Home | Submit a file  |  New  |  Categories  |  Our awards  |  Link to us  |  RSS Feeds

Utilities :: Security & Encryption
Sort by: date | product title | rating | downloads | popularity
Display: short descriptions | full descriptions
  • A1 Keylogger spy software secretly logs all their chats & IMs, emails, Facebook use, keystrokes (including user names & passwrods), video talk via web cam, YouTube videos watched, web pages opened, online searches, applications executed, documents opened, clipboard text and more. Send log reports to your email like per 60 minutes. It runs in a complete Stealth Mode. Administrator of the software can unhide and manage it easily with hotkey.
  • Freeware Keylogger is a completely free award winning monitoring application. It runs in the background and allows you to monitor all keyboard activities performed on your PC, visited websites, e-mail, chat, openned application and files. Freeware Keylogger helps you to find out, what exactly took place in the system. You will find out what your employee or children search in the internet, and to check them.
  • Ultimate Keylogger Free Edition is a free popular all-round monitoring solution. It runs in the background and monitors all typed keystrikes, applications, passwords, clipboard, email, and visited websites' URLs. You can view the reports as HTML files. Ultimate Keylogger will help you to find out, what exactly took place in the system. You will be able to find out what your children search in the internet, and to check them.
  • Ultimate Keylogger is advanced all-round monitoring solution. It monitors all activities on computer systems including applications, keyboard, passwords, clipboard, chat, email, and visited websites. Ultimate Keylogger is completely undetectable. Process is hidden from task manager. Files are not visible. Ultimate Keylogger displays reports in web format or sends zip-compressed and encrypted activity reports invisibly via Email, FTP or LAN.
  • Keylogger Spy Monitor spy software can secretly record all keystrokes typed on your computer. It runs completely invisiblely. You can check logging reports by simply receiving emails or opening a web page. Perfect for catching cheaters, m onitoring employees, children or spouse, acquiring others' passwords and even investigating crimes. Use hotkey to unhide it from Stealth Mode and protect the program access by password.
  • Remote Logger is a professional remotely deployable keylogger, the best solution for monitoring your whole network. Remote Logger runs silently at the lowest level of Windows to prevent the monitored users from removing the software. Remote Logger intercepts all user names and passwords, in complete stealth mode! Remote Logger records all computer activities including keystrokes, internet history, chat convos etc. See more: www.remotelogger.com
  • NoteGuardian securely stores and organizes your sensitive information in an encrypted database. NoteGuardian is easy to use and customizable to suit your needs. NoteGuardian is ideal for managing passwords, logins, financial account numbers, social security numbers, and similar sensitive information. All information in NoteGuardian is stored locally, nothing is transmitted on the internet.
  • HomeGuard is an advanced parental control and activity monitoring tool for family and child safety online and offline. Once installed HomeGuard will silently and automatically block all adult and inappropriate content online and record detailed website activity including time of visit and time spent on each website. Plus a built in keylogger, activity based screenshots, chat and email monitoring and filtering, program/games blocking....
  • Secure deletion of sensitive data! Files Terminator Free is an easy to use application that allows users to permanently delete their files and wipe free disk space. The utility protects the users privacy by permanently delete sensitive documents, images, videos and other files and by overwriting the free disk space. The software uses several shredding methods (one pass Pseudorandom, British HMG IS5, two pass Russian GOST P50739-95, three pass US DoD 5220.22M, seven pass German VSITR, Canadian RCPM TSSIT OPS-II, Bruce Schneier and the 35-pass Peter Gutmann) and supports drag and drop for easier use. During file shredding the content of the selected files are overwritten several times with random data and predefined characters and cannot be recovered any more. Finally, Files Terminator Free is a quick and easy to use application with a user-friendly interface that helps users permanently delete sensitive documents and swap free disk space.
  • The program is completely free, easy, fast and powerful. It is the best way to encode and decode any type of file, which also integrates seamlessly into Windows Explorer. Be used to hide all the sensitive data and important that we want to keep away from prying eyes. Here are the features: Disarming ease of use; Coding of any type of files; Integration in Windows Explorer for a more rapid; Creating one password for decryption (in addition to the hidden internal); Secure encryption of login passwords, pin codes, serial numbers, etc..; Inability of systems to be cracked by "Brute Force" (if the password is wrong does not display the classic error message intercepted by the crackers, but it is decoded in the wrong way the file will appear illegible). Please note that - Be careful not to forget the password, otherwise we will not be able to decode the encrypted files once!
  • HomeGuard is an advanced parental control and activity monitoring tool for family and child safety online and offline. Once installed HomeGuard will silently and automatically block all pornographic and inappropriate content online and record detailed website activity including time of visit and time spent on each website. Plus a built in keylogger, activity based screenshots, chat and email monitoring and filtering, program/games blocking....
  • Folder Lock Lite is a revolutionary concept in data security engineered for home or office use. Folder Lock Lite allows you to Lock and Hide your data, keeping your data secured and hidden at all times so that you won't have to worry about the confidentiality of your data. 'Locking' in Folder Lock refers to the process of protecting your files, folders, drives, and even programs by putting a protective lock on them.
  • Free Key logger intercepts everything that is typed on keyboard, monitors clipboard changes, web navigation, and running applications. It collects this information to secret reports on a hard drive, so you can view it later. This program is invisible for everyone except you. Just press special hot key to show it. Do people have secrets? Discover now.
  • Soft4Boost Secure Eraser is a wizard-styled utility, which allows you to completely remove sensitive data from your hard drive by overwriting it several times with carefully selected patterns. Using internationally recognized methods, Soft4Boost Secure Eraser deletes sensitive data so securely that a reconstruction, even with special software, is no longer possible.
  • Children are a leading cause of viruses, spyware, and adware being installed on computers. Children download programs, play games, and tinker with computers. The Stop Software Installation Tool allows you to prevent users of your computer from installing unwanted software with password protection. You can specify rules according files masks to block software installers execution.
  • Netwrix Password Manager gives end users ability to securely manage their passwords and resolve account lockouts in a self-service fashion without involvement of helpdesk personnel, allowing organizations to implement strong password policies in Active Directory environments and address their identity management challanges.
  • Ardamax Keylogger is a small, easy-to-use keylogger that captures user activity and saves it to a logfile. The logfile can be viewed as a text or web page. Use this tool to find out what is happening on your computer while you're away, maintain a backup of your typed data automatically or use it to monitor your kids.
  • This easy-to-use privacy software effectively limits access to an unlimited number of folders and files on your computer. If you want to hide your files from prying eyes or want to protect them from being deleted or modified, install Hide Folders utility. It safely locks and hides your files and folders and grants access only if you specify the original password. Download FREE trial now!
  • Activity Monitor Pro offers effective security on computers and provides the equivalent of the security camera! Activity Monitor Pro runs hidden in the background to secretly record keystrokes typed, passwords entered, websites visited, applications/files used and takes screenshots of the activities. Recorded data will be sent to you by email or FTP/Email address automatically and secretly. Find out more on www.activity-monitor.com
  • PowerCryptor Free Edition is a program to password protects your documents, photos, music, videos and other. Just right-click on file or folder in windows explorer and choose Encrypt. PowerCryptor Free Edition makes it as easy to open, edit and save encrypted files, as it is to work with unencrypted files. This way, your privacy protection is ensured and no one will be able to access your confidential data.
  • PowerCryptor is a program to password protects your documents, photos, music, videos and other. Just right-click on file or folder in windows explorer and choose Encrypt. PowerCryptor makes it as easy to open, edit and save encrypted files, as it is to work with unencrypted files. You can securely erase your files beyond recovery. This way, your privacy protection is ensured and no one will be able to access your confidential data.
  • Encryption software designed for automation. Automatically encrypt and decrypt files and folders. Encryption methods include password based, secret key, OpenPGP password, OpenPGP public and private key, Email notification of task status. Includes private,public and OpenPGP key generator and a Key Store to manage keys. Common tasks include encrypt, decrypt, copy, zip, unzip, synchronize and file monitors. Run 1000+ tasks/day.
  • NetBull is the best and most undetectable keylogger you can find on the Internet. By using the latest in computer monitoring techniques, NetBull keylogger tracks all activities that occur on the monitored computer (Internet browsing, keyboard usage, user names and passwords, messenger conversations, programs used, Facebook activity, emails etc. etc.). The official website for NetBull keylogger: www.netbull.com
  • Ax3soft Scout process activity monitor is a professional monitoring tool for Windows, it can monitor a process all-sidedly in real time, including process/thread, file system, Registry and network activity whit its powerful features. To create a detail report for process, Ax3soft Scout makes it easy to find and solve your computer problems, e.g. malware, troubleshooting. Key Features Real-time monitor and analyze Ax3soft Scout can monitor process/thread, file system, Registry and network activity (includes: IP, ICMP, TCP and UDP conversations, HTTP visit, Email transfer and FTP transfer) real-time and analyze these activities to identify security threats with different colors. Detail reports Ax3soft Scout can analyze numerous activities to create a detail report for process, the report?s content is very clear, it includes all the threats found and some key activities events. You can find and solve computer problems quickly and easily with the report, even if you don?t have extensive computer knowled ...
  • Free Free parental control brought to a new level!The revamped Refog Free Keylogger unlocks full logging capabilities and adds the invisible mode, making advanced parental control options available to concerned parents. Logging keystrokes, screen shots and webcam streams, intercepting Skype, social and IM communications, tracking Web and application activities make Refog Free Keylogger the most advanced free parental control suite on the market.

Page 3 of 30
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30


Legal disclaimer | Privacy policy

© 2004-2015 IT Shareware