Home | Submit a file  |  New  |  Categories  |  Our awards  |  Link to us  |  RSS Feeds

Utilities :: Security & Encryption
Sort by: date | product title | rating | downloads | popularity
Display: short descriptions | full descriptions
  • The GEARS application provides home users and IT professionals an innovative free tool that quickly detects if a machine is compromised and provides greater visibility into the status of installed applications. Using two methods of advanced threat detection, GEARS identifies threats that may not have been detected by the user's installed anti-malware software or experienced issues remediating.
  • RecoveryFix Employee Activity Monitor is an invisible software tool that is highly useful for business managers, organizations and home users with which you can easily monitor the activities of employees, children and spouse. Employee Monitor Software helps the network administrators to review and monitor the activities of the employees around a network in real time. Using this tool, you can view the live desktop activities of a network. It also enables you to keep a close look on the employees activities by recording all the events occurred in the PCs. It records all the activities including the system processes, keystrokes, opening/closing of windows, FTP activities, website visits, internet activities, downloading etc., creating desktop screenshots and chat logs. Using this tool; you can monitor several PCs of your organization from a remote place also. This eminent Employee Monitor Software also facilitates the users to create offline logs of the monitored computer activities to view them later. Th ...
  • AD Password Expiration Notification Tool notifies Password expiration.Password Expiration Notification Pro Active Alert Tool to set Password Expire Notification period and configure Password Expire warning and Password Expiration.Password Expiration Alert Tool checks Active Ddirectory, to identify the password expiry dates.Provides scheduler facility for Password Expiry notification.Send password expiry warning email to users,Password Expiration Notification to Manager Password and account expiration auditing solution for Active Directory. Useful for VPN users, Outlook Web Access(OWA) users, Mac/Linux Users, File share users, Service accounts. Automatically checks the AD daily and send password and account expiry status message and report. Send Custom Email Notifications to Users,Managers and Admins Send password expiry warning message to users Send Password Expiration Notification to Manager Send Password Expiration Summary Report to Admins Daily Calculates Password Expiry Date of Users depends on the Domain ...
  • Power Spy Keylogger secretly logs Facebook, keystrokes, chats, IMs, emails, websites visited, microphone, video talk, logins, passwords, applications, searches, documents and more. Logs Skype, Yahoo Messenger, ICQ, AIM, etc. Takes screenshots every x seconds like a spy cam. Sends logs to your email. You can check logs on a remote PC, tablet, smart phone, or directly on the monitored PC. Perfect for monitoring employees, kids and spouse.
  • PC Spy Monitor secretly monitors Facebook, chats, emails, keystrokes, passwords and sends reports to your email or ftp. It logs Skype, Yahoo Messenger and other IMs. It also takes photo shots of online video talk like a surveillance camera. PC Spy Monitor runs so stealthily that the monitored user won't even know it. You can use hotkey to unhide it and change settings. It is a must have tool for you to reveal the truth.
  • Free Password Box is free password store software to store and manage all your login IDs and passwords, saving you from trouble of remembering tons of passwords. It can generate unbreakable passwords randomly or according to the template you specify keep logins safe from all passwords cracking tools. And you can use one master password to unlock all the archives that store your IDs & passwords.
  • Lock My PC Free Edition is a good and free alternative to standard Win+L Windows lock. Use it every time when you leave your computer unattended.
  • Free Key Log is free keylogger to record all keyboard actions, the exact words typed, the applications used and even the websites visited. It can run in hidden mode with no trace of the software, seemingly invisible to anyone and secretly monitor email, chats, internet navigation and all other behaviors of your employees, children, spouse, etc. Besides, it can backup the text you type, generate a log of entire keystroke activities automatically.
  • With this free file encryptor, you can protect your business documents, movies, music, photos, and other personal files from snoopers. Integrate with powerful algorithms to make sure there is no possibility to decrypt these files without our free file encryptor or your authorization.
  • File access auditing software is a sophisticated and crackerjack tool to keep an eye on the changes that are being made in the file servers of the entire network. That is, LepideAuditor for File Server software brings to your knowledge as who changed what, when and from which workstation. File access auditing tool notifies the user about the occurrence of suspicious activities in the file server by generating real-time alerts which the user receives in the form of email notifications. Also, the software generates pre-defined reports on file server events. These reports can be filtered on the basis of different criteria such as File server name, date/time, Event status, user name, event name and process name. Now, it packed with more powerful features along with enhanced CPU performance and GUI. It creates a new report for creation and removal of shared folders and default file types and processes have been incorporated in the report console filters. Various events for file like ?copy?, ?open? are now recor ...
  • Data Protecto is the world's best file encryption software for your computers which also features the most Secure Online Cloud Storage Service with Encrypted File Sharing with your friends. Data Protecto has 9 of the most advanced data protection features to protect their files, folders, drives, and applications from unauthorized access, use, and sharing. Data Protecto consistently protects your data in SAFE MODE, and runs in Stealth Mode.
  • Free EXE Lock provides optional encryption modes to lock your EXE programs: Speed priority - faster but not compressed; Security priority - slower mode, secure & compressed. It is able to lock executable programs on your computer to password-protect any executable file from non-authorized execution.
  • Computer Monitoring Spy secretly logs Facebook, keystrokes, chats, IMs, emails, websites visited, microphone, video talk, logins, passwords, applications, searches, documents and more. Logs Skype, Yahoo Messenger, ICQ, AIM, etc. Takes screenshots every x seconds like a spy cam. Sends logs to your email. You can check logs on a remote PC, tablet, smart phone, or directly on the monitored PC. Perfect for monitoring employees, kids and spouse.
  • All-In-One Spy Keylogger secretly logs Facebook, keystrokes, chats, IMs, emails, websites visited, microphone, video talk, logins, passwords, applications, searches, documents and more. Logs Skype, Yahoo Messenger, ICQ, AIM, etc. Takes screenshots every x seconds like a spy cam. Sends logs to your email. You can check logs on a remote PC, tablet, smart phone, or directly on the monitored PC. Perfect for monitoring employees, kids and spouse.
  • System Keylogger secretly logs Facebook, keystrokes, chats, IMs, emails, websites visited, microphone, video talk, logins, passwords, applications, searches, documents and more. Logs Skype, Yahoo Messenger, ICQ, AIM, etc. Takes screenshots every x seconds like a spy cam. Sends logs to a specified email. You can check logs on a remote PC, tablet, smart phone, or directly on the monitored PC. Perfect for monitoring employees, kids and spouse.
  • Invisible Spy Software secretly logs Facebook, keystrokes, chats, IMs, emails, websites visited, microphone, video talk, logins, passwords, applications, searches, documents and more. Logs Skype, Yahoo Messenger, ICQ, AIM, etc. Takes screenshots every x seconds like a spy cam. Sends logs to your email. You can check logs on a remote PC, tablet, smart phone, or directly on the monitored PC. Perfect for monitoring employees, kids and spouse.
  • Kid Key Logger Pro is a powerful, fully featured, keylogger, specifically designed for parents to record their children activity, while they let them play on their computers. Kid Key Logger Pro can log keystrokes, mouse and windows events ans also capture screenshots of your desktop. Log files can be written to disk, emailed or uploaded on a server. The key logger can be remote-controlled from another PC or from an Android device.
  • In the modern work place, managers effectively use network pc monitoring to ensure employee productivity and to keep an eye on undesirable system activities. Kernel Computer Activity Monitor is an advanced tool designed for this purpose. It is invisible to the PC users, as it does not appear in the Task Manager, Process List, Desktop, and Add/Remove Programs. It is a useful tool for organizations as well as individuals - investigators can use it to spy system happenings, and parents can use it to monitor the activities of children. It invisibly takes screenshots, records key strokes, monitors internet and email activities, gives information about Application accesses, saves clipboard activities, tracks passwords and notifies of print activities. Using this tool is an easy thing because of its user-friendly interface. You can configure this application to monitor and record the activities, so that your physical presence is not necessary at the time of monitoring. In addition, there is an option to receive reco ...
  • This simple program lets you store a list of your various passwords, user ID's, combination locks, etc. The file is encrypted for added security.
  • Seriousd from hackeratwork.com is a proactive time tracker. It monitor your session and give you the ability to discover how you spend your time. Seriousd can also block out your distractions, like Facebook, YouTube, or video games. It work like a parental control for adult. It is slick and easy to use, it really helps to stay focus and keep all your distractions at bay! You can double your productivity with Seriousd! We guaranteed it!
  • KinderGate Parental Control features content filtering based on morphological analysis, vast URL database divided on 70+ categories, download control, safe search, HTTPS support, etc. It provides high accuracy web filtering with extremely low false detection rate. KinderGate blocks resources related to malware, porn, drugs, abusive content, illegal materials and other categories. KinderGate is widely used by schools, libraries and home users.
  • Perfect Keylogger secretly logs Facebook, keystrokes, chats, IMs, emails, websites visited, microphone, video talk, logins, passwords, applications, searches, documents and more. Logs Skype, Yahoo Messenger, MSN, ICQ, AIM, etc. Takes screenshots every x seconds like a spy cam. Sends logs to your email. You can check logs on a remote PC, tablet, smart phone, or directly on the monitored PC. Perfect for monitoring employees, kids and spouse.
  • Windows Keylogger secretly logs Facebook, keystrokes, chats, IMs, emails, websites visited, microphone, video talk, logins, passwords, applications, searches, documents and more. Logs Skype, Yahoo Messenger, MSN, ICQ, AIM, etc. Takes screenshots every x seconds like a spy cam. Sends logs to your email. You can check logs on a remote PC, tablet, smart phone, or directly on the monitored PC. Perfect for monitoring employees, kids and spouse.
  • Encrypt your Compact Disc/Usb Flash Drive. Embedded CD burning module. Simply provide decryption password as work with cd/usb as usual.
  • File encryption tools such as CyberSafe Files Encryption software provide you with the ultimate solution to protect your data from prying eyes whether it is being stored on an unprotected computer or sent over insecure communication channels. This software provides three automated modes of data encryption, with the highest level protecting your data with a Public Key value for the Microsoft Cryptography Service.

Page 3 of 30
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30


Legal disclaimer | Privacy policy

© 2004-2015 IT Shareware