Home | Submit a file  |  New  |  Categories  |  Our awards  |  Link to us  |  RSS Feeds

Utilities :: Security & Encryption
Sort by: date | product title | rating | downloads | popularity
Display: short descriptions | full descriptions
  • Encrypt and decrypt files, documents, and archives through major cryptographic standards, including, TripleDES, Blowfish, TwoFish, Cast128, DES, Ice, Ice2, RC2, RC4, RijnDael, Serpent, Tea, Thin Ice.
  • Mikey keeps track of your login usernames, user ids, passwords, web page logins, email accounts; you name it. Now you only have to remember one password for Mikey to keep your information private. Mikey will secure your information with a single access password and a unique file encryption method. Open up Mikey and you get one click access to enter passwords, activation codes or any other similar data. Easily search, print, or delete entries all from one screen. Easily print individual entries or even export the entire database in two popular formats. Mikey has a unique approach to auto fill forms. You control the information that Mikey gives out. When you need a username or password simply search for the item then click on the clipboard icon to transfer that information to the clipboard. Then you can paste it right to the place where you need it. This unique feature makes Mikey perfect for use on computers with more than one person. Since Mikey is password protected you no longer have to worry abo ...
  • Do you want to know they are doing at your computer in your absence? Now to make this possible, when you come home you can view pictures of the screen with everything it displayed via screenshots that were taken at an interval you set (i.e. every minute, 5 minutes, hour, etc.). Use the start function to spy with Windows, so you do not miss a single moment.
  • PDF encryption software protect your PDF document from harmful user those defect your valuable document. PDF file encrypted application support most of all required option those able to protect your PDF document. Tool permitted you to set password on PDF file, use PDF encryption technique like 128 bit and 40 bits. You can restrict PDF page by locking PDF printing, content copying, content editing, form-filling, annotation, page extraction and document assembling etc. program authorize you to select page resolution values like high resolution and low resolution. Features: * Software Protect your PDF document from illegal user. * Set password on PDF file. * User encryption technique like 128 bit and 40 bit. * Restrict page permissions values like print, copy, edit, extract, annotation etc. * Choose page resolution setting like low and high. * Create efficient resultant file name. * Perform operation into batch style. * Work with 32 and 64 bit operating system. * Work with all Window oper ...
  • USB fingerprint scanners (i.e. Hamster IV, Hamster Plus) help you capture fingerprint images. These devices get plugged into the USB port of your computer. In order to use these devices in your application, you need legacy driver. It allows scanners to communicate with your computer. Usually Hamster IV or Hamster Plus fingerprint scanner devices come with 2 types of drivers, the legacy driver or the Windows Biometric Framework (WBF). The Legacy driver needs to be installed manually when you plug in the scanner on to the computer. If the legacy driver is installed on Windows 7 or later computer then there is a chance that the driver will be over-written by the WBF driver= during Windows updates. To avoid this, please update the SDK dll, for example, sgfplib.dll (from FDx SDK Pro).
  • Permanently delete data and wipe free space with BCWipe. BCWipe is trusted throughout the U.S. DoD to securely erase files and folder beyond recovery - including free space, file slack space, MFT records, Internet and local history, directory entries, NTFS log file and directory slack space. BCWipe uniquely features Transparent Wiping - deleted or temporary files are wiped automatically on the fly. Available for Windows, Mac and UNIX.
  • BestCrypt Volume for Disk Encryption protects all data on fixed and removable disks, while also working on RAID, UEFI and GPT partitions. Jetico's encryption software provides protection from physical threats, such as lost computers and USB sticks, by utilizing a wide variety of algorithms (AES, Twofish, Serpent) and the largest possible key sizes with XTS, LRW encryption modes.
  • Ardamax Free Keylogger supports several levels of user activity monitoring and saves recorded data to an encrypted log file only viewable through a proprietary tool. The program can be configured to constantly capture different types of data, from simple keystrokes to audio and photos, and offers a simple, self-explanatory interface. The product supports all known languages and remains invisible to users being monitored.
  • Advanced-PasswordManager is a secure password management software that stores all your passwords in an encrypted vault protected by one master password. It removes identity traces from your PC after saving them to encrypted vault. You can auto fill web forms using your saved details. Free download Advanced-PasswordManager and protect your passwords, social security number, personal and credit card details from identity theft and fraud.
  • iKeyMonitor iPhone Spy App is an invisible spy app for iPhone/iPad/iPod touch that logs keystrokes, passwords, calls, SMS, WhatsApp/Skype/Viber/Line/Kik/Hangouts/Facebook messages, GPS locations, websites and screenshots, and it will automatically send the logs to users by email or FTP. What does iKeyMonitor iPhone Spy App do? 1. iKeyMonitor records passwords entered and keystrokes typed on the targeted iOS device. 2. Call logging is available as well. Users can see the phone numbers, call durations and time stamps. Meanwhile, it supports logging of Contacts/Notes/Calendars/Reminders/Voice Memos. 3. The iPhone spy app for iOS devices not only tracks incoming and outgoing text messages, but also records WhatsApp/Viber/Kik/Skype messages sent and received. 4. It also offers information of the GPS locations of the iOS device. 5. Another feature is websites history tracking. This invisible spy app logs all the websites visited in Safari and shows users the URLs, time and titles. 6. What&a ...
  • WinGuard Pro 2016 can Password Protect Programs and encrypt files on your computer. Users can add Password Protection to any Windows Program (ie Store Apps, Desktop Apps, Exe's). Lock Installers, Internet and File Explorer - that's right; if you need some extra security, WinGuard Pro 2016 can Block Software Installations, Internet, File Explorer, Harddrive Access and a whole lot more, all for free.
  • QBW Password by Thegrideon Software is advanced QuickBooks security audit and cleanup tool as well as password recovery and replacement (reset) tool. QBW Password works with all editions (US, CA, UK) and version including QB 2016. QBW Password scans for mishandled (accessible without proper access) sensitive data and encryption keys and can cleanup records compromising data security. Lost passwords can be recovered or instantly replaced as well.
  • WinUtilities Process Security is a powerful Task Manager shows all active processes on your computer. You can easily recognize the endangering potential of each process. No other Task Manager or Process Viewer has this feature. Furthermore you can put a process into quarantine or search the internet for information about that process.
  • Free Porn Blocker - a reliable program to protect children from pornographic content on the Internet. Free Porn Blocker - a very simple and intuitive software with no superfluous functions. The one and only feature that makes the Free Porn Blocker is to scan internet traffic in order to detect and protect against pornography content. Once the Free Porn Blocker detects that the user intends to visit a porn site, the program blocks the browser tab.
  • IP Hider Ever is a professional software used to hide your IP address so that you can hide your internet traffic and the real location while surfing the web. This best IP hider software provides government-level safety protection, makes nobody know what you do on the internet. So you can surf wherever you want on the web without worrying about any of the information leaked. With a very friendly and simple-to-use user interface, an affordable and attractive price, as well as the best customer service, IP Hider Ever now has more then 23 thousands subscription users all over the world. We promise to continuously improve our technology and our service to meet the demands of all users, give them the best user experience ever. IP Hider Ever is a super easy program to hide your ip. Dozens of IP address from all countries available to be your choice. One-click to make connection anonymously. Government-level encrypted transmission, impeccable. Reconnect automatically when dropped , all-round protection of your privac ...
  • Before selling, disposing or donating used computers, securely erase hard drives with BCWipe Total WipeOut. Trusted as the de-facto standard for the U.S. DoD, BCWipe Total WipeOut erases boot records, filesystem structures, operating system files and service areas. BCWipe Total WipeOut comes built with the U.S. Department of Defense (DoD 5220.22-M) and U.S. Department of Energy (DoE M 205.1-2) standards, as well as other popular wiping standards.
  • Power Spy secretly logs Facebook use, keystrokes, chats, emails, web sites, web cam images, user names, passwords, applications excuted and more. It records IMs in Skype, Yahoo Messenger, ICQ and others. Power Spy runs silently with system startup and automatically sends log reports to your email or ftp. Easy to install and setup. It is widely used in offices, homes, schools, detective agencies and police department.
  • ATS Call Data Record analyzer can import and analyze CDR/Tower CDR Data from any service provider in India or Other Country and Its generates a comprehensive report of frequency statistics including service provider details and subscriber details.
  • Power Spy software secrectly logs Facebook use, keystrokes, website visits, emails, chats and IMs: Skype, Yahoo Messenger and more. Takes screen snapshots at every X seconds like a surveillance camera. Displays exact activities, like Facebook, PC games, online searches & shopping, file transfers and webmails. You can receive reports remotely via emails or ftp. Perfect for monitoring kids, spouse and employees.
  • CDR Data Analysis Software is best call data analysis software which is track call information from your CDR file extract your data according to max call, max durations, max cell tower information & grouping caller IMEI number - which is showing how much cell number you're using to your IMEI Numbers.
  • Download Advance Password Manager for free to protect your sensitive information such as passwords, social security number and credit card details from identity theft and fraud. Advance Password Manager is a safe and user friendly password management utility. Advance Password Manager deletes identity traces from user's computer system after saving them to the secure encrypted vault. The encrypted vault is protected by one master password.
  • SpyKing PC Spy secretly logs all Facebook use, keystrokes, chats & IMs, emails, web sites, user names, passwords, web cam images, apps, clipboard and more. It supports Skype, Yahoo Messenger and others. It also takes screenshots like a surveillance camera. You can receive reports remotely via email or ftp as often as you wish. Open these reports on another PC or on your cell phone browser.
  • Logon to Windows with Smart Card, PKCS #11 Token, I2c Card or USB Memory Stick. Active Directory supported but Active Directory not required. RDP, Hyper-V, Remote Shares, etc supported. Secure RDP Launcher included
  • CDR Analysis software helps to import CDR and analyze CDR/Tower file from any service and generates a comprehensive report of frequency statistics including service provider details and subscriber details (SDR)* of CDR Numbers. CDR Analysis software supports all type CDR file like as .Txt, .CSV,.XLS & .XLSX from All service providers. Software supports all country service provider & CDR file.
  • Touch N Go is a Biometric Framework (SDK or API) that allows programmers to integrate fingerprint recognition in their application with just FOUR lines of code. This Biometric Identification Software is one of the most flexible biometric solution available in the market. It supports multiple database (Oracle, MS SQL, MySQL Enterprise, Sybase, and IBM DB2, etc.) and multiple programming languages (C/C++, C#, .NET, VB.NET, F#.NET, Java, Ruby, Delphi, etc.). This makes it a highly versatile and programmer friendly biometric framework. It also supports most fingerprint scanners available in the market. Touch N Go uses web-services and comes with a server and client component. The server centrally manages fingerprint data for all users. This product is ideal for desktop based as well as web-based applications. Touch N Go supports both SOAP and REST API. Touch N Go integrates seamlessly into any Windows or Web-based software. Readily supports web-browser of your choice ? Google Chrome, Mozilla Firefox, Int ...

Page 3 of 30
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30


Legal disclaimer | Privacy policy

© 2004-2017 IT Shareware