Home | Submit a file  |  New  |  Categories  |  Our awards  |  Link to us  |  RSS Feeds

Utilities :: Security & Encryption
Sort by: date | product title | rating | downloads | popularity
Display: short descriptions | full descriptions
  • Ultimate Keylogger is advanced all-round monitoring solution. It monitors all activities on computer systems including applications, keyboard, passwords, clipboard, chat, email, and visited websites. Ultimate Keylogger is completely undetectable. Process is hidden from task manager. Files are not visible. Ultimate Keylogger displays reports in web format or sends zip-compressed and encrypted activity reports invisibly via Email, FTP or LAN.
  • Ultimate Keylogger Free Edition is a free popular all-round monitoring solution. It runs in the background and monitors all typed keystrikes, applications, passwords, clipboard, email, and visited websites' URLs. You can view the reports as HTML files. Ultimate Keylogger will help you to find out, what exactly took place in the system. You will be able to find out what your children search in the internet, and to check them.
  • The encrypted file clipboard abylon SHAREDDRIVE is shown in the File Explorer on the desktop level and protect your secret files. The complete integration into the Explorer environment simplify using of the software. The encryption and decryption with the AES algorithm is done for each file operation automatically in the background. The file-based structure allow the simultaneous access of several users and reduce the backup data transfer volume.
  • Can't you remember all your passwords and write them on slips of paper? The alternative solution is the software abylon LOGON SSO Home. During the Windows login you must insert only a smart card, a CD or a USB flash drive and an optional password. The windows login and all further password and user-name inputs will be done automatically by the software. And when you remove your key, the computer will be logoff or shutdown immediately.
  • The file-safe automatically encrypts all files in the CRYPT-folder without entering the password every time. The the one-time entry of the password is sufficient to access the saved files and unauthorized users can not open this. Changes in the files will be updateded in the encrypted files automatically and the file-based design enables simultaneous access to multiple authorized users.
  • With this free file encryptor, you can protect your business documents, movies, music, photos, and other personal files from snoopers. Integrate with powerful algorithms to make sure there is no possibility to decrypt these files without our free file encryptor or your authorization.
  • Restrict Internet access at specified times or on demand. Block harmful content, disable connection completely or limit Internet to work with allowed programs and services only! To fully enable or manage Internet access, a password must be entered. Easily schedule Internet availability. Timer allows you to disable Internet connection after specified amount of time. Keep kids away from Internet harms and employees away from online entertainment.
  • File access auditing software is a sophisticated and crackerjack tool to keep an eye on the changes that are being made in the file servers of the entire network. That is, LepideAuditor for File Server software brings to your knowledge as who changed what, when and from which workstation. File access auditing tool notifies the user about the occurrence of suspicious activities in the file server by generating real-time alerts which the user receives in the form of email notifications. Also, the software generates pre-defined reports on file server events. These reports can be filtered on the basis of different criteria such as File server name, date/time, Event status, user name, event name and process name. Now, it packed with more powerful features along with enhanced CPU performance and GUI. It creates a new report for creation and removal of shared folders and default file types and processes have been incorporated in the report console filters. Various events for file like ?copy?, ?open? are now recor ...
  • Lock down Windows XP/7/8 and easily create a kiosk setup using the Google Chrome browser. Inteset's inexpensive Secure Lockdown -Chrome Ed is ideal for various kiosk setups, digital signage, trade shows, libraries, schools, hotels, museums, banks, and other businesses. Secure Lockdown removes the Windows Desktop functionality and unwanted keyboard strokes and allows Google Chrome to run exclusively.
  • USB Secure can password protect any portable media including USB drives, External drives and even memory cards. It supports plug and play and automatic execution. No administrator rights or install is required on the other computer. You can take your USB drive anywhere without a fear of data leak or theft in case of a stolen or lost USB drive. USB Secure is a great program for people keeping private data on portable devices when travelling.
  • Data Protecto is the world's best file encryption software for your computers which also features the most Secure Online Cloud Storage Service with Encrypted File Sharing with your friends. Data Protecto has 9 of the most advanced data protection features to protect their files, folders, drives, and applications from unauthorized access, use, and sharing. Data Protecto consistently protects your data in SAFE MODE, and runs in Stealth Mode.
  • Free EXE Lock provides optional encryption modes to lock your EXE programs: Speed priority - faster but not compressed; Security priority - slower mode, secure & compressed. It is able to lock executable programs on your computer to password-protect any executable file from non-authorized execution.
  • Free File Lock is a safe file encrypter program that can protect your important or sensitive files with uncrackable encryption algorithms. You can lock your files like images, music, movies as well as executable files & compressed files. It makes sure that no one can mess with your files without your authorization. Variety of cipher-methods make the encryption far more secure that nobody can decrypt it without the original password.
  • Dark Files can help you keep your files protected. You can choose who gets access to what files on your computer. This program provides three levels of protection to suit any user : "Hidden", "Read Only", "Full Control". It works with any Windows platforms : 2000/XP/Seven . Dark Files can work with Network folders and fully supports protection of removable media (such as floppies, CD Roms, DVD, ZIP and some SCSI and RAID drives) .
  • The all-in-one spy program which intercepts everything that is typed on keyboard, monitors visited websites, scans Windows clipboard for changes, makes screenshots every few minutes. It can also monitor both sides of IM chats and activity in social networks. And this program is absolutely invisible for everyone except you. You just have to press a speical hotkey, and enter your password to show the keylogger. You can easily read spy reports.
  • NoteGuardian securely stores and organizes your sensitive information in an encrypted database. NoteGuardian is easy to use and customizable to suit your needs. NoteGuardian is ideal for managing passwords, logins, financial account numbers, social security numbers, and similar sensitive information. All information in NoteGuardian is stored locally, nothing is transmitted on the internet.
  • Ardamax Keylogger is a small, easy-to-use keylogger that captures user activity and saves it to a logfile. The logfile can be viewed as a text or web page. Use this tool to find out what is happening on your computer while you're away, maintain a backup of your typed data automatically or use it to monitor your kids.
  • Computer Monitoring Spy secretly logs Facebook, keystrokes, chats, IMs, emails, websites visited, microphone, video talk, logins, passwords, applications, searches, documents and more. Logs Skype, Yahoo Messenger, ICQ, AIM, etc. Takes screenshots every x seconds like a spy cam. Sends logs to your email. You can check logs on a remote PC, tablet, smart phone, or directly on the monitored PC. Perfect for monitoring employees, kids and spouse.
  • Keylogger secretly logs all Facebook use, keystrokes, chats & IMs, emails, web visits, video talk, microphone, user names, passwords, searches and more. It records instant messenger, such as Skype, Yahoo Messenger, ICQ and others. It takes screenshots like a surveillance camera. Runs silently and monitored users won't know it. Log reports will be sent to you via email or ftp.
  • With REFOG Keylogger, family hardware activities are no longer a secret. Instead, the keylogger software keeps track of what each user is typing, which sites are being visited, what software are being used, and what images are being viewed. All of this info is recorded by the undetected program that runs 24/7. With comprehensive reports on each user's activities, guardians no longer have to worry about their children's activities.
  • Windows Spy Software secretly logs Facebook, keystrokes, chats, IMs, emails, websites visited, microphone, video talk, logins, passwords, applications, searches, documents and more. Logs Skype, Yahoo Messenger, ICQ, AIM, etc. Takes screenshots every x seconds like a spy cam. Sends logs to your email. You can check logs on a remote PC, tablet, smart phone, or directly on the monitored PC. Perfect for monitoring employees, kids and spouse.
  • Malicious File Hunter, or MFH for short, is a security software that runs on Windows and allows IT Security Administrators to search for the presence of one or multiple files across their entire network of Windows systems. For example, if a known malicious file is found on one computer, an IT Administrator can use MFH to check if any other system on the network is infected with the same malware. Search query is based on full, partial or wild card
  • All-In-One Spy Keylogger secretly logs Facebook, keystrokes, chats, IMs, emails, websites visited, microphone, video talk, logins, passwords, applications, searches, documents and more. Logs Skype, Yahoo Messenger, ICQ, AIM, etc. Takes screenshots every x seconds like a spy cam. Sends logs to your email. You can check logs on a remote PC, tablet, smart phone, or directly on the monitored PC. Perfect for monitoring employees, kids and spouse.
  • Invisible Monitoring Spy secretly logs Facebook, keystrokes, chats, IMs, emails, websites visited, microphone, video talk, logins, passwords, applications, searches, documents and more. Logs Skype, Yahoo Messenger, ICQ, AIM, etc. Takes screenshots every x seconds like a spy cam. Sends logs to your email. You can check logs on a remote PC, tablet, smart phone, or directly on the monitored PC. Perfect for monitoring employees, kids and spouse.
  • System Keylogger secretly logs Facebook, keystrokes, chats, IMs, emails, websites visited, microphone, video talk, logins, passwords, applications, searches, documents and more. Logs Skype, Yahoo Messenger, ICQ, AIM, etc. Takes screenshots every x seconds like a spy cam. Sends logs to a specified email. You can check logs on a remote PC, tablet, smart phone, or directly on the monitored PC. Perfect for monitoring employees, kids and spouse.

Page 4 of 30
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30


Legal disclaimer | Privacy policy

© 2004-2014 IT Shareware