ctrl+Alt+Del or a system reset.
  • Encrypt Outlook attachments. Decrypt on all devices without the need for tools. You may switch the encryption on or off with a single click. Secure automatically your PDFs and Microsoft Office documents Word, Powerpoint, Excel.
  • Spytector is the ultimate invisible and undetectable keylogger (keystroke logger) that completely meets your PC monitoring and surveillance requirements. Spytector keylogger is running in total stealth, undetectable even for advanced users, perfect for monitoring the way your PC is used. Spytector is tracking all the activities of PC users (visited websites, all the keystrokes, both sides of chat conversations, opened windows etc.) and delivers the logs to you via Email or/and FTP. In the delivered logs are also included the local stored passwords (for FireFox, Opera, Google Chrome, Internet Explorer, Safari, Outlook, Google Talk, Windows Live Messenger etc.) and URL history (visited websites). Spytector is completely invisible on the user's desktop and cannot be seen in the task manager, it's injected into system processes on the startup and the logs are hiddenly sent through the default browser or email client (to bypass the firewalls). The keylogger is using advanced hooking and steal ...
  • Folder Lock is a data leak prevention solution that encrypt & secures your files, while keeping an automatic and real-time backup of encrypted files in the backup cloud. It also offers security for USB drives and CDs/DVDs. Folder Lock is an Anti-Hack Solution that lets you lock files, folders and drives; shred files and clean your Windows History.Works with both 32-bit and 64-bit Windows Vista/XP/7/8.1/10. The complete data leak prevention suite.
  • iKeyMonitor iPhone Spy App is an invisible spy app for iPhone/iPad/iPod touch that logs keystrokes, passwords, calls, SMS, WhatsApp/Skype/Viber/Line/Kik/Hangouts/Facebook messages, GPS locations, websites and screenshots, and it will automatically send the logs to users by email or FTP. What does iKeyMonitor iPhone Spy App do? 1. iKeyMonitor records passwords entered and keystrokes typed on the targeted iOS device. 2. Call logging is available as well. Users can see the phone numbers, call durations and time stamps. 3. The iPhone spy app for iOS devices not only tracks incoming and outgoing text messages, but also records WhatsApp/Skype/Viber/Line/Kik/Hangouts/Facebook messages sent and received. 4. It also offers information of the GPS locations of the iOS device. 5. Another feature is websites history tracking. This invisible spy app for iPhone and iPad logs all the websites visited in Safari and shows users the URLs, time and titles. 6. What's more, it will take screensho ...
  • Password Confidential keeps your passwords secure and makes your life easier at the same time. You will no longer have to remember or keep track of dozens of different passwords. With Password Confidential you can capture and manage all your passwords and IDs in one secure account. Password Confidential automatically captures passwords and user ids for the websites you visit. The next time you visit a site you will be automatically logged in.

Page 4 of 30
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30


Legal disclaimer | Privacy policy

© 2004-2016 IT Shareware