Home | Submit a file  |  New  |  Categories  |  Our awards  |  Link to us  |  RSS Feeds

Utilities :: Security & Encryption
Sort by: date | product title | rating | downloads | popularity
Display: short descriptions | full descriptions
  • Ez Parental Control blocks Website Urls And Programs from running on yours, your child's or employee's computer. Features: Blocks Website Urls, Blocks Programs, Shows Running Process Details, View Detailed History Report, Stealth (invisible) Mode support, Hot keys support.
  • Event Track makes it easy for you to register, badge and track your attendees. Register attendees online or on-site at reception desks and self-registration kiosks. Design and print plastic ID cards or paper badges using the included industry-leading ID Flow badge design software. Check in and record attendance using networked check in stations or handheld scanners. Secure network data-sharing and reporting allows for centralized management.
  • Member Track makes it easy for you to register, badge and track your members. Register members and capture their photo. Fingerprint and signature scanning are also options. Design and print plastic membership cards or issue temporary paper passes using the included industry-leading ID Flow badge design software. Check in and record entrance using networked check in stations or handheld scanners. See the member's record for verification.
  • School Track is a robust solution for managing student attendance on school campuses. Track student attendance and tardiness, issue tardy slips and hall passes, assign warnings and detention. Parents can receive e-mail notification of any infraction occurred. Process late students quickly and automatically assign and manage detention for repeat offenders. Produce professional photo ID cards and paper badges. Easily deploys campus-wide.
  • Kernel file shredder is a professional tool that acts as a data privacy tool as it ensures that organization sensitive information is not been misused by any malicious users. It ensures this as it permanently deletes or removes crucial files and folders from your computer system after use. The free file shredder software performs efficient as well as impeccable file shredding in such a manner that once the files and folders are shred, they cannot be recovered back using any powerful data recovery tool. Kernel file shredder offers multiple file shredding options to the users. Moreover, it also enables you to create a list of files that you want to permanently remove from your computer system. This file has a .cfs format. Kernel file shredder comes with a free evaluation or free trial version which enables you to shred files on one hand and on the other hand lets you evaluate the features as well as performance of the tool. However, the limitation of this free trial version is that it is available for a time ...
  • Kernel File Share is an expedient data shredding software that is used to erase files and folders containing confidential data. Using this tool, it is possible to delete data beyond the point of recovery, even upon the use of powerful data recovery tools. While normal methods of data deletion simply marks the table entry in the operating system as ?Empty?, deletion with the help of data shredder software removes data eternally. This is because highly advanced and powerful crypto algorithms are integrated with this tool that helps in overwriting data to be deleted. Algorithms such as US Army AR380-19 (3 passes), Peter Gutmann (35 Passes), DoD 5220 + Peter Gutmann, and German VSITR (7 Passes) are incorporated with data shredder software for file deletion. These algorithms work by making passes over the concerned data with sequential or random bits of 0s and 1s so that data get permanently deleted. This way the data shredding tools delete all types of files and folders including recycle bin content, temporary fi ...
  • Automatically clear the list of recent documents history at specified intervals. You can choose clearing interval. You can enabled and disable the clear documents history procedure. This application sits in the system tray at the bottom right corner of the screen. Once you install it, it will start automatically with system boot.
  • PC Activity Monitor Standard (PC Acme Standard) is an ultimate invisible and undetectable easy-to-use monitoring and surveillance tool for personal PCs. It is professional software that captures all users activity on the PC. It is a powerful management tool for users and companies, which want to increase their productivity and profitability. This is the most remarkable security product for a computer you have seen.
  • PC Activity Monitor Lite (PC Acme Lite) is an ultimate invisible and undetectable easy-to-use monitoring and surveillance tool for personal PCs. It is professional software that captures all users activity on the PC. It is a powerful management tool for users and companies, which want to increase their productivity and profitability. This is the most remarkable security product for a computer you have seen.
  • Anti-keylogger™ is a dedicated antispy product. Unlike most other anti-spyware, Anti-keylogger™ doesn't depend on signature bases - just because it doesn't use them. Based solely on heuristic algorithms, it recognizes behavior of a spy program - and disables it instantly. Anti-keylogger™ can protect even against "custom-made" spy software, which are extremely dangerous - and very popular with cybercriminals.
  • PrivacyKeyboard for Microsoft Windows 7/Vista/XP/2000, Microsoft Windows Server 2008/2003 is the first product of its kind in the world that can provide every computer with strong protection against ALL types of real spy programs and hardware keyloggers, both known and unknown, currently in use or presently being developed worldwide. Makes data stealing impossible.
  • Employee computer monitoring through manual process is extremely difficult in the large organizations. Such organizations must take help of third party software such as Employee Desktop Live Viewer to monitor desktop activities of their employees. It is a centralized monitoring tool for the domain or workgroup based network. This Employee Computer monitoring tool can monitor unlimited number of network computers with its Viewer and Agent setup files. Agent setup must be running on all employee systems that are to be monitored by the system administrator. All agent computers are registered with main computer of a network through Viewer setup. Besides this, Employee Desktop Live Viewer enable computer administrator to schedule recordings of user activities on agent computers. It can effectively record both online and offline user activities during specific period in AVI video files. Moreover, Employee Computer Monitoring software also lets the administrator to notify network users through emails and instant me ...
  • Active Directory Reports enables Active Directory computer Reports Active Directory OU Reports Active Directory User Reports Active Directory Group Reports Active Directory NTFS Reports Active Directory Passwords Reports Active Directory user logon Reports Active Directory GPO Reports for account lockout policy AD Reports for Last log on
  • Make use of Kernel File Shredder and delete files or folders from computer?s hard disc permanently. The best aspect about this tool is it comprises of multiple shredding algorithm to make files shredding impeccable. What makes it more special is its remarkable feature of data shredding algorithm. This algorithm has been embedded in this software that allows the user to select and shred files and folders depending on the data sensitivity. Apart from this, the product helps you to automatically shred the temporary system files, content of the Recycle Bin, and free disk space along with allowing you to shred them manually whenever you want. Another great aspect about Kernel File Shredder tool is it facilitates you specify password for secure software access so that no one can use it for destroying purpose. Moreover, you don?t even require spending pointless time in getting familiar with or installing such computer program into your personal computer. It doesn?t matter, whatever is the format of file that you wan ...
  • Program for the background control of workstations in a network environment. The program is started from a logon sctipt and is almost invisible to the user (it is visible in a Task List). It reads the captions of windows appearing on the top (topmost) and writes down them to a log file by the local machine and on the remote resource, allocated for this purpose.
  • The complete solution for the background control and logging the users activity. This software allows to record actions of the user (users) of a computer on start the applications, opening documents, access to the Internet and usings removable media. Using this software to become possible to receive the information about user's actions and to take measures for prevention of non-authorized use of applications and computer system as a whole.
  • The complete solution for the background control and logging the users activity. This software allows to record actions of the user (users) of a computer on start the applications, opening documents, access to the Internet and usings removable media. Using this software to become possible to receive the information about user's actions and to take measures for prevention of non-authorized use of applications and computer system as a whole.
  • Free Files Encryption is designed for free protecting files on your local computer.In factly, it protects but does not encrypt the protected files and folders, so it will never have the chance to destroy your data and nobody can access or destroy your private data without password.
  • File Encryption is designed for protecting files,folder and drives on your local computer.In factly, it protects but does not encrypt the protected files and folders, so it will never have the chance to destroy your data and nobody can access or destroy your private data without password.
  • All In One Keylogger implements the state-of-art technology, and guarantees you full control over your computer. Have you ever thought what site your children are surfing when you are not at home? Who the 'girlfriend' your wife is chatting with all the time really is? What your employees are doing when you are not at home? Now you can monitor chats,e-mails,keystrokes typed,desktop activities, microphone...It can even send you logs by email/FTP.
  • Storage Room a Personal Information and Password Manager to protect the privacy while editing and viewing, even if the workstation is already inflicted by a spy and for save data exchange with up to 16384 Bit strong RSA Keys. Stores and protects bookmarks, contacts, notes, appointments, movie libraries and any tabular data like passwords, license keys, credit cards, application-, document- and internet shortcuts in special designed data sheets inside Storage Room. Arrange this data sheets in a folder structures, lock and protect any amount of folders and data sheets with an additional password and password file and decide how long any of them can remain open without user interaction, before Storage Room seals them automatically. The password generator creates high secure passwords and the virtual keyboard hides keyboard input. The Internet Explorer can be automated with an entirely new, innovative and secure way and forced into any desired location. Data like passwords and login details can be transferred ...
  • Invisibe Keylogger will let you monitor what people you share your computer with type when you are away. Working in the background, Invisible Keylogger will record every keystroke a user makes in every application and save it to a text file. In Stealth mode, the program is totally invisible to other people who are not aware their computer activity is monitored.
  • LockmyDrive FreeLocker is a portable data security software offering a quick, easy in use and reliable solution for your private data protection. The software can secure any sensitive information, photos, videos, important documents protecting your files from unauthorized viewing, copying and deletion. It can be used to secure files and folders on internal and external hard drives, USB Flash drives and all types of memory cards. LockmyDrive FreeLocker (free software version) supports free locking functionality allowing you to lock your device with a password restricting access to its contents. Each user is also provided with 2 Gb of free online file storage for keeping the most valuable files in a secure place and access them whenever needed from any device connected to the Internet. Paid software versions (LockmyDrive Instant and LockmyDrive Strong) offer additional functionality. LockmyDrive Instant enables you to hide all files and folders contained on your device making them invisible and inaccessible to ...
  • SoftFuse Password Generator Std generates difficult-to-crack passwords in a matter of seconds. While creating a password, you may use letters, digits, symbols, as well as their combinations. You can generate extremely strong passwords up to 128-character length and lists up to 100 unique passwords at once! This password program is a simple-to-use but it has many advanced settings: hash generator, hex passwords output, mask support, export/print.
  • Pdf encryption software lock pdf data with strong 128 bit encryption security level protection. Program is responsible for protecting batch pdf documents with open password security and owner password restrictions. Pdf encryption software facilitates to restrict desired function in any pdf file i.e. you can enable or disable pdf printing, copying, form filling, signing, commenting, editing, modifying etc permissions according to requirement. Application is Windows compatible, support RC4 40 bit & 128 bit encryption protection. In fact, you can secure bulk pdf documents only with open (user) password without applying any restrictions. This easy to use and awesome utility has inbuilt user help manual and does not require any extra technical skills for operating. Download free evaluation version of pdf security software, protect your private and confidential data from un-authorized access, prevent piracy & fraudulent. Program prompt for open password once set into the pdf and only intended person ...

Page 26 of 30
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30


Legal disclaimer | Privacy policy

© 2004-2014 IT Shareware