Home | Submit a file  |  New  |  Categories  |  Our awards  |  Link to us  |  RSS Feeds

Utilities :: Security & Encryption
Sort by: date | product title | rating | downloads | popularity
Display: short descriptions | full descriptions
  • Information Protection software provides Strong File Encryption or Military Grade Unrecoverable Termination to protect your confidential files and folders from unwanted data recovery and unauthorized access to your important business or private information. You can initiate file shredding procedure from remote PC, so even if you lost control over your computer, your sensitive information will not be available to a stranger.
  • Protect PDF files software restrict PDF documents and not allowed page extractions, documents printing, edit content for accessibility, modifying contents easily. Software restrict, unprotect, unlock, unrestrict, protect, or lock thousands number of PDF files by encrypting password parameters on PDF documents. Remove, delete, restrict, unprotect or allow PDF page restrictions on the Adobe PDF documents. PDF password protection utility encrypts password and restrictions on the multiple numbers of PDF files using batch protection process. Restrict PDF will enable to apply user or open password to PDF files so as to restrict unauthorized users to open and access PDF files. This best encryption solution for Adobe PDF files use advance encrypting algorithms like 128 bits and 40 bits AES for encryption on the documents and make multiple PDF file strongly protected. User can put Prefix Suffix on the PDF documents. This software instantly runs on all latest Windows OS like Win2000, Win7 x32, Win7 x64, Win98, Win Vist ...
  • Remote Keylogger lets you monitor and record all activities on your computer, including:screenshots, web sites surfed, all keystrokes, clipboard copyed and pasted,password,application used,IM chatting(MSN,Skype,AIM,Yahoo messenger,ICQ), Facebook and Myspace used,USB Drive,CDRom,Documents printed, Microphone voice.It runs in background in totally stealth mode and send logs timely to your email in html format with image & audio embedded.
  • Web Patrol software provides a customizable approach to filter your children online activities so that you can keep them safe in an increasingly dangerous online world. Our software allows you to block your child?s unsafe activities from instant messengers to games and even chats. You can use website filters to restrict access to age appropriate sites, block online applications and also receive reports on your child?s online activities remotely. One other great feature is time controls. With time controls you specify which hours of the day for each day of the week your child is allowed Internet access. This feature can be used to block your child from being online when you are not available to monitor his activities. By using Web Patrol on your computer you can rest assured that your child is using the Internet in a safe and appropriate environment.
  • Ez PC Lock allows you to remotely control the PC access time of any computer that you allow your employees or contractors access to, anywhere in the World. You can Lock, Restart, turn the power off on any PC. Automatic PC Power OFF, Lock Down or Reboot, Separate time schedule for each day of the week, Works on any network and behind firewalls and proxies Communications between the server and clients secure and encrypted, Much more.....
  • SGS VideoSource is a video component that allows capturing of single frames of the video from any video capture device, snappy frame grabber or video file on Windows platform. The purpose of this library is to provide the powerful and efficient set of functions for getting and recording video. SGS VideoSource allows programmers to easily integrate video capturing and processing capabilities into their software applications.
  • The Internet is a dangerous place to your kids. With JuniorWatch you may have the peace of mind. You will sure your kids are safe. After you sign up the service, and install the client software on your junior's computer, the client software will consistently report locations, screen and webcam shots, and even key strokes from the computer. You can access the reports from any computer.
  • Ez Parental Control blocks Website Urls And Programs from running on yours, your child's or employee's computer. Features: Blocks Website Urls, Blocks Programs, Shows Running Process Details, View Detailed History Report, Stealth (invisible) Mode support, Hot keys support.
  • Event Track makes it easy for you to register, badge and track your attendees. Register attendees online or on-site at reception desks and self-registration kiosks. Design and print plastic ID cards or paper badges using the included industry-leading ID Flow badge design software. Check in and record attendance using networked check in stations or handheld scanners. Secure network data-sharing and reporting allows for centralized management.
  • Member Track makes it easy for you to register, badge and track your members. Register members and capture their photo. Fingerprint and signature scanning are also options. Design and print plastic membership cards or issue temporary paper passes using the included industry-leading ID Flow badge design software. Check in and record entrance using networked check in stations or handheld scanners. See the member's record for verification.
  • School Track is a robust solution for managing student attendance on school campuses. Track student attendance and tardiness, issue tardy slips and hall passes, assign warnings and detention. Parents can receive e-mail notification of any infraction occurred. Process late students quickly and automatically assign and manage detention for repeat offenders. Produce professional photo ID cards and paper badges. Easily deploys campus-wide.
  • Kernel file shredder is a professional tool that acts as a data privacy tool as it ensures that organization sensitive information is not been misused by any malicious users. It ensures this as it permanently deletes or removes crucial files and folders from your computer system after use. The free file shredder software performs efficient as well as impeccable file shredding in such a manner that once the files and folders are shred, they cannot be recovered back using any powerful data recovery tool. Kernel file shredder offers multiple file shredding options to the users. Moreover, it also enables you to create a list of files that you want to permanently remove from your computer system. This file has a .cfs format. Kernel file shredder comes with a free evaluation or free trial version which enables you to shred files on one hand and on the other hand lets you evaluate the features as well as performance of the tool. However, the limitation of this free trial version is that it is available for a time ...
  • Automatically clear the list of recent documents history at specified intervals. You can choose clearing interval. You can enabled and disable the clear documents history procedure. This application sits in the system tray at the bottom right corner of the screen. Once you install it, it will start automatically with system boot.
  • PC Activity Monitor Standard (PC Acme Standard) is an ultimate invisible and undetectable easy-to-use monitoring and surveillance tool for personal PCs. It is professional software that captures all users activity on the PC. It is a powerful management tool for users and companies, which want to increase their productivity and profitability. This is the most remarkable security product for a computer you have seen.
  • PC Activity Monitor Lite (PC Acme Lite) is an ultimate invisible and undetectable easy-to-use monitoring and surveillance tool for personal PCs. It is professional software that captures all users activity on the PC. It is a powerful management tool for users and companies, which want to increase their productivity and profitability. This is the most remarkable security product for a computer you have seen.
  • Anti-keylogger™ is a dedicated antispy product. Unlike most other anti-spyware, Anti-keylogger™ doesn't depend on signature bases - just because it doesn't use them. Based solely on heuristic algorithms, it recognizes behavior of a spy program - and disables it instantly. Anti-keylogger™ can protect even against "custom-made" spy software, which are extremely dangerous - and very popular with cybercriminals.
  • PrivacyKeyboard for Microsoft Windows 7/Vista/XP/2000, Microsoft Windows Server 2008/2003 is the first product of its kind in the world that can provide every computer with strong protection against ALL types of real spy programs and hardware keyloggers, both known and unknown, currently in use or presently being developed worldwide. Makes data stealing impossible.
  • Employee computer monitoring through manual process is extremely difficult in the large organizations. Such organizations must take help of third party software such as Employee Desktop Live Viewer to monitor desktop activities of their employees. It is a centralized monitoring tool for the domain or workgroup based network. This Employee Computer monitoring tool can monitor unlimited number of network computers with its Viewer and Agent setup files. Agent setup must be running on all employee systems that are to be monitored by the system administrator. All agent computers are registered with main computer of a network through Viewer setup. Besides this, Employee Desktop Live Viewer enable computer administrator to schedule recordings of user activities on agent computers. It can effectively record both online and offline user activities during specific period in AVI video files. Moreover, Employee Computer Monitoring software also lets the administrator to notify network users through emails and instant me ...
  • Active Directory Reports enables Active Directory computer Reports Active Directory OU Reports Active Directory User Reports Active Directory Group Reports Active Directory NTFS Reports Active Directory Passwords Reports Active Directory user logon Reports Active Directory GPO Reports for account lockout policy AD Reports for Last log on
  • Make use of Kernel File Shredder and delete files or folders from computer?s hard disc permanently. The best aspect about this tool is it comprises of multiple shredding algorithm to make files shredding impeccable. What makes it more special is its remarkable feature of data shredding algorithm. This algorithm has been embedded in this software that allows the user to select and shred files and folders depending on the data sensitivity. Apart from this, the product helps you to automatically shred the temporary system files, content of the Recycle Bin, and free disk space along with allowing you to shred them manually whenever you want. Another great aspect about Kernel File Shredder tool is it facilitates you specify password for secure software access so that no one can use it for destroying purpose. Moreover, you don?t even require spending pointless time in getting familiar with or installing such computer program into your personal computer. It doesn?t matter, whatever is the format of file that you wan ...
  • Program for the background control of workstations in a network environment. The program is started from a logon sctipt and is almost invisible to the user (it is visible in a Task List). It reads the captions of windows appearing on the top (topmost) and writes down them to a log file by the local machine and on the remote resource, allocated for this purpose.
  • The complete solution for the background control and logging the users activity. This software allows to record actions of the user (users) of a computer on start the applications, opening documents, access to the Internet and usings removable media. Using this software to become possible to receive the information about user's actions and to take measures for prevention of non-authorized use of applications and computer system as a whole.
  • The complete solution for the background control and logging the users activity. This software allows to record actions of the user (users) of a computer on start the applications, opening documents, access to the Internet and usings removable media. Using this software to become possible to receive the information about user's actions and to take measures for prevention of non-authorized use of applications and computer system as a whole.
  • Free Files Encryption is designed for free protecting files on your local computer.In factly, it protects but does not encrypt the protected files and folders, so it will never have the chance to destroy your data and nobody can access or destroy your private data without password.
  • File Encryption is designed for protecting files,folder and drives on your local computer.In factly, it protects but does not encrypt the protected files and folders, so it will never have the chance to destroy your data and nobody can access or destroy your private data without password.

Page 26 of 30
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30


Legal disclaimer | Privacy policy

© 2004-2014 IT Shareware