Home | Submit a file  |  New  |  Categories  |  Our awards  |  Link to us  |  RSS Feeds

Utilities :: Security & Encryption
Sort by: date | product title | rating | downloads | popularity
Display: short descriptions | full descriptions
  • The program has been designed as general application for surveillance hybrid platforms working concurrently with wireless and wired IP webcams, TV-boards, capture cards, power-line, and USB webcams. It has web interface with the same form and functionality on the local and distant pcs. Users see MPEG-4 coded video and have complete management of the software via net that surveillance station can be operated without monitor, keyboard, and mouse attached. Software`s modular configuration significantly increases reliability because all components act as autonomous software. If one part fails, other parts continue working. For instance if the `capture` unit fails, `watchdog` restarts it right away that viewers don`t notice anything because they are watching video through a `playback` part. The software makes `repeated` recording that the `hard drive full` situation never happens. The recording can be constant or it can be activated by motion, human face recognition, or by schedule. The software has pre-alarm and ...
  • The program has been designed as common product for surveillance hybrid platforms running simultaneously with wireless and wired Internet cameras, TV-boards, capture boards, power-line, and USB cameras. It has web interface with the same form and functionality on the local and apart workstations. Customers see MPEG coded picture and have full management of the program through net that surveillance server can be operated with no monitor, keyboard, and mouse connected. Software`s modular configuration drastically increases reliability because all components proceed as independent software. If one unit stops working, other units continue working. For instance if the `capture` component fails, `watchdog` restarts it right away that users don`t notice anything because they are viewing picture through a `playback` unit. The software does `repeated` recording that the `hard drive full` situation never appears. The recording can be non-stop or it can be initiated by motion, human face detection, or by schedule. The s ...
  • Very simple free text/email encryption tool. Works in ANY windows program - Email-software, Word, Notepad etc etc. Just select some text in any software, press a key combination, select the encryption password and thats it. Your text becomes unreadable until you enter your password again.
  • The program locks desktop Windows on the lock. After you have closed the program on the lock, on a desktop cockroaches will run, they can be pressed which cursor of the mouse they are afraid, and also it is possible to choose in program adjustment an electronic eye or cockroaches.
  • The software has been created as general application for surveillance hybrid platforms functioning all together with wireless and wired Internet cameras, TV-cards, capture cards, power-line, and USB cameras. It has web interface with the same form and functionality on the local and apart workstations. Users view MPEG-4 coded picture and have complete control of the software through network that security server can be run with no screen, keyboard, and mouse attached. Program`s modular composition extensively improves reliability because all components act as autonomous applications. If one component stops working, other parts keep on running. For instance if the `capture` unit freezes, `watchdog` restarts it right away that users don`t notice anything because they are watching picture using a `playback` part. The program does `cyclic` recording that the `hard drive full` situation never happens. The recording can be constant or it can be initiated by movement, human face recognition, or by timetable. T ...
  • The software has been designed as universal program for security hybrid platforms functioning concurrently with wireless and wired Internet cameras, Television-boards, capture boards, power-line, and USB cameras. It has web interface with the equal look and functionality on the local and remote workstations. Users view MPEG coded picture and have full management of the software through net that surveillance workstation can be operated without screen, keyboard, and mouse attached. Program`s modular composition extensively improves reliability because all parts work as autonomous programs. If one component freezes, other modules go on running. For instance if the `capture` module stops working, `watchdog` starts again it right away that viewers don`t notice anything because they are viewing video using a `playback` part. The program performs `repeated` recording that the `disk full` situation never happens. The recording can be non-stop or it can be initiated by motion, human face detection, or by schedul ...
  • Catch a cheating spouse with evidences provided by Power Spy software. Power Spy secrectly logs all keystrokes, web sites, emails,, MySpace, Facebook, online searches, chats & IMs: MSN Messenger, Windows Live Messenger, ICQ, AOL Messenger, AIM, Yahoo! Messenger, Windows Messenger and Skype. Takes screen snapshots at every X seconds like a surveillance camera. You can receive reports remotely via emails or ftp.
  • Mini Key Log makes it possible for you to record user activities unnoticed. The monitoring is completely invisible and easy to use. Following activities are recorded: Keystrokes; Password inputs; Mouse clicks; File operations; Printer; Scanner; Modem; Removable media; Power state; Visited web sides; Screenshots; User login; Clipboard.
  • PDF Encryption software set pdf passwords, block pdf from printing and text copying. Software easily and instantly adds pdf open password and owner password. Batch pdf restrictions software disables pdf print option; protect pdf data by applying 40 bits, 128 bits RC4 and AES encryption. Software batch encrypt pdf files, instantly restrict pdf form filling, signing, commenting, extraction etc with owner password. Using AWinware pdf password software, protects pdf from unauthorized person, insure that the pdf file is only opened by intended recipient only. Software supports all windows based operating systems including Windows 7, Vista and XP. Tool is useful to disallow pdf printing copying editing filling, turn permissions to Not Allow mode. Features: # PDF encryption tool process multiple documents in a single hit. # Tool can be easily installed and run on latest windows including Win7 32bits and 64bits. # Software supports both 40 bits and 128 bits encryption security. # Tool preserves last setting used ...
  • Pass Guard is a simple piece of software that enables you to securely store all your passwords and private details in one location for easy access. Save time and frustration as you take advantage of the ability to organize all your crucial information for quick and easy reference.
  • SpyPal Email Spy software secretly monitors and records all emails opened in popular email clients, such as Microsoft Outlook 2000/XP/2003/2007, Microsoft Outlook Express 5/6, Windows Vista WinMail and IncrediMail. It runs in a complete invisible mode. You can check all recorded messages by simply receiving emails or opening a web page.
  • Biometrics is the use of a personal trait such as finger or face, voice or iris recognition to identify a person. my-iWallet is a uniquely secure and innovative application, the first to utilize Biometrics in this way, enabling you to log on to Web Sites without entering passwords, but rather by simply Scanning your finger or face, voice or biosmartcard.
  • SpyPal MSN Messenger Spy software can secretly record all MSN Messenger, Windows Live Messenger and Windows Messenger's incoming and outgoing chat text messages. It runs in a complete invisible mode. You can check all recorded messages by simply receiving emails or opening a web page. Perfect for catching cheaters,monitoring employees, children or spouse, and even investigating crimes.
  • Spy all version ICQ IM chatting records. Spy stealthily so that the user won't know such monitoring exists. Possible usages: Spy employees, children and spouse chatting on ICQ. View logging records from the program or send a report to a pre-determined email address. Use your hotkey to activate it from complete stealth mode and protect program access by password. Uninstall it easily from the program interface.
  • Keylogger Spy Monitor spy software can secretly record all keystrokes typed on your computer. It runs completely invisiblely. You can check logging reports by simply receiving emails or opening a web page. Perfect for catching cheaters, m onitoring employees, children or spouse, acquiring others' passwords and even investigating crimes. Use hotkey to unhide it from Stealth Mode and protect the program access by password.
  • SpyPal Invisible Spy secrectly records keystrokes, screenshots, websites visited, windows opened, applications, MSN, ICQ, AIM, Yahoo! IM, Skype, clipboard, passwords, emails, documents and more. In Stealth Mode, it is completely invisible to computer users. Use hotkey and password to access the program. Auto send logs to a preset email or ftp at set interval. Usages: monitors employees, children, spouse and investigate crimes.
  • Invisible messenger spy software that logs all incoming and outgoing AIM text chat messages. View log records from the program or send a report to a preset email / ftp. You can check all recorded incoming and outgoing messages by simply receiving emails or opening a web page. Use hotkey to unhide it from Stealth Mode and protect program access by password.
  • With Children Monitoring Spy you can log chat conversations, emails, the sites someone visited, MySpace, Facebook etc. By activating Children Monitoring Spy, you can monitor everything. Children Monitoring Spy allows you to register all keystrokes typed including language-specific characters, talk and messages conversations, passwords, e-mails, clipboard information, screenshots capturing, desktop and Internet activity.
  • Power Spy secrectly logs all keystrokes, web sites, emails, chats & IMs: MSN Messenger, Windows Live Messenger, ICQ, AOL Messenger, AIM, Yahoo! Messenger, Windows Messenger and Skype. Takes screen snapshots at every X seconds like a surveillance camera. Displays exact activities, like MySpace, Facebook, PC games, online searches & shopping, file transfers and webmails. You can receive reports remotely via emails or ftp.
  • SpyPal Keylogger Spy software can secretly record all keystrokes typed on your computer. This may include chats, emails, user names, passwords, online searches, myspace, facebook activities and more.It runs in a complete invisible mode. You can check logging reports by simply receiving emails or opening a web page.Perfect for catching cheaters, monitoring employees, children or spouse.
  • SpyPal For Office secrectly records keystrokes, screenshots, websites visited, windows opened, applications, MSN, ICQ, AIM, Yahoo! IM, Skype, clipboard, passwords, emails, documents and more. In Stealth Mode, it is completely invisible to computer users. Use hotkey and password to access the program. Auto send logs to a preset email or ftp at set interval. Possible usages: monitors employees, children, spouse and investigate crimes.
  • Power Spy For Home secrectly logs all keystrokes, web sites, emails, chats & IMs: MSN Messenger, Windows Live Messenger, ICQ, AOL Messenger, AIM, Yahoo! Messenger, Windows Messenger and Skype. Takes screen snapshots at every X seconds like a surveillance camera. Displays exact activities, like MySpace, Facebook, PC games, online searches & shopping, file transfers and webmails. You can receive reports remotely via emails or ftp.
  • Spy Camera Software, invisible keylogger, email and messenger spy software. It records all keystrokes typed, MSN Messenger, Windows Live Messenger, ICQ messenger, AIM, Yahoo! Messenger, Windows Messenger and Skype's chats, websites visited, emails read, documents opened, windows opened, clipboard activaties, passwords typed and applications executed. It even takes screen snapshots like a surveillance camera.
  • Power Spy Keylogger spy software can secretly record all keystrokes typed on your computer. It runs completely invisiblely. You can check log reports by simply receiving emails or opening a web page. Power Spy Keylogger is perfect for catching cheaters, monitoring employees, children or spouse, acquiring others' passwords and even investigating crimes. Use hotkey to unhide it from Stealth Mode and protect the program access by password.
  • Parental Spy software secrectly logs all keystrokes, web sites, emails, chats & IMs: MSN Messenger, Windows Live Messenger, ICQ, AOL / AIM, Yahoo! Messenger, Windows Messenger and Skype. Takes screen snapshots at every X seconds like a surveillance camera. Displays exact activities, like MySpace, Facebook, PC games, online searches & shopping, file transfers and webmails. You can receive reports remotely via emails or ftp.

Page 24 of 30
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30


Legal disclaimer | Privacy policy

© 2004-2014 IT Shareware