Home | Submit a file  |  New  |  Categories  |  Our awards  |  Link to us  |  RSS Feeds

Utilities :: Security & Encryption
Sort by: date | product title | rating | downloads | popularity
Display: short descriptions | full descriptions
  • The best network-based security software for public environment applications to secure and maintain a lot of network PC workstations located in different places. It supports over 600 different security restrictions, options and tweaks to restrict access to all parts of Windows, lets you apply executable patches remotely, and schedule reboots, shutdowns, and Windows Explorer restarts from a single administrator's computer.
  • Power Spy Lite secretly logs Facebook, Skype, keystrokes, chats & IMs, emails, web visits, video talk, logins, passwords, applications, searches and more. It also takes screenshots like a surveillance camera. Lets you know exactly what they do on a computer screen while you are away. Automatically sends log reports to your email. Starts monitoring with system startup. Runs silently and invisibly.
  • Privacy Drive is an easy-to-use encryption software that uses Virtual Disk & On-the-fly Disk Encryption Technology to lock, hide and encrypt all kind of pictures, videos, documents, files and folders, password protects sensitive information from unauthorized access.
  • Gain full access to information stored in iOS, Apple iCloud, Windows Phone and BlackBerry 10 devices! Download device backups from Apple iCloud, Microsoft OneDrive and BlackBerry 10 servers. Use Apple ID and password, or extract binary authentication tokens from computers, hard drives and forensic disk images for acquiring iCloud data without a password. GPU-accelerated logical acquisition extracts information from password-protected backups.
  • Spy Patrol is a user-friendly spy software that runs hidden in the background. Spy Patrol records in stealth mode all th keystrokes typed, passwords, websites visited, chats etc. and takes screen shots of the active windows. Spy Patrol records all the user passwords (including the system logon password!). Spy Patrol captures the emails sent and received, and the messenger conversations are recorded as well! See more at www.spy-patrol.com
  • Power Spy Keylogger secretly logs Facebook, keystrokes, chats, IMs, emails, websites visited, microphone, video talk, logins, passwords, applications, searches, documents and more. Logs Skype, Yahoo Messenger, ICQ, AIM, etc. Takes screenshots every x seconds like a spy cam. Sends logs to your email. You can check logs on a remote PC, tablet, smart phone, or directly on the monitored PC. Perfect for monitoring employees, kids and spouse.
  • Facebook Spy Monitor is a Facebook related activity monitoring and parental control software. It secretly records PC users' Facebook private profile, emails, chats & IMs, photos, interests, contatcts and events by taking screen snapshots periodically. It also records popular Facebook instant messenging clients and Facebook related web sites and searches. See exactly what users were doing just like watching a surveillance video playback.
  • Lock down Windows XP/7/8 and easily create a kiosk setup using the Google Chrome browser. Inteset's inexpensive Secure Lockdown -Chrome Ed is ideal for various kiosk setups, digital signage, trade shows, libraries, schools, hotels, museums, banks, and other businesses. Secure Lockdown removes the Windows Desktop functionality and unwanted keyboard strokes and allows Google Chrome to run exclusively.
  • Protect files and folders situated on local media of Windows98/ME/NT/2000/XP/Vista with Easy File & Folder Protector at Windows kernel level. Your can deny access to certain files and folders, or to hide them securely from viewing and searching. Easy File & Folder Protector has an easy-to-use user interface allowing you to allocate access to your files and folders between your users according to predefined timetables. Each PC user can have his..
  • Network Password Manager provides convenient and easy centralized solution for enterprise password management for organizations of any size. In addition to providing all of the standard functions, it also presents many advanced features supported by a user-friendly and intuitive interface. It is also ready for the multilingual computing world and comes with a flexible set of controls and features.
  • Spyrix Keylogger is a Powerful Invisible Software for remote monitoring of user activity:keystrokes logger, screenshots, passwords, facebook, Skype, web, chats, emails, IMs. Collected data can be viewed via remote secure web-account and also be automatically sent to email, dropbox, google drive, FTP, Local Network. Spyrix Keylogger is very easy to configure and use.
  • PTP (Person To Person) now lets you email uncrackable files in AutoCrypt(TM) mode. This means it will self-decrypt at the other end, as if by magic ! The recipient does not need any software or digital certificates to decrypt the file. This feature is unique to PTP and ensures that you can send safe files without worrying about whether the recipient has the right decrypion software to read them. No other system makes email security so easy.
  • Privacy Eraser is an all-in-one privacy suite that protects your privacy by cleaning up all your Internet history and past computer activities. It supports popular web browsers such as Internet Explorer, Mozilla Firefox, Google Chrome, Safari and Opera, completely implements and exceeds the US Department of Defense and NSA clearing and sanitizing standard, once erased with it, your file data is gone forever and can not be recovered.
  • Netwrix Password Manager gives end users ability to securely manage their passwords and resolve account lockouts in a self-service fashion without involvement of helpdesk personnel, allowing organizations to implement strong password policies in Active Directory environments and address their identity management challanges.
  • USB Log & Lock allows you to control operations with USB devices on computers connected to the local area network of an organization or enterprise. With USB Log & Lock, you can forbid USB devices with the help of flexibly customizable rules both for separate devices and users and for groups of users.
  • NoteGuardian securely stores and organizes your sensitive information in an encrypted database. NoteGuardian is easy to use and customizable to suit your needs. NoteGuardian is ideal for managing passwords, logins, financial account numbers, social security numbers, and similar sensitive information. All information in NoteGuardian is stored locally, nothing is transmitted on the internet.
  • Easy Hide Files allows hiding files and folders from viewing, accessing and searching completely, so that only you know that those files or folders exist. No matter how particular computer (over local network, from internet or directly) is accessed, those folders stay invisible and safe.
  • It`s not a common knowledge that even after a full deletion of files, either skipping the recycle bin or directly from it, your files can be recovered with the help of specially designed programs. Our program allows you to delete your files without a possibility to recover them, in case your deleted files are recovered, their data will be lost forever, what makes reading them impossible. The program processes files at a high speed and is easy to
  • Spyrix Keylogger Gratuit est un puissant logiciel invisible pour une surveillance à DISTANCE complète et détaillée de tous les activités des utilisateurs: frappes de clavier, captures d'écran, mots de passe, web, chat, e-mails, messagerie instantanée. Cet outil est utile pour les parents qui veulent surveiller l'utilisation de l'ordinateur de leurs enfants.
  • Keystroke Logger Pro is an invisible keylogger for Windows systems that runs hidden in the background. Keystroke Logger Pro secretly records keystrokes, passwords, websites visited and also takes screenshots at set intervals just like a surveillance camera. More details: www.keystroke-logger.com
  • KSnetManager is a revolutionary parental control tool that is distinct from other internet monitoring software: 1) Instead of being a hidden monitoring program, it is interactive. 2) Instead of passive monitoring, it actively controls and blocks unexpected activities. 3) It controls and monitors not only websites, but also all programs on your computer. 4) The program has a fully encrypted key logger; and much more.
  • Finally, for anyone looking for monitoring and tracking all Skype chats and activities Skype Spy USB Edition software was designed. You don't need to install Skype Spy into the PC you are going to track. Just insert the USB flash stick with the Skype Spy and run the program. In this way the app stays completely undetectable. It is a great option for anyone looking for an effective parental control solution or employee monitoring software.
  • Activity Monitor Pro offers effective security on computers and provides the equivalent of the security camera! Activity Monitor Pro runs hidden in the background to secretly record keystrokes typed, passwords entered, websites visited, applications/files used and takes screenshots of the activities. Recorded data will be sent to you by email or FTP/Email address automatically and secretly. Find out more on www.activity-monitor.com
  • Lock down Windows XP/Vista/7/8 and create a virtual embedded environment. Inteset's inexpensive Secure Lockdown version 2.0 is perfect for kiosk setups, digital signage, trade shows, library and school labs, Internet cafes, gaming centers, media centers and other applications. Secure Lockdown removes the Windows Desktop functionality and unwanted keyboard strokes and allows your main application to run exclusively.
  • PCMate Free EXE Lock is a safe and efficient EXE file encryptor tool that is specially designed to lock any executable programs on your computer to protect them from non-authorized execution. When protecting a program, PCMate Free EXE Lock modifies the binary executable itself, so that it first asks for a password and runs the program only if a valid password has been entered.

Page 24 of 30
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30


Legal disclaimer | Privacy policy

© 2004-2015 IT Shareware