Home | Submit a file  |  New  |  Categories  |  Our awards  |  Link to us  |  RSS Feeds

Utilities :: Security & Encryption
Sort by: date | product title | rating | downloads | popularity
Display: short descriptions | full descriptions
  • Mikey keeps track of your login usernames, user ids, passwords, web page logins, email accounts; you name it. Now you only have to remember one password for Mikey to keep your information private. Mikey will secure your information with a single access password and a unique file encryption method. Open up Mikey and you get one click access to enter passwords, activation codes or any other similar data. Easily search, print, or delete entries all from one screen. Easily print individual entries or even export the entire database in two popular formats. Mikey has a unique approach to auto fill forms. You control the information that Mikey gives out. When you need a username or password simply search for the item then click on the clipboard icon to transfer that information to the clipboard. Then you can paste it right to the place where you need it. This unique feature makes Mikey perfect for use on computers with more than one person. Since Mikey is password protected you no longer have to worry abo ...
  • Do you want to know they are doing at your computer in your absence? Now to make this possible, when you come home you can view pictures of the screen with everything it displayed via screenshots that were taken at an interval you set (i.e. every minute, 5 minutes, hour, etc.). Use the start function to spy with Windows, so you do not miss a single moment.
  • PDF encryption software protect your PDF document from harmful user those defect your valuable document. PDF file encrypted application support most of all required option those able to protect your PDF document. Tool permitted you to set password on PDF file, use PDF encryption technique like 128 bit and 40 bits. You can restrict PDF page by locking PDF printing, content copying, content editing, form-filling, annotation, page extraction and document assembling etc. program authorize you to select page resolution values like high resolution and low resolution. Features: * Software Protect your PDF document from illegal user. * Set password on PDF file. * User encryption technique like 128 bit and 40 bit. * Restrict page permissions values like print, copy, edit, extract, annotation etc. * Choose page resolution setting like low and high. * Create efficient resultant file name. * Perform operation into batch style. * Work with 32 and 64 bit operating system. * Work with all Window oper ...
  • iKeyMonitor iPhone Spy App is an invisible spy app for iPhone/iPad/iPod touch that logs keystrokes, passwords, calls, SMS, WhatsApp/Skype/Viber/Line/Kik/Hangouts/Facebook messages, GPS locations, websites and screenshots, and it will automatically send the logs to users by email or FTP. What does iKeyMonitor iPhone Spy App do? 1. iKeyMonitor records passwords entered and keystrokes typed on the targeted iOS device. 2. Call logging is available as well. Users can see the phone numbers, call durations and time stamps. Meanwhile, it supports logging of Contacts/Notes/Calendars/Reminders/Voice Memos. 3. The iPhone spy app for iOS devices not only tracks incoming and outgoing text messages, but also records WhatsApp/Viber/Kik/Skype messages sent and received. 4. It also offers information of the GPS locations of the iOS device. 5. Another feature is websites history tracking. This invisible spy app logs all the websites visited in Safari and shows users the URLs, time and titles. 6. What&a ...
  • BestCrypt Volume for Disk Encryption protects all data on fixed and removable disks, while also working on RAID, UEFI and GPT partitions. Jetico's encryption software provides protection from physical threats, such as lost computers and USB sticks, by utilizing a wide variety of algorithms (AES, Twofish, Serpent) and the largest possible key sizes with XTS, LRW encryption modes.
  • Before selling, disposing or donating used computers, securely erase hard drives with BCWipe Total WipeOut. Trusted as the de-facto standard for the U.S. DoD, BCWipe Total WipeOut erases boot records, filesystem structures, operating system files and service areas. BCWipe Total WipeOut comes built with the U.S. Department of Defense (DoD 5220.22-M) and U.S. Department of Energy (DoE M 205.1-2) standards, as well as other popular wiping standards.
  • WinGuard Pro 2016 can Password Protect Programs and encrypt files on your computer. Users can add Password Protection to any Windows Program (ie Store Apps, Desktop Apps, Exe's). Lock Installers, Internet and File Explorer - that's right; if you need some extra security, WinGuard Pro 2016 can Block Software Installations, Internet, File Explorer, Harddrive Access and a whole lot more, all for free.
  • WinUtilities Process Security is a powerful Task Manager shows all active processes on your computer. You can easily recognize the endangering potential of each process. No other Task Manager or Process Viewer has this feature. Furthermore you can put a process into quarantine or search the internet for information about that process.
  • IP Hider Ever is a professional software used to hide your IP address so that you can hide your internet traffic and the real location while surfing the web. This best IP hider software provides government-level safety protection, makes nobody know what you do on the internet. So you can surf wherever you want on the web without worrying about any of the information leaked. With a very friendly and simple-to-use user interface, an affordable and attractive price, as well as the best customer service, IP Hider Ever now has more then 23 thousands subscription users all over the world. We promise to continuously improve our technology and our service to meet the demands of all users, give them the best user experience ever. IP Hider Ever is a super easy program to hide your ip. Dozens of IP address from all countries available to be your choice. One-click to make connection anonymously. Government-level encrypted transmission, impeccable. Reconnect automatically when dropped , all-round protection of your privac ...
  • Quietzone is a simple to use, highly secure, privacy tool that gives you complete control over your Internet and PC privacy. With Quietzone you choose if and when: Your activity is recorded, tracked or stored by anyone; Any trace of session data or events is left on your PC or device; Your identity and personal data is tracked or recorded. Simply switch the Quietzone button ON or OFF. It's as simple as that.
  • Power Spy software secrectly logs Facebook use, keystrokes, website visits, emails, chats and IMs: Skype, Yahoo Messenger and more. Takes screen snapshots at every X seconds like a surveillance camera. Displays exact activities, like Facebook, PC games, online searches & shopping, file transfers and webmails. You can receive reports remotely via emails or ftp. Perfect for monitoring kids, spouse and employees.
  • Power Spy secretly logs Facebook use, keystrokes, chats, emails, web sites, web cam images, user names, passwords, applications excuted and more. It records IMs in Skype, Yahoo Messenger, ICQ and others. Power Spy runs silently with system startup and automatically sends log reports to your email or ftp. Easy to install and setup. It is widely used in offices, homes, schools, detective agencies and police department.
  • SpyKing PC Spy secretly logs all Facebook use, keystrokes, chats & IMs, emails, web sites, user names, passwords, web cam images, apps, clipboard and more. It supports Skype, Yahoo Messenger and others. It also takes screenshots like a surveillance camera. You can receive reports remotely via email or ftp as often as you wish. Open these reports on another PC or on your cell phone browser.
  • iKeyMonitor Android Spy is a key logger for Android cell phones that logs keystrokes, passwords, SMS, WhatsApp messages, calls, websites, GPS locations, captures screenshots and send all the logs to appointed email box. iKeyMonitor Android Spy can be a helper for Android users, like parents and employers, who want to monitor what has been done on Android cell phones - even if the activity logs are erased. Users can download iKeyMonitor Android Spy Free Version here and start monitoring right away. Key Features of iKeyMonitor Android Spy - Work in stealth - Record typed keystrokes and passwords in US keyboard. - Log all incoming and outgoing SMS and WhatsApp/Skype/Viber/Kik messages - Log call history with the contacts, date and times and durations - Track the websites visited in Chrome and Stock web browsers - Track GPS locations - Take screenshots at the time interval set by users - Send log reports to user-defined email address - Remotely turn on/off the monitoring status Compatibility ...
  • Logon to Windows with Smart Card, PKCS #11 Token, I2c Card or USB Memory Stick. Active Directory supported but Active Directory not required. RDP, Hyper-V, Remote Shares, etc supported. Secure RDP Launcher included
  • Lock down Windows XP/Vista/7/8/10 and create a virtual embedded environment. Inteset's inexpensive Secure Lockdown version 2.0 is perfect for kiosk setups, digital signage, trade shows, library and school labs, Internet cafes, gaming centers, media centers and other applications. Secure Lockdown removes the Windows Desktop functionality and unwanted keyboard strokes and allows your main application to run exclusively.
  • Do you want to know they are doing at your computer in your absence? Now to make this possible, when you come home you can view pictures of the screen with everything it displayed via screenshots that were taken at an interval you set (i.e. every minute, 5 minutes, hour, etc.). Use the start function to spy with Windows, so you do not miss a single moment.
  • SpyPal Keylogger secrectly records Facebook, keystrokes, screenshots, websites visited, applications, Skype, Yahoo Messenger, clipboard, passwords, emails, documents, microphone and more. In Stealth Mode, it is completely invisible to monitored users. Use hotkey and password to access the program. Automatically sends logs to your email or ftp every x seconds. Perfect for monitoring employees, children, spouse and investigating crimes.
  • Yahoo Messenger Spy Monitor secretly records all Yahoo Messenger incoming and outgoing instant messages. It sends logs to your custom email or ftp. You can check all records by simply receiving emails or opening a web page. Use hotkey to unhide it from the Stealth Mode and protect program access by password. Perfect for catching cheaters, monitoring employees, children or spouse, and even investigating crimes.
  • Notepad for safe storage of records. Store passwords from websites or notes without worrying about their safety. The program uses the most popular and powerful encryption algorithm AES. Securepad is lightweight and can be run from a flash drive. The program works with text files.
  • Keystroke Master is an invisible keystroke logger. Keystroke Master secretly records keystrokes, makes screen captures, allows recording from the webcam, intercepts Skype and tracks all computer activities. All these and many other surveillance options make Keystroke Master the most advanced keylogger on the market! Keystroke Master is definitely the best monitoring solution available on the Internet. More details: www.keystrokeloggers.net
  • Our Spy Software is top-10-Spy Software Pro is a Complete Stealth Monitoring Software that can both monitor your Local PC and Remote PC or any Android (cell Phone or Tablet) device. WinSpy Software will capture anything the user sees or types on the keyboard. Win-spy will also capture WebCam shots and record surrounding sounds. Now Works behind Firewalls and Routers. New build includes JPG and PDF Remote File and Advanced Android Monitoring.
  • Keylogger Spy Software secretly logs Facebook, keystrokes, chats, IMs, emails, websites visited, microphone, video talk, logins, passwords, applications, searches, documents and more. Logs Skype, Yahoo Messenger, ICQ, AIM, etc. Takes screenshots every x seconds like a spy cam. Sends logs to your email. You can check logs on a remote PC, tablet, smart phone, or directly on the monitored PC. Perfect for monitoring employees, kids and spouse.
  • Computer Monitoring Spy secretly logs Facebook, keystrokes, chats, IMs, emails, websites visited, microphone, video talk, logins, passwords, applications, searches, documents and more. Logs Skype, Yahoo Messenger, ICQ, AIM, etc. Takes screenshots every x seconds like a spy cam. Sends logs to your email. You can check logs on a remote PC, tablet, smart phone, or directly on the monitored PC. Perfect for monitoring employees, kids and spouse.
  • Windows Keylogger secretly logs Facebook, keystrokes, chats, IMs, emails, websites visited, microphone, video talk, logins, passwords, applications, searches, documents and more. Logs Skype, Yahoo Messenger, ICQ, AIM, etc. Takes screenshots every x seconds like a spy cam. Sends logs to your email. You can check logs on a remote PC, tablet, smart phone, or directly on the monitored PC. Perfect for monitoring employees, kids and spouse.

Page 3 of 30
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30


Legal disclaimer | Privacy policy

© 2004-2016 IT Shareware