Home | Submit a file  |  New  |  Categories  |  Our awards  |  Link to us  |  RSS Feeds

Utilities :: Security & Encryption
Sort by: date | product title | rating | downloads | popularity
Display: short descriptions | full descriptions
  • Amold USB Stick Guard Provides 100% Protection To you PC,USB Drives and Data. USB Stick Guard is the Best Choice if you want Protection from Newer Threads.We are Now Protecting over 1k Users and Organisations.
  • This software allows you to record all user activities by capturing keystrokes and Internet navigation. With Free Keylogger you will always know what's happening on your computer. You will be able to unveil all secret information including emails, chats, IM sessions, text documents. Plus you can catch all visited websites. The reports are stored into encrypted files, and you can view them anytime with the handy integrated Viewer.
  • SE File & Folder is a HIPAA compliant professional file encryption software that can handle any type of file or all content within any folder that you select. SE File & Folder is compatible with all file formats and has "Plug-ins" for MS Office Suite (Word, Excel, PowerPoint). It also works with cloud based services like Dropbox or Google Drive. It is the perfect addition for SE Mail, our HIPAA email encryption solution. Try it now for free!
  • LanAgent is a smart tool to monitor all actions of a remote computer user. The program records various kinds of data, which will be sent to you on your first request: keystrokes; connections established; websites visited; programs, files or directories opened; clipboard contents and so on. A detailed report on a specified time period is always available to you, yet the program is absolutely invisible to this remote user.
  • Cayo Admin Assistant(tm) delivers the missing layer of Automation and IT Rule enforcement for your Microsoft Infrastructure while unifying on-premises, mobile and cloud administration. Admin Assistant is at work even when you are not. By automating day-to-day administration and enforcement of IT business policies, Admin Assistant ensures systems are secure and run as intended. Watch a demo or buy a permanent license at Cayosoft.com.
  • The program Security Expert is intended for copy protection your digital photos and documents. It gives an opportunity to protect your files not only from the methods of capturing the images built in system (Print Screen), but also from other third-party programs. Using Security Expert you can encrypt documents, operate quantity and an expiration date of data viewings, set password and watermark on your files etc.
  • SPYERA- PHONE version is software that you install on a mobile phone. After installation, SPYERA secretly records events that happen on the phone and delivers this information to a web account, where you can view these reports 24x7 from any Internet enabled computer or mobile phone. SPYERA PHONE version also allows you to listen live calls, listen surroundings of the target mobile, and to know the location of the device.
  • Folder Protection is a powerful and easy-to-use program for protecting your data.It can lock,hide and encrypt any folder including flash disk and removable hard disk.1.Fast and Simple:With one-click protection and unprotection. Instant protection and unprotection2.Strong protection technology:Using 256-bit Blowfish Encryption that can effectively encrypt and lock all your files.
  • State of the art software for risk assessment and management, it conducts security audit and security assessment for SQL database security within minutes, by using the most comprehensive SQL database security regulatory compliance tools
  • Any Keylogger Free, as one of hot monitor software in the world, is widely applied to parental control, employee monitoring and private detective service. The keylogger allows you to record entire activities, including online chat details, clipboard contents and other activities performed on your PC. It can also captures screenshots at regular time of interval so that you can easily know what is happening on computers in your absence.
  • Memo Password is a simple, tiny but powerful tool useful for storing and easily retrieve your passwords. Feel free to use different passwords for each service you use with your computer (e-mail accounts, online registrations, Windows logon, ...). You only have to remember one single master password that will secure all other passwords.
  • Today in the engineered world many users have major problems with the multitude of passwords. With the software abylon LOGON SSO Pro, the user only authenticate once at the windows logon and have additionally an automatic access to password protected applications. The program boasts with high flexibility, centralized administration and enhanced protection against keyloggers and phishing attacks.
  • Simplify Active Directory Management and beyond, on-premises or in hybrid environments. Automate critical admin tasks, bulk user management, administrative alerts, AD Provisioning and mobile user notification. Cayo Administrator is purpose-built to solve key day-to-day management issues. Designed to reduce costs, increase security, and sustain compliance while increasing overall efficiency. Watch a demo or get a permanent license at Cayosoft.com
  • SpyPal secrectly records Facebook, keystrokes, screenshots, websites visited, applications, Skype, Yahoo Messenger, clipboard, passwords, emails, documents, microphone and more. In Stealth Mode, it is completely invisible to monitored users. Use hotkey and password to access the program. Automatically sends logs to your email or ftp every x seconds. Perfect for monitoring employees, children, spouse and investigating crimes.
  • With the Security Setting function of PDFCool, you can control who can access to your documents and what actions they can perform once they have the password. Depending on your needs and the intended audience, you can choose between 128-bit RC4, and 128-bit AES encryption.
  • Password Protect Shared Folder is designed for corporate usage. It helps you to protect shared folder on network and on removable device. Users can browser the documents but not able to copy and modify them that lets you prevent illegal copying of your files. Allow you to set different passwords for each user. With Shared Folder Protctor, organizations can defend their intellectual property, customer and partner data and corporate brand equity.
  • Make Secure Password is a password generator allowing you to create passwords of any length. These passwords are very secure due to a random combination of characters and numbers. Download the software program now. It runs on all versions of Windows including Windows 8.
  • Freeware Task Manager Enable software provides you to best method about how to enable Task Manager or disable the Task Manger in your window without any difficulty. This free Task manager Enable utility to quickly enable or disable Task Manager according to yourself and you can also fix all viruses which are responsible to hang your computer heavily.
  • The version of a product of "Orion CipherBox" is intended to a demo for free downloading which gives to the customer opportunity to estimate the interface and operability of the program. All opportunities are described in http://www.oriondevteam.com/productsENG.html
  • Hard drives, Flash Drives, SSD's nor USB sticks are safe from File Shredder Ultra. Within a few clicks, your selected data is set to be renamed and irretrievably shredded and overwritten, multiple times. Combined with the extra Free Space Shredder feature included free, your data has no where to hide. Works well for traditional mechanical hard disks and newer technologies such as SSD's.
  • FNOWare Password Generator, generate more secure passwords. Ability to generate passwords of different lengths.
  • Secret File Messenger is a steganography software and you can easily encrypt file or text message and hide it in a picture. Once a file is hidden in an image the saved picture is still a picture, it will load just like any other image and appear as it did before, the only difference will be that it contains hidden file. The image can be saved, emailed, uploaded to the web as before the only difference will be that it contains hidden data. You can also decrypt and extract your hidden file or message. It is extremely user-friendly tool and help you step by step with its wizard. File security and integrity are currently the most important issues in the world of information technology. Keep your private data safe with the help of Secret File Messenger. Key Features : Hide Secret and Confidential File into an Image. Support JPG/PNG/BMP/GIF/TIF Image format. Support ALL Major File Format like (DOC/DOCX/XLS/XLSX/PPT/PPTX/TXT/INI/RTF/PDF) Encrypt File Before Hiding. Extract & Decrypt Hidden File ...
  • SpyPal Free Keylogger secrectly records Facebook, keystrokes, screenshots, websites visited, applications, clipboard, passwords, emails, documents and more. In Invisible Mode, it is completely hidden to monitored users. Use hotkey and password to access the program. Automatically sends logs to your email every x seconds. Perfect for monitoring employees and parental control.
  • Screenshot Monitor is a tiny desktop app started and stopped by an employee / remote worker himself to track time and take his monitor screenshots during work for manager to see. To start using the app, a manager starts a company plan on screenshotmonitor.com and sends email invitation to employees / remote workers. After an employee clicks "Accept" link in the email, he can login to the app and start using it.
  • Malicious File Hunter, or MFH for short, is a security software that runs on Windows and allows IT Security Administrators to search for the presence of one or multiple files across their entire network of Windows systems. For example, if a known malicious file is found on one computer, an IT Administrator can use MFH to check if any other system on the network is infected with the same malware. Search query is based on full, partial or wild card

Page 3 of 30
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30


Legal disclaimer | Privacy policy

© 2004-2014 IT Shareware