Home | Submit a file  |  New  |  Categories  |  Our awards  |  Link to us  |  RSS Feeds

Utilities :: Security & Encryption
Sort by: date | product title | rating | downloads | popularity
Display: short descriptions | full descriptions
  • All-In-One Spy Keylogger secretly logs Facebook, keystrokes, chats, IMs, emails, websites visited, microphone, video talk, logins, passwords, applications, searches, documents and more. Logs Skype, Yahoo Messenger, ICQ, AIM, etc. Takes screenshots every x seconds like a spy cam. Sends logs to your email. You can check logs on a remote PC, tablet, smart phone, or directly on the monitored PC. Perfect for monitoring employees, kids and spouse.
  • System Keylogger secretly logs Facebook, keystrokes, chats, IMs, emails, websites visited, microphone, video talk, logins, passwords, applications, searches, documents and more. Logs Skype, Yahoo Messenger, ICQ, AIM, etc. Takes screenshots every x seconds like a spy cam. Sends logs to a specified email. You can check logs on a remote PC, tablet, smart phone, or directly on the monitored PC. Perfect for monitoring employees, kids and spouse.
  • Invisible Spy Software secretly logs Facebook, keystrokes, chats, IMs, emails, websites visited, microphone, video talk, logins, passwords, applications, searches, documents and more. Logs Skype, Yahoo Messenger, ICQ, AIM, etc. Takes screenshots every x seconds like a spy cam. Sends logs to your email. You can check logs on a remote PC, tablet, smart phone, or directly on the monitored PC. Perfect for monitoring employees, kids and spouse.
  • Kid Key Logger Pro is a powerful, fully featured, keylogger, specifically designed for parents to record their children activity, while they let them play on their computers. Kid Key Logger Pro can log keystrokes, mouse and windows events ans also capture screenshots of your desktop. Log files can be written to disk, emailed or uploaded on a server. The key logger can be remote-controlled from another PC or from an Android device.
  • In the modern work place, managers effectively use network pc monitoring to ensure employee productivity and to keep an eye on undesirable system activities. Kernel Computer Activity Monitor is an advanced tool designed for this purpose. It is invisible to the PC users, as it does not appear in the Task Manager, Process List, Desktop, and Add/Remove Programs. It is a useful tool for organizations as well as individuals - investigators can use it to spy system happenings, and parents can use it to monitor the activities of children. It invisibly takes screenshots, records key strokes, monitors internet and email activities, gives information about Application accesses, saves clipboard activities, tracks passwords and notifies of print activities. Using this tool is an easy thing because of its user-friendly interface. You can configure this application to monitor and record the activities, so that your physical presence is not necessary at the time of monitoring. In addition, there is an option to receive reco ...
  • This simple program lets you store a list of your various passwords, user ID's, combination locks, etc. The file is encrypted for added security.
  • Seriousd from hackeratwork.com is a proactive time tracker. It monitor your session and give you the ability to discover how you spend your time. Seriousd can also block out your distractions, like Facebook, YouTube, or video games. It work like a parental control for adult. It is slick and easy to use, it really helps to stay focus and keep all your distractions at bay! You can double your productivity with Seriousd! We guaranteed it!
  • KinderGate Parental Control features content filtering based on morphological analysis, vast URL database divided on 70+ categories, download control, safe search, HTTPS support, etc. It provides high accuracy web filtering with extremely low false detection rate. KinderGate blocks resources related to malware, porn, drugs, abusive content, illegal materials and other categories. KinderGate is widely used by schools, libraries and home users.
  • Perfect Keylogger secretly logs Facebook, keystrokes, chats, IMs, emails, websites visited, microphone, video talk, logins, passwords, applications, searches, documents and more. Logs Skype, Yahoo Messenger, MSN, ICQ, AIM, etc. Takes screenshots every x seconds like a spy cam. Sends logs to your email. You can check logs on a remote PC, tablet, smart phone, or directly on the monitored PC. Perfect for monitoring employees, kids and spouse.
  • Windows Keylogger secretly logs Facebook, keystrokes, chats, IMs, emails, websites visited, microphone, video talk, logins, passwords, applications, searches, documents and more. Logs Skype, Yahoo Messenger, MSN, ICQ, AIM, etc. Takes screenshots every x seconds like a spy cam. Sends logs to your email. You can check logs on a remote PC, tablet, smart phone, or directly on the monitored PC. Perfect for monitoring employees, kids and spouse.
  • Encrypt your Compact Disc/Usb Flash Drive. Embedded CD burning module. Simply provide decryption password as work with cd/usb as usual.
  • File encryption tools such as CyberSafe Files Encryption software provide you with the ultimate solution to protect your data from prying eyes whether it is being stored on an unprotected computer or sent over insecure communication channels. This software provides three automated modes of data encryption, with the highest level protecting your data with a Public Key value for the Microsoft Cryptography Service.
  • Roborub Software helps you secure your private data in a way that when you are deleting your data from your Computer, this Software would not made it recover again. That means, it removes your deleted data permanently from your Computer's Hard disk. It is very useful for computer and laptop users, especially the ones who has total concern with computer and has important & secret data to deal with. It is so because this software helps you to permanently delete those data from your Computer which you have deleted making it irrecoverable. Features: Works in background The software works in background in order to make it inaccessible for unauthorized users. Confirmation message before deleting You can set an option which shows the confirmation message before deleting any data from the Hard disk. Set User Id & Password for security You can set User Id & Password for accessing the Software Removes deleted data permanently The data that you are ...
  • This software allows you to record all user activities by capturing keystrokes and Internet navigation. With Free Keylogger you will always know what's happening on your computer. You will be able to unveil all secret information including emails, chats, IM sessions, text documents. Plus you can catch all visited websites. The reports are stored into encrypted files, and you can view them anytime with the handy integrated Viewer.
  • Simplify Active Directory Management and beyond, on-premises or in hybrid environments. Automate critical admin tasks, bulk user management, administrative alerts, AD Provisioning and mobile user notification. Cayo Administrator is purpose-built to solve key day-to-day management issues. Designed to reduce costs, increase security, and sustain compliance while increasing overall efficiency. Watch a demo or get a permanent license at Cayosoft.com
  • Password Manager for Flash Drives has all the features of the desktop version of Password Manager, but runs completely from your flash drive. You can run this portable version from any computer and keep your passwords with you at all times, whether you are at home or at work. So if you use more than one computer, this is the software you need. You can store hundreds of passwords and other information you need.
  • Store all your passwords in one place. No more remembering multiple passwords. You only need to remember one master password and then you have access to all your others. With one simple click of a button, you retrieve your password - no typing required. You can store hundreds of passwords and other information you need including user names, website URLs, and notes.
  • Anti Toolbar will automatically detect any Toolbars installed on your PC and give you the opportunity to erase or disable them. AntiToolbar finds and displays a list of toolbars, homepage, and search settings on your browsers and then lets you choose the ones you want to remove. More than just disabling add-ons that you no longer need, AntiToolbar's intelligent technology ensures that the settings you selects remains on your PC.
  • Securely send emails to others on your network or on the internet. Messages are encrypted using the latest encryption algorithms and technology. Only the sender and receiver can decrypt and read an email.
  • PDF Decrypt is a perfect tool that lets you to decrypt protected Adobe Acrobat PDF files, which have "owner" password set, preventing the file from editing(changing), printing, selecting text and graphics(and copying them into the Clipboard), or adding/changing annotations and form fields. Decrypted file can be opened in any PDF viewer(e.g. Adobe Acrobat Reader)without any restrictions -- i.e. with edit/copy/print functions enabled. All versions of Adobe Acrobat are supported. The standard security provided by PDF consists of two different methods and two different passwords. A PDF document may be protected by password for opening ('user' password) and the document may also specify operations that should be restricted even when the document is decrypted: printing; copying text and graphics out of the document; modifying the document; and adding or modifying text notes and AcroForm fields (using 'owner' password).
  • PDF Decrypt is a perfect tool that lets you to decrypt protected Adobe Acrobat PDF files, which have "owner" password set, preventing the file from editing(changing), printing, selecting text and graphics(and copying them into the Clipboard), or adding/changing annotations and form fields. Decrypted file can be opened in any PDF viewer(e.g. Adobe Acrobat Reader)without any restrictions -- i.e. with edit/copy/print functions enabled. All versions of Adobe Acrobat are supported. The standard security provided by PDF consists of two different methods and two different passwords. A PDF document may be protected by password for opening ('user' password) and the document may also specify operations that should be restricted even when the document is decrypted: printing; copying text and graphics out of the document; modifying the document; and adding or modifying text notes and AcroForm fields (using 'owner' password).
  • PDF Decrypt is a perfect tool that lets you to decrypt protected Adobe Acrobat PDF files, which have "owner" password set, preventing the file from editing(changing), printing, selecting text and graphics(and copying them into the Clipboard), or adding/changing annotations and form fields. Decrypted file can be opened in any PDF viewer(e.g. Adobe Acrobat Reader)without any restrictions -- i.e. with edit/copy/print functions enabled. All versions of Adobe Acrobat are supported. The standard security provided by PDF consists of two different methods and two different passwords. A PDF document may be protected by password for opening ('user' password) and the document may also specify operations that should be restricted even when the document is decrypted: printing; copying text and graphics out of the document; modifying the document; and adding or modifying text notes and AcroForm fields (using 'owner' password).
  • Lotus 1-2-3 Password by Thegrideon Software is Lotus 1-2-3 workbook password recovery tool. It allows you to recover Lotus 1-2-3 files (*.123, *.wk1, *.wk3, *.wk4) passwords for all security levels. Lotus 123 Password recovers passwords instantly regardless of password length and complexity.
  • Advance Spy Software Pro is a Complete Stealth Monitoring Software that can both monitor your Local PC and Remote PC. Advance Spy Software will monitor remote PC in realtime. Advance Spy Software will also capture WebCam shots and record surrounding sounds. Now Works behind Firewalls and Routers. New: Powerful Anti Spy. v13 includes - Sim Card Undelete - undelete data from Sim Card.
  • SpyPal secrectly records Facebook, keystrokes, screenshots, websites visited, applications, Skype, Yahoo Messenger, clipboard, passwords, emails, documents, microphone and more. In Stealth Mode, it is completely invisible to monitored users. Use hotkey and password to access the program. Automatically sends logs to your email or ftp every x seconds. Perfect for monitoring employees, children, spouse and investigating crimes.

Page 3 of 30
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30


Legal disclaimer | Privacy policy

© 2004-2014 IT Shareware