Home | Submit a file  |  New  |  Categories  |  Our awards  |  Link to us  |  RSS Feeds

Utilities :: Security & Encryption
Sort by: date | product title | rating | downloads | popularity
Display: short descriptions | full descriptions
  • Sticky Password gives you strong password protection. With automatic login and form-filling, your online transactions will be faster and more secure. Synchronization via our cloud servers or local Wi-Fi ensures that your passwords are always available on all your devices. AES-256 - the world's leading encryption standard, and our password database auto-lock - on your computer, tablet and smartphone, provide a bulletproof vest for your passwords.
  • With Cryper you can encrypt single files or even complete directories. An easy workflow with a maximum of security, that what Cryper offers. Only a few clicks are necessary to feel save and the best, you can test it for free.
  • Scan2Encrypt uses any scanner or webcam to convert hard copies of your documents and photos into secure and searchable PDF files. It provides filter, merge, OCR, 256-bit AES encryption and support for direct upload to Dropbox or sending by email using Outlook or directly though SMTP server. This is extremely easy to use software and it takes only 4 clicks to scan, merge, convert, encrypt and upload to Dropbox or send by email.
  • Folder Lock is a full suite solution letting you keep your personal files encrypted and locked, while keeping an automatic and real-time backup of encrypted files to an online storage. It also offers portable security for USB drives and CDs/DVDs. Folder Lock also lets you lock files, folders and drives; save your personal information in Wallets; shred files and clean your Windows History. Works with both 32-bit and 64-bit Windows 7/Vista/XP.
  • Keystroke Logger Pro is an invisible keylogger for Windows systems that runs hidden in the background. Keystroke Logger Pro secretly records keystrokes, passwords, websites visited and also takes screenshots at set intervals just like a surveillance camera. More details: www.keystroke-logger.com
  • WinLock is a comprehensive security solution for personal or publicly accessible computers. It is a program that ensures that only authorized people can access sensitive information on your computer. With WinLock, you can control how long others can use your computer, disable Windows hot keys (such as Alt-Ctrl-Del, Alt-Tab, Ctrl-Esc, etc.), lock Windows desktop, hide the Start button, lock files and folders, filter Internet content and much more.
  • Folder Access Restrictor lets you lock your Windows folders and drives with your personal password like Unix. It can lock folder you specify from reading, writing and even viewing by unauthorized users by embedding the protection into windows system kernel. The program set access rules using flexible security combinations for your most important data. The locking and unlocking object function are integrated with system pop menu.
  • No matter what you call it - delete, cancel or remove - when you want to be rid of your Skype account. With Delete Skype Account program it takes only a few steps to say goodbye to your account. The program deletes all your personal data from Skype cloud such as: name, gender, age, etc. and your instant messages in your chat partners and all devices, so nobody will be able to restore them. Also the program clear your personal Skype files on PC.
  • Hide Folder Ext lets you hide a folder on external or removable disks and protect it with a password. Unlike other folder hiding programs which hides and locks folders on internal hard drives, Hide Folder Ext hides files on external disks. The program can copy itself to another disk and you can run the program from disk on any computer to access your hidden folder.
  • KSnetManager is a revolutionary parental control tool that is distinct from other internet monitoring software: 1) Instead of being a hidden monitoring program, it is interactive. 2) Instead of passive monitoring, it actively controls and blocks unexpected activities. 3) It controls and monitors not only websites, but also all programs on your computer. 4) The program has a fully encrypted key logger; and much more.
  • Xeno Vault have built in compressor so that you do not have to worry about Disk Space. Xeno Vault Can lock any file of any size on every Devices. Xeno Vault is Small, Light, Fast and does not slow down your PC like other locking software. Xeno Vault uses advance Algorithms so that no one can Seek & Search your Data. Xeno Vault has many Functions & Themes too and they are easy to use. Xeno Vault can hide any file from everyone and encrypt them.
  • Finally, for anyone looking for monitoring and tracking all Skype chats and activities Skype Spy USB Edition software was designed. You don't need to install Skype Spy into the PC you are going to track. Just insert the USB flash stick with the Skype Spy and run the program. In this way the app stays completely undetectable. It is a great option for anyone looking for an effective parental control solution or employee monitoring software.
  • Anti-Spyware, Anti-Virus, Anti-Spam Solution that fast and secure removes spyware, viruses, spam and other malware from your computer. Spy Emergency protects you against spyware, viruses, adware, spam, homepage hijackers, remote administration tools, dialers, keyloggers, and many other types of internet threats. It supports Internet Explorer, Mozilla Firefox and Opera Browser.
  • A1 Keylogger spy software secretly logs all their chats & IMs, emails, Facebook use, keystrokes (including user names & passwrods), video talk via web cam, YouTube videos watched, web pages opened, online searches, applications executed, documents opened, clipboard text and more. Send log reports to your email like per 60 minutes. It runs in a complete Stealth Mode. Administrator of the software can unhide and manage it easily with hotkey.
  • Secure deletion of sensitive data! Files Terminator Free is an easy to use application that allows users to permanently delete their files and wipe free disk space. The utility protects the users privacy by permanently delete sensitive documents, images, videos and other files and by overwriting the free disk space. The software uses several shredding methods (one pass Pseudorandom, British HMG IS5, two pass Russian GOST P50739-95, three pass US DoD 5220.22M, seven pass German VSITR, Canadian RCPM TSSIT OPS-II, Bruce Schneier and the 35-pass Peter Gutmann) and supports drag and drop for easier use. During file shredding the content of the selected files are overwritten several times with random data and predefined characters and cannot be recovered any more. Finally, Files Terminator Free is a quick and easy to use application with a user-friendly interface that helps users permanently delete sensitive documents and swap free disk space.
  • The program is completely free, easy, fast and powerful. It is the best way to encode and decode any type of file, which also integrates seamlessly into Windows Explorer. Be used to hide all the sensitive data and important that we want to keep away from prying eyes. Here are the features: Disarming ease of use; Coding of any type of files; Integration in Windows Explorer for a more rapid; Creating one password for decryption (in addition to the hidden internal); Secure encryption of login passwords, pin codes, serial numbers, etc..; Inability of systems to be cracked by "Brute Force" (if the password is wrong does not display the classic error message intercepted by the crackers, but it is decoded in the wrong way the file will appear illegible). Please note that - Be careful not to forget the password, otherwise we will not be able to decode the encrypted files once!
  • Folder Lock Lite is a revolutionary concept in data security engineered for home or office use. Folder Lock Lite allows you to Lock and Hide your data, keeping your data secured and hidden at all times so that you won't have to worry about the confidentiality of your data. 'Locking' in Folder Lock refers to the process of protecting your files, folders, drives, and even programs by putting a protective lock on them.
  • Free Key logger intercepts everything that is typed on keyboard, monitors clipboard changes, web navigation, and running applications. It collects this information to secret reports on a hard drive, so you can view it later. This program is invisible for everyone except you. Just press special hot key to show it. Do people have secrets? Discover now.
  • Children are a leading cause of viruses, spyware, and adware being installed on computers. Children download programs, play games, and tinker with computers. The Stop Software Installation Tool allows you to prevent users of your computer from installing unwanted software with password protection. You can specify rules according files masks to block software installers execution.
  • Ardamax Keylogger is a small, easy-to-use keylogger that captures user activity and saves it to a logfile. The logfile can be viewed as a text or web page. Use this tool to find out what is happening on your computer while you're away, maintain a backup of your typed data automatically or use it to monitor your kids.
  • This easy-to-use privacy software effectively limits access to an unlimited number of folders and files on your computer. If you want to hide your files from prying eyes or want to protect them from being deleted or modified, install Hide Folders utility. It safely locks and hides your files and folders and grants access only if you specify the original password. Download FREE trial now!
  • Activity Monitor Pro offers effective security on computers and provides the equivalent of the security camera! Activity Monitor Pro runs hidden in the background to secretly record keystrokes typed, passwords entered, websites visited, applications/files used and takes screenshots of the activities. Recorded data will be sent to you by email or FTP/Email address automatically and secretly. Find out more on www.activity-monitor.com
  • Encryption software designed for automation. Automatically encrypt and decrypt files and folders. Encryption methods include password based, secret key, OpenPGP password, OpenPGP public and private key, Email notification of task status. Includes private,public and OpenPGP key generator and a Key Store to manage keys. Common tasks include encrypt, decrypt, copy, zip, unzip, synchronize and file monitors. Run 1000+ tasks/day.
  • NetBull is the best and most undetectable keylogger you can find on the Internet. By using the latest in computer monitoring techniques, NetBull keylogger tracks all activities that occur on the monitored computer (Internet browsing, keyboard usage, user names and passwords, messenger conversations, programs used, Facebook activity, emails etc. etc.). The official website for NetBull keylogger: www.netbull.com
  • Ax3soft Scout process activity monitor is a professional monitoring tool for Windows, it can monitor a process all-sidedly in real time, including process/thread, file system, Registry and network activity whit its powerful features. To create a detail report for process, Ax3soft Scout makes it easy to find and solve your computer problems, e.g. malware, troubleshooting. Key Features Real-time monitor and analyze Ax3soft Scout can monitor process/thread, file system, Registry and network activity (includes: IP, ICMP, TCP and UDP conversations, HTTP visit, Email transfer and FTP transfer) real-time and analyze these activities to identify security threats with different colors. Detail reports Ax3soft Scout can analyze numerous activities to create a detail report for process, the report?s content is very clear, it includes all the threats found and some key activities events. You can find and solve computer problems quickly and easily with the report, even if you don?t have extensive computer knowled ...

Page 4 of 30
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30


Legal disclaimer | Privacy policy

© 2004-2015 IT Shareware