Home | Submit a file  |  New  |  Categories  |  Our awards  |  Link to us  |  RSS Feeds

Utilities :: Security & Encryption
Sort by: date | product title | rating | downloads | popularity
Display: short descriptions | full descriptions
  • MessageLock adds email encryption and zip file compression to Microsoft Outlook. It combines strong U.S. Gov't approved AES-256 bit encryption with the near-universal compatibility of the Zip file format. MessageLock delivers email encryption and zip compression for your message and/or file attachments. With version 2.2, MessageLock now integrates with the Lockbin.com web service, allowing you to send secure messages to anyone. Download a trial
  • Encrypt and decrypt files, documents, and archives through major cryptographic standards, including, TripleDES, Blowfish, TwoFish, Cast128, DES, Ice, Ice2, RC2, RC4, RijnDael, Serpent, Tea, Thin Ice.
  • Mikey keeps track of your login usernames, user ids, passwords, web page logins, email accounts; you name it. Now you only have to remember one password for Mikey to keep your information private. Mikey will secure your information with a single access password and a unique file encryption method. Open up Mikey and you get one click access to enter passwords, activation codes or any other similar data. Easily search, print, or delete entries all from one screen. Easily print individual entries or even export the entire database in two popular formats. Mikey has a unique approach to auto fill forms. You control the information that Mikey gives out. When you need a username or password simply search for the item then click on the clipboard icon to transfer that information to the clipboard. Then you can paste it right to the place where you need it. This unique feature makes Mikey perfect for use on computers with more than one person. Since Mikey is password protected you no longer have to worry abo ...
  • Do you want to know they are doing at your computer in your absence? Now to make this possible, when you come home you can view pictures of the screen with everything it displayed via screenshots that were taken at an interval you set (i.e. every minute, 5 minutes, hour, etc.). Use the start function to spy with Windows, so you do not miss a single moment.
  • PDF encryption software protect your PDF document from harmful user those defect your valuable document. PDF file encrypted application support most of all required option those able to protect your PDF document. Tool permitted you to set password on PDF file, use PDF encryption technique like 128 bit and 40 bits. You can restrict PDF page by locking PDF printing, content copying, content editing, form-filling, annotation, page extraction and document assembling etc. program authorize you to select page resolution values like high resolution and low resolution. Features: * Software Protect your PDF document from illegal user. * Set password on PDF file. * User encryption technique like 128 bit and 40 bit. * Restrict page permissions values like print, copy, edit, extract, annotation etc. * Choose page resolution setting like low and high. * Create efficient resultant file name. * Perform operation into batch style. * Work with 32 and 64 bit operating system. * Work with all Window oper ...
  • BestCrypt Volume for Disk Encryption protects all data on fixed and removable disks, while also working on RAID, UEFI and GPT partitions. Jetico's encryption software provides protection from physical threats, such as lost computers and USB sticks, by utilizing a wide variety of algorithms (AES, Twofish, Serpent) and the largest possible key sizes with XTS, LRW encryption modes.
  • CDR Analysis software helps to import CDR and analyze CDR/Tower file from any service and generates a comprehensive report of frequency statistics including service provider details and subscriber details (SDR)* of CDR Numbers. CDR Analysis software supports all type CDR file like as .Txt, .CSV,.XLS & .XLSX from All service providers. Software supports all country service provider & CDR file.
  • Ardamax Free Keylogger supports several levels of user activity monitoring and saves recorded data to an encrypted log file only viewable through a proprietary tool. The program can be configured to constantly capture different types of data, from simple keystrokes to audio and photos, and offers a simple, self-explanatory interface. The product supports all known languages and remains invisible to users being monitored.
  • Advanced-PasswordManager is a secure password management software that stores all your passwords in an encrypted vault protected by one master password. It removes identity traces from your PC after saving them to encrypted vault. You can auto fill web forms using your saved details. Free download Advanced-PasswordManager and protect your passwords, social security number, personal and credit card details from identity theft and fraud.
  • iKeyMonitor iPhone Spy App is an invisible spy app for iPhone/iPad/iPod touch that logs keystrokes, passwords, calls, SMS, WhatsApp/Skype/Viber/Line/Kik/Hangouts/Facebook messages, GPS locations, websites and screenshots, and it will automatically send the logs to users by email or FTP. What does iKeyMonitor iPhone Spy App do? 1. iKeyMonitor records passwords entered and keystrokes typed on the targeted iOS device. 2. Call logging is available as well. Users can see the phone numbers, call durations and time stamps. Meanwhile, it supports logging of Contacts/Notes/Calendars/Reminders/Voice Memos. 3. The iPhone spy app for iOS devices not only tracks incoming and outgoing text messages, but also records WhatsApp/Viber/Kik/Skype messages sent and received. 4. It also offers information of the GPS locations of the iOS device. 5. Another feature is websites history tracking. This invisible spy app logs all the websites visited in Safari and shows users the URLs, time and titles. 6. What&a ...
  • Before selling, disposing or donating used computers, securely erase hard drives with BCWipe Total WipeOut. Trusted as the de-facto standard for the U.S. DoD, BCWipe Total WipeOut erases boot records, filesystem structures, operating system files and service areas. BCWipe Total WipeOut comes built with the U.S. Department of Defense (DoD 5220.22-M) and U.S. Department of Energy (DoE M 205.1-2) standards, as well as other popular wiping standards.
  • WinGuard Pro 2016 can Password Protect Programs and encrypt files on your computer. Users can add Password Protection to any Windows Program (ie Store Apps, Desktop Apps, Exe's). Lock Installers, Internet and File Explorer - that's right; if you need some extra security, WinGuard Pro 2016 can Block Software Installations, Internet, File Explorer, Harddrive Access and a whole lot more, all for free.
  • QBW Password by Thegrideon Software is advanced QuickBooks security audit and cleanup tool as well as password recovery and replacement (reset) tool. QBW Password works with all editions (US, CA, UK) and version including QB 2016. QBW Password scans for mishandled (accessible without proper access) sensitive data and encryption keys and can cleanup records compromising data security. Lost passwords can be recovered or instantly replaced as well.
  • WinUtilities Process Security is a powerful Task Manager shows all active processes on your computer. You can easily recognize the endangering potential of each process. No other Task Manager or Process Viewer has this feature. Furthermore you can put a process into quarantine or search the internet for information about that process.
  • Free Porn Blocker - a reliable program to protect children from pornographic content on the Internet. Free Porn Blocker - a very simple and intuitive software with no superfluous functions. The one and only feature that makes the Free Porn Blocker is to scan internet traffic in order to detect and protect against pornography content. Once the Free Porn Blocker detects that the user intends to visit a porn site, the program blocks the browser tab.
  • IP Hider Ever is a professional software used to hide your IP address so that you can hide your internet traffic and the real location while surfing the web. This best IP hider software provides government-level safety protection, makes nobody know what you do on the internet. So you can surf wherever you want on the web without worrying about any of the information leaked. With a very friendly and simple-to-use user interface, an affordable and attractive price, as well as the best customer service, IP Hider Ever now has more then 23 thousands subscription users all over the world. We promise to continuously improve our technology and our service to meet the demands of all users, give them the best user experience ever. IP Hider Ever is a super easy program to hide your ip. Dozens of IP address from all countries available to be your choice. One-click to make connection anonymously. Government-level encrypted transmission, impeccable. Reconnect automatically when dropped , all-round protection of your privac ...
  • Power Spy software secrectly logs Facebook use, keystrokes, website visits, emails, chats and IMs: Skype, Yahoo Messenger and more. Takes screen snapshots at every X seconds like a surveillance camera. Displays exact activities, like Facebook, PC games, online searches & shopping, file transfers and webmails. You can receive reports remotely via emails or ftp. Perfect for monitoring kids, spouse and employees.
  • Power Spy secretly logs Facebook use, keystrokes, chats, emails, web sites, web cam images, user names, passwords, applications excuted and more. It records IMs in Skype, Yahoo Messenger, ICQ and others. Power Spy runs silently with system startup and automatically sends log reports to your email or ftp. Easy to install and setup. It is widely used in offices, homes, schools, detective agencies and police department.
  • Download Advance Password Manager for free to protect your sensitive information such as passwords, social security number and credit card details from identity theft and fraud. Advance Password Manager is a safe and user friendly password management utility. Advance Password Manager deletes identity traces from user's computer system after saving them to the secure encrypted vault. The encrypted vault is protected by one master password.
  • SpyKing PC Spy secretly logs all Facebook use, keystrokes, chats & IMs, emails, web sites, user names, passwords, web cam images, apps, clipboard and more. It supports Skype, Yahoo Messenger and others. It also takes screenshots like a surveillance camera. You can receive reports remotely via email or ftp as often as you wish. Open these reports on another PC or on your cell phone browser.
  • Logon to Windows with Smart Card, PKCS #11 Token, I2c Card or USB Memory Stick. Active Directory supported but Active Directory not required. RDP, Hyper-V, Remote Shares, etc supported. Secure RDP Launcher included
  • Quietzone is a simple to use, highly secure, privacy tool that gives you complete control over your Internet and PC privacy. With Quietzone you choose if and when: Your activity is recorded, tracked or stored by anyone; Any trace of session data or events is left on your PC or device; Your identity and personal data is tracked or recorded. Simply switch the Quietzone button ON or OFF. It's as simple as that.
  • iKeyMonitor Android Spy is a key logger for Android cell phones that logs keystrokes, passwords, SMS, WhatsApp messages, calls, websites, GPS locations, captures screenshots and send all the logs to appointed email box. iKeyMonitor Android Spy can be a helper for Android users, like parents and employers, who want to monitor what has been done on Android cell phones - even if the activity logs are erased. Users can download iKeyMonitor Android Spy Free Version here and start monitoring right away. Key Features of iKeyMonitor Android Spy - Work in stealth - Record typed keystrokes and passwords in US keyboard. - Log all incoming and outgoing SMS and WhatsApp/Skype/Viber/Kik messages - Log call history with the contacts, date and times and durations - Track the websites visited in Chrome and Stock web browsers - Track GPS locations - Take screenshots at the time interval set by users - Send log reports to user-defined email address - Remotely turn on/off the monitoring status Compatibility ...
  • Do you want to know they are doing at your computer in your absence? Now to make this possible, when you come home you can view pictures of the screen with everything it displayed via screenshots that were taken at an interval you set (i.e. every minute, 5 minutes, hour, etc.). Use the start function to spy with Windows, so you do not miss a single moment.
  • PC Screen Spy Monitor software secretly caputres your computer screen. It is like a invisible surveillance camera aimed directly at your PC screen. It records a screenshot every X seconds (adjustable) without being detected. This captures all activity performed on your PC, no matter who performs it! You can view the screenshot images taken directly from the embedded image / slideshow viewer.

Page 3 of 30
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30


Legal disclaimer | Privacy policy

© 2004-2016 IT Shareware