Home | Submit a file  |  New  |  Categories  |  Our awards  |  Link to us  |  RSS Feeds

Utilities :: Security & Encryption
Sort by: date | product title | rating | downloads | popularity
Display: short descriptions | full descriptions
  • Power Spy Lite secretly logs Facebook, Skype, keystrokes, chats & IMs, emails, web visits, video talk, logins, passwords, applications, searches and more. It also takes screenshots like a surveillance camera. Lets you know exactly what they do on a computer screen while you are away. Automatically sends log reports to your email. Starts monitoring with system startup. Runs silently and invisibly.
  • Privacy Eraser is an all-in-one privacy suite that protects your privacy by cleaning up all your Internet history tracks and past computer activities. It supports popular web browsers such as Internet Explorer, Mozilla Firefox, Google Chrome, Safari and Opera, completely implements and exceeds the US Department of Defense and NSA clearing and sanitizing standard, once erased with it, your file data is gone forever and can not be recovered.
  • HomeGuard is an advanced parental control and activity monitoring tool for family and child safety online and offline. Once installed HomeGuard will silently and automatically block all pornographic and inappropriate content online and record detailed website activity including time of visit and time spent on each website. Plus a built in keylogger, activity based screenshots, chat and email monitoring and filtering, program/games blocking....
  • Skype Spy Monitor Pro secretly records Skype incoming and outgoing IMs, calls and video chats. It logs all Windows users on a PC. It runs completely invisibly so that Skype users won't know its existence. It sends logs to an email or ftp like every 60 minutes. It is a great tool for monitoring your kids, spouse, employees, competitors and friends on Skype while you are away. You are able to know exactly what they are talking about online.
  • Notepad for safe storage of records. Store passwords from websites or notes without worrying about their safety. The program uses the most popular and powerful encryption algorithm AES. Securepad is lightweight and can be run from a flash drive. The program works with text files.
  • The VyprVPN for Windows application automatically configures and simplifies managing your VPN connections. Switch freely between 50+ global server locations and multiple VPN protocols with a single click. The VyprVPN apps feature a sleek and intuitive look and feel, with powerful new features and customization options. VyprVPN is a free VPN service. VyprVPN also has Mac, iOS and Android apps. Learn more: www.goldenfrog.com/vyprvpn
  • Touch N Go is a Biometric Framework (SDK or API) that allows programmers to integrate fingerprint recognition in their application with just FOUR lines of code. This Biometric Identification Software is one of the most flexible biometric solution available in the market. It supports multiple database (Oracle, MS SQL, MySQL Enterprise, Sybase, and IBM DB2, etc.) and multiple programming languages (C/C++, C#, .NET, VB.NET, F#.NET, Java, Ruby, Delphi, etc.). This makes it a highly versatile and programmer friendly biometric framework. It also supports most fingerprint scanners available in the market. Touch N Go uses web-services and comes with a server and client component. The server centrally manages fingerprint data for all users. This product is ideal for desktop based as well as web-based applications. Touch N Go supports both SOAP and REST API. Touch N Go integrates seamlessly into any Windows or Web-based software. Readily supports web-browser of your choice ? Google Chrome, Mozilla Firefox, Int ...
  • Mobile Spy Mobile Monitoring Software helps to keep records of your activities, logs details, GPS location, which quickly gets uploaded to your mobile spy account which you have created. It is compatible and works for most models of iPhone, Blackberry or Android. This software works independently. It does not depend on your phone. So even you try to delete the message in your phone it has no effect on the software, the details already gets save in the software. To view the details of the user you have to just login into your account with a computer or mobile. If you are concern about your child or employee misusing the cell phone then this software is for you. This mobile spy gets you the current location as often you want. It helps to keep track on your children and subordinates. The Parents can keep track of the website visited by their children with the help of this software.
  • Lock down Windows XP/Vista/7/8/10 and create a virtual embedded environment. Inteset's inexpensive Secure Lockdown version 2.0 - Internet Explorer Edition is ideal for kiosk setups, digital signage systems, trade show terminals, library and schools labs, Internet cafes, hotels, businesses kiosks, etc. Secure Lockdown removes the Windows Desktop functionality and unwanted keyboard strokes and allows Internet Explorer to run exclusively.
  • User Time Control Center lets you specify when exactly and how long the computer can be used and define users which will be allowed to use the computer without any limits. You can schedule time intervals and the number of hours each child can use the computer per day a week. It automatically logs your child out of their computer when it's time for lights out. Also you can prevent the PC usage until the specified date and after the specified date.
  • Lock down Windows XP/7/8/10 and easily create a kiosk setup using the Google Chrome browser. Inteset's inexpensive Secure Lockdown -Chrome Ed is ideal for various kiosk setups, digital signage, trade shows, libraries, schools, hotels, museums, banks, and other businesses. Secure Lockdown removes the Windows Desktop functionality and unwanted keyboard strokes and allows Google Chrome to run exclusively.
  • Lock down Windows XP/Vista/7/8/10 and create a virtual embedded environment. Inteset's inexpensive Secure Lockdown version 2.0 is perfect for kiosk setups, digital signage, trade shows, library and school labs, Internet cafes, gaming centers, media centers and other applications. Secure Lockdown removes the Windows Desktop functionality and unwanted keyboard strokes and allows your main application to run exclusively.
  • Real PC Spy software is a smart PC surveillance software that lets you know exactly what people do on a PC. It secretly records all PC and internet activity, including typed keystrokes (keylogger), chats & IMs, emails, websites visited, microphone, Facebook use, games played, online shopping and searches, video talk, videos watched, documents opened, clipboard text and more. It sends logs to your email or ftp like every 30 minutes.
  • To protect your privacy, comply with regulations and prevent data breaches, BestCrypt Container Encryption delivers 'on-the-fly' data encryption that's easy to use for virtual drives and selected files or folders. BestCrypt encrypts files on Windows, Mac OS X and Linux with AES and other strong encryption algorithms. By featuring deniable encryption and dynamic containers Jetico's file encryption is the best TrueCrypt alternative. Includes BCWipe
  • Remote Logger is a professional remotely deployable keylogger, the best solution for monitoring your whole network. Remote Logger runs silently at the lowest level of Windows to prevent the monitored users from removing the software. Remote Logger intercepts all user names and passwords, in complete stealth mode! Remote Logger records all computer activities including keystrokes, internet history, chat convos etc. See more: www.remotelogger.com
  • Skype Spy Monitor secretly record Skype's incoming and outgoing chat messages. It runs completely invisibly so that Skype users won't know its existence. Skype Spy Monitor send log reports to your email or ftp periodically. You can also check logs directly on the monitored PC. It is a small but powerful program that consumes very little system resource. Perfect for monitoring employees, children or spouse, and even investigating crimes.
  • Spy Patrol is a user-friendly spy software that runs hidden in the background. Spy Patrol records in stealth mode all th keystrokes typed, passwords, websites visited, chats etc. and takes screen shots of the active windows. Spy Patrol records all the user passwords (including the system logon password!). Spy Patrol captures the emails sent and received, and the messenger conversations are recorded as well! See more at www.spy-patrol.com
  • Hidden Keylogger Pro is an advanced undetectable low level keystroke logger application that will secretly record all computer activities (visited websites, all the keystrokes, screenshots, chat convos etc.). Hidden Keylogger Pro allows you to remotely view the logs via Email and FTP. All of the computer passwords (Outlook, Internet Explorer, Firefox etc.) are successfully found and included in the logs. See more: www.hiddenkeylogger.com
  • HashTab provides OS extensions to calculate file hashes and supports many hash algorithms such as MD5, SHA1, SHA2, RipeMD, HAVAL and Whirlpool.
  • Permanently delete data and wipe free space with BCWipe. BCWipe is trusted throughout the U.S. DoD to securely erase files and folder beyond recovery - including free space, file slack space, MFT records, Internet and local history, directory entries, NTFS log file and directory slack space. BCWipe uniquely features Transparent Wiping - deleted or temporary files are wiped automatically on the fly. Available for Windows, Mac and UNIX.
  • iKeyMonitor iPhone Spy App is an invisible spy app for iPhone/iPad/iPod touch that logs keystrokes, passwords, calls, SMS, WhatsApp/Skype/Viber/Line/Kik/Hangouts/Facebook messages, GPS locations, websites and screenshots, and it will automatically send the logs to users by email or FTP. What does iKeyMonitor iPhone Spy App do? 1. iKeyMonitor records passwords entered and keystrokes typed on the targeted iOS device. 2. Call logging is available as well. Users can see the phone numbers, call durations and time stamps. Meanwhile, it supports logging of Contacts/Notes/Calendars/Reminders/Voice Memos. 3. The iPhone spy app for iOS devices not only tracks incoming and outgoing text messages, but also records WhatsApp/Viber/Kik/Skype messages sent and received. 4. It also offers information of the GPS locations of the iOS device. 5. Another feature is websites history tracking. This invisible spy app logs all the websites visited in Safari and shows users the URLs, time and titles. 6. What&a ...
  • SafeEraser is the best software which you can use to delete all information permanently and it is not recoverable by any means. This is one of the best iDevice erase tool that is specially designed for wiping out all data and personal details from the iDevices. This software cleans everything from your iDevices such as contacts, and other information stored in your iPhone.
  • SecureSafe Pro Free Password Generator allows to generate random passwords with a mouse click. Using Password Generator you do not have to think out new passwords. Password Generator will do it instead of you and will do it better. Password generation is easy to understand: mark checkboxes, click Generate button and get new random passwords. Password Generator is a freeware product so you do not need to pay for it.
  • SecureSafe Pro Password Manager is a unique software solution for storing confidential information (passwords, credit card numbers, confidential files) safely and securely in a secure file on your computer. It comes with military-grade encryption options, requires remembering only one access master password, has a built-in random password generator, and it is 100% FREE to try! Grab your copy now! Lifetime license! No annual payments!
  • BestCrypt Volume for Disk Encryption protects all data on fixed and removable disks, while also working on RAID, UEFI and GPT partitions. Jetico's encryption software provides protection from physical threats, such as lost computers and USB sticks, by utilizing a wide variety of algorithms (AES, Twofish, Serpent) and the largest possible key sizes with XTS, LRW encryption modes.

Page 2 of 30
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30


Legal disclaimer | Privacy policy

© 2004-2016 IT Shareware