Home | Submit a file  |  New  |  Categories  |  Our awards  |  Link to us  |  RSS Feeds

Utilities :: Security & Encryption
Sort by: date | product title | rating | downloads | popularity
Display: short descriptions | full descriptions
  • Platinum Clear Cookies provides a safe and easy way to quickly clear all browser cookies, or remove only unwanted cookies of a specific domain or website. You can purge all cookies from Internet Explorer or Mozilla Firefox with a simple click of the button, or designate a domain to clear its cookies exclusively at your wish. By easily and safely remove all unwanted cookies, Platinum Clear Cookies provides you platinum online privacy protection.
  • Remove NSF local database security with much ease and efficacy using imminent Kernel for NSF Local Security Removal software. It removes local security while maintaining the NSF file integrity; there is no hampering with NSF file content. Being an unprivileged NSF file user, when you try to access NSF file you get errors like, ?You are not authorized to access that database? or ?You are not authorized to perform that operation?. Lotus Notes local security removal helps you in getting access to the file by removing local security applied to it. After getting the access rights, one can open, edit the NSF file. Moreover, after accessing the NSF file, user can re-apply the removed security back on NSF file. Software is embedded with interactive GUI, which demands no technical skills to remove NSF local database security. Software is compatible with all versions of Lotus Notes .NSF files. FREE demo version is available that removes local security from NSF files with file size of up to 5 MB. For removin ...
  • Have you need NSF Security removal software that's fits your need an remove nsf security. Get PDS NSF Security removal tool and remove nsf security from lotus notes 8.5, 8.0, 7.0, 6.5 & 5.0. Notes Security Removal software easily erase notes security when notes database showing 'You are not authorized to access that database.' error message. Get the full authority on secured lotus notes database with PDS NSF Security remover software.
  • System Administrator is a managing tool designed to prevent unwanted PC activities. The product can block programs, websites, chats, browsers, etc. It helps the controller to restrict installer launch and protect the computer against inexperienced users. System Administrator helps prevent non-work related activities from being accessed and avoid company losses. The program is highly protected and hidden
  • SpyPal PC Spy secrectly records keystrokes, screenshots, websites visited, windows opened, applications, MSN, ICQ, AIM, Yahoo! IM, Skype, clipboard, passwords, emails, documents and more. In Stealth Mode, it is completely invisible to computer users. Use hotkey and password to access the program. Auto send logs to a preset email or ftp at set interval. Possible usages: monitors employees, children, spouse and investigate crimes.
  • CacheGuard is an OS/Appliance dedicated to Web traffic Security and QoS. It transforms a x86-based machine into a powerful Web Gateway Appliance. It allows you to protect Web surfers and Web servers against all threats coming from the Web. Also it optimizes Web traffics to save your network bandwidth and distributes Web contents with a high Quality of Service.
  • An easy secure file shredder & history eraser privacy tool. Powerful shredding algorithms wipe & delete files, folders, recycle bin, free space, IE browsing history, cookies, cache, index.dat files, run history, file tips, & more. With an easy drag & drop interface, comprehensive help, per-item progress bars, quick installer/uninstaller, built-in check for updates, command line options, & fast multi-threaded design, this is your ideal shredder!
  • Protect your privacy and your identity with automatic wiping of sensitive information. Remote wiping, untrusted SIM deletion, wiping on SMS - enjoy SecuWipe allround protection. This can be your last but most efficient shield when the device gets into intruder's hands.
  • Advance keylogger software is internet and system monitoring tool that records external user activities on your system. Hidden PC monitoring utility secretly captures entire online and offline activities in your absence. System surveillance program save each single keystroke, clipboard content, file operation etc in a password protected log file either in text or html format. Application records all the activities like typed email, website URL, username, password, typed document etc. Keyboard keystrokes tracking tool also monitors all the application install and run on your system and takes screenshot of your desktop screen after every define interval. Application provides wizard style graphical user interface so that user can easily access this tool also includes a help manual which describes each steps to use this program. Surveillance software works invisibly as a background process and will not appear on the desktop or in control panel, program files. Keystroke monitoring tool sends recorded log file at p ...
  • Xlinksoft Picture Encryption is a professional picture encryption software which can encrypt all picture formats like BMP, JPG, JPEG, GIF, PNG and ICO file, TIF file, etc. Perfect picture encryption function provides for you. It can encrypt and decrypt pictures within minimum time. It's an easy-to-use picture encryption software. Changing the background color of interface is available. And setting the output path is also up to you.
  • Data Wiper removes completely all deleted confidential files folders from your hard drive and USB drives. Generally when a user delete a file from hard disk, deleted data can be recovered by data recovery software's. Data wiping tool easley wipe data and no data recovery software will recover your data after wiping. Data erasure utility supports both FAT and NTFS file system and runs under all major windows operating systems including Windows XP, Win 2000, Windows 98, Win ME and Vista. It can wipe system files like clipboard contents, administrator s temporary files, recent folder, system registry traces, recycle bin, recent documents. It removes data permanently from hard drive that can never be recovered by any data recovery tools. Data wiping utility is able to permanently remove files and folders from hard drives, USB Removable Storage media, memory cards, compact flash cards, SD cards, and other flash drives. Data wiper software features - Erasing and destroying all the deleted files wipes all ...
  • PC Spy Software logs all PC & internet usage and email log reports to you. PC Spy Software logs all keystrokes, chats, emails, web sites visited, applications run, usernames, passwords, MySpace, Facebook activities, documents opened, online searches...takes screenshots like a spy cam. PC Spy Software runs invisibly and PC users won't know its existence. Great for monitoring employees, children, spouse and investigating crimes.
  • How to block USB drive activities! Protect your USB port software is an easy and handy way to disable illegal access of removable drives. Pen drive blocker utility is fully reliable in lock out use of any removable media over a centralized network of computers or individual systems. USB anti data theft software ensures you to get relief from several unauthorized use of pen drives. LAN USB drive blocker utility supports all kinds of the newest removable media available in market such as flash drive, pen drive, thumb drive, multimedia card, memory stick, iPod, MP3 Player, digital camera etc. Tool is capable to stay track online and offline activities (i.e. network connection is broken) of USB drive and provides powerful way to prevent access on any network. USB ports protection program is also able to notify network administrators via beep sounds if any unauthorized access using removable media is taking place. USB drive anti theft data software can maintain a log file which includes all information which helps ...
  • Time wastage by employees in chatting, shopping, playing online games and visiting social networking sites is such an activity that directly affects the performance of any organization. To control it, desktop monitoring tool is the best possible solution, as it enables administrator, manager or any high authority to view and record employee desktop activities. Software enables the user to remotely register and install agent on computers that need to be monitored. Once selected computers are registered, all activities that are happening on their desktops can be monitored. These activities can also be recorded and saved as AVI files by scheduling online recording. Desktop monitoring tool also helps to keep a check on employee desktop activities by providing the feature of offline recording. This recoding option enables the user to record employee desktop activities in his or her absence. Moreover, you can perform monitoring on dual-screens at a single workstation. Computers that are registered with Desktop Moni ...
  • Invisible keylogger application software designed to track typed keywords of your laptop keyboard. Hidden keylogger utility is safe, easy to use and system surveillance tool that captures Windows screenshots at regular time interval. Invisible keylogger software provides option to generate log file in TXT or HTML formats for future use. Hidden keylogger application program is totally hidden from your computer?s task manager, system installation files, add/remove program and computer desktop. Invisible keylogger utility is professional system monitoring tool that provides user friendly graphical interface so that any non technical user can easily operate the software. Hidden keylogger application program provides real time monitoring of your computer system and records entire PC activities in hidden files formats. Invisible keylogger tool provides option to send log files at specified email address. Hidden keylogger application program is password protected application that helps to restrict unauthorized user ...
  • Download free AWinware PDF encryption tool to password protect batch PDF files in a single click. PDF locker software is fast and affordable desktop utility to apply PDF open password (User password) and owner password. Lock your PDF files instantly. User can set various restrictions on document while protecting document like disable PDF print button, disallow PDF content text copying, form filling, page extraction etc. Software applies encryption of 40 bit and 128 bit RC4 level. Tool does not require any plug-ins to be installed on the system. Software encrypts bulk PDF documents using PDF encryption software. User can also set only owner password for encrypting the document. Thus Adobe Acrobat Reader will not prompt for entering the password while opening the documents. Features: # Software supports both 40 bit and 128 bit RC4 encryption level security. # Tool instantly locks batch PDF documents. # Software can set both user password and owner password. # Tool provides inbuilt user help manual for enc ...
  • Set PDF open password on bulk PDF files, password protect batch PDF documents. Download free PDF locker software to instantly lock multiple PDF documents. Encrypt PDF using 40 bit and 128 bit RC4 encryption level. Disallow PDF text copying, document printing, form filling, page extraction, document assembly, content copying for accessibility.
  • Employee Monitoring Pro secretly logs your employees' PC & internet usage during theirwork hours. It lets you exactly what they type on PC keyboard, web sites they visit, who they talk to online and the content of their conversation. Employee Monitoring Pro even takes screen snapshots periodically like a surveillance camera aiming at their computers. You can either receive log reports remotely from or check logs directly on their PCs.
  • This password protection software protects access to selected websites on your PC. You do not have to have webmater type access to the web server. All you have to do is to select an access password and type in URLs or domain name that you would like to protect. This software can password protect access to ANY website on your computer. When installed on the PC, IEProtect checks if a URL that is about to be visited is on the protected list. If yes, it displays a password prompt, if not it seemlesly continues browsing. As an additional security measure the software has its own access password and uninstall password protection features. Two operation modes allow IEProtect to work for all users of the computer, or currently logged on user only.
  • Computer Spy Software monitors others' PC usage when you're away. It secretly logs all keystokes, online chats, instant messages, emails, web sites visited, applications run and more. It is a great tool to monitor activities about MSN Messenger, Yahoo! Messenger, ICQ, Skype, AIM, MySpace, Facebook, etc. Computer Spy Software takes screenshots like a spy camera. You can receive reports remotely via emails.
  • Power PC Keylogger spy software can secretly record all keystrokes typed on your computer. It runs completely invisiblely. You can check log reports by simply receiving emails or opening a web page. Power PC Keylogger is perfect for catching cheaters, monitoring employees, children or spouse, acquiring others' passwords and even investigating crimes. Use hotkey to unhide it from Stealth Mode and protect the program access by password.
  • MSN Messenger Spy secretly records all MSN Messenger, Windows Live Messenger and Windows Messenger's incoming and outgoing chat text messages. MSN Messenger Spy runs in a complete invisible mode. You can check all recorded messages by simply receiving emails or opening a web page. MSN Messenger Spy is perfect for catching cheaters, monitoring employees, children or spouse msn chats, and even investigating crimes.
  • Family Password Manager is a brilliant new password management program from Family Software Solutions. Never forget a password ever again, our secure program keeps all of your passwords in one handy location. Program updates are free of charge for the life of the program.
  • Advance key logger application software developed to captures all keystrokes activities of your laptop including clipboard content, sound files, screenshots, voice chat conversation, internet cookies, browsed web pages, send or composed emails and active or inactive Windows applications. Invisible key logger program captures Windows screenshots at regular time interval. Advance keylogger operation is easy, safe to use and professional program that monitors overall activities of your computer to any user including system and internet activities. Invisible keylogger utility provides option to deliver log files to specified email address or upload using FTP settings. Advance keylogger tool is password protected application that helps in restricting unauthorized users to modify log files or change any software/system settings. Advance keylogger application totally hidden from start menu, task manager, add/remove program and system installation files. Invisible keylogger operation provides option to generate log f ...
  • Data eraser software permanently deletes temporary files folders remove internet history address bar URL records from hard disk removable media. Data wiping utility wipes files and unused disk space using various disk-erasing algorithms that cannot be recovered by any recovery software. Data Wiper Software does not require any technical skills to operate it. Hard Disk Data Wiper can erases deleted files and disk drives, unused disk space so your data can never be accessed or recovered. It can remove all deleted confidential files. Data wiper software keeps privacy of confidential private data files and recovers unused disk space easily. Data wiper software permanently wiping tools Features ? Secure Data Wiper support all type of removable media including Pen drive, Memory card and other USB supported flash drives. ? Data Cleaner Software delete and wipe most recently used application of Microsoft word, Power point, Excel, Access data records and other. ? Data wiper tool completely wipes entire unused d ...

Page 24 of 30
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30


Legal disclaimer | Privacy policy

© 2004-2014 IT Shareware