Home | Submit a file  |  New  |  Categories  |  Our awards  |  Link to us  |  RSS Feeds

Utilities :: Security & Encryption
Sort by: date | product title | rating | downloads | popularity
Display: short descriptions | full descriptions
  • Extract and analyze digital evidence. The Enterprise edition of Belkasoft Evidence Center enables team work with full collaboration support, adding user and permission management to the already impressive list of features. Extracting more than 250 types of artifacts, the tool scans hard drives and analyzes page files, hibernation files and live memory dumps for IM and social communications, Web browsing activities, documents and emails.
  • Forensic Studio Ultimate extracts more types of digital evidence from suspects' hard drives than ever, speeding up investigations by creating still presentations of lengthy videos. In addition to Web browsing data including favorites, history and cookies, instant messenger communications, chats and office documents, Forensic Studio Ultimate can analyze pictures and videos, detecting files that contain pornography, human faces or scanned documents
  • A must have windows security software for information security professionals to conduct in-depth security auditing and risk assessments of network-based windows systems. Regulatory compliance and the latest network auditing tools, all come as a package with this computer security software.
  • State of the art software for risk assessment and management, it conducts security audit and security assessment for SQL database security within minutes, by using the most comprehensive SQL database security regulatory compliance tools
  • Anti-virus, anti-spyware, firewall, anti-spam for robust proactive protection. Powerful malware prevention and web control tools deliver comprehensive PC security for individuals and families. New version 7.5 - Performance Edition has lower resource consumption and is enhanced with SmartDecision technology, SmartScan 4 technology, improved anti-malware engine, clipboard and screen protection, USB virus protection, PDF filtering, and more.
  • Secure PC connections, identity leak prevention and safe online transactions. Protection for your OS, applications, files, and folders against hackers, malicious programs, viruses with the two-way inbound and outbound system and application firewall. Proactive protection with enhanced web control keeps your sensitive information secure and safe. The program activity tracker lets you review system modifications in real time.
  • Secure Oracle Auditor (SOA) the most comprehensive Risk Management Software for Oracle database security which conducts vulnerability assessments and security auditing within minutes, which is capable of scanning multiple Oracle database servers. This Oracle security software provides Oracle audit tools, Oracle password tools, database scanner software.
  • The most advanced network security software in its domain which conducts security assessments and security auditing on Cisco firewalls, routers, and switches. This is accompanied with the most up-to-date Cisco auditing tools; it also helps in achieving network security regulatory compliance.
  • Keylogger Spy Monitor spy software can secretly record all keystrokes typed on your computer. It runs completely invisiblely. You can check logging reports by simply receiving emails or opening a web page. Perfect for catching cheaters, m onitoring employees, children or spouse, acquiring others' passwords and even investigating crimes. Use hotkey to unhide it from Stealth Mode and protect the program access by password.
  • Skype Spy Monitor secretly record Skype's incoming and outgoing chat messages. It runs completely invisibly so that Skype users won't know its existence. Skype Spy Monitor send log reports to your email or ftp periodically. You can also check logs directly on the monitored PC. It is a small but powerful program that consumes very little system resource. Perfect for monitoring employees, children or spouse, and even investigating crimes.
  • Memo Password is a simple, tiny but powerful tool useful for storing and easily retrieve your passwords. Feel free to use different passwords for each service you use with your computer (e-mail accounts, online registrations, Windows logon, ...). You only have to remember one single master password that will secure all other passwords.
  • Yahoo Messenger Spy Monitor secretly records all Yahoo Messenger incoming and outgoing instant messages. It sends logs to your custom email or ftp. You can check all records by simply receiving emails or opening a web page. Use hotkey to unhide it from the Stealth Mode and protect program access by password. Perfect for catching cheaters, monitoring employees, children or spouse, and even investigating crimes.
  • SHA1 Checker by Ice Nebula calculates an MD5 or SHA1 checksum to validate that a file downloaded from the internet has not been tampered with. SHA1 Checker is fast and calculates hashes in a separate thread to handle large files.
  • PassBoom presents a completely free password generator for your computer. It creates easily memorable yet extremely secure and complex passwords which you can use for the online services and other password-protected features that you access. The software is extremely easy to use and, best of all; it is available completely free for both home and commercial use.
  • Easy Password Keeper is a simple yet handy piece of software that will help you create a database with all your passwords in order to have them all in one place. It protects your information using the reliable password-based encryption method. You'll only need to remember one master password that gives access to the database.
  • A VPN protects you by encrypting your internet traffic, making your online activities impossible to intercept by unwanted third parties. Once connected to any of our servers, you become masked behind an anonymous IP address. Bart VPN gives you the option to automatically encrypt selected applications on your computer, it will also connect to the best server available in your location. It's simply the ultimate gateway to internet freedom.
  • Many people believe that passwords are all that's needed to keep pirating eyes away from the data stored on their computers. But if that were true, there'd be no such thing as a "hacker." While passwords are certainly helpful, it takes a lot more than that to protect the information on your computer. With malicious malware products lurking about on the Internet, it's worth having extra layers of data security on your side. Sometimes an innocent-looking website can be a hacker in disguise. Nosey coworkers, bosses, friends, and even spouses can also pose a threat to our privacy. With A+ Folder Locker, you can store files, folders, drives, and even complete software programs in special data storage "lockers." Not only do these lockers keep the names of the files and folders you store in them from being viewed, the robust level of security of the lockers make them virtually impossible to break into. A+ Folder Locker also includes a variety ...
  • SpyKing Keylogger Spy secretly logs Facebook, keystrokes, chats, emails, website visits, applications, video chat, user names, passwords and more. It delivers log reports to your specified email or ftp and lets you know exactly what they do when you are away. SpyKing Keylogger Spy is very useful for parental control, catching a cheater and office monitoring. It is an easy-to-use yet powerful tool for long term monitoring.
  • SpyKing Invisible Spy software secretly logs Facebook activities, keystrokes, chats, emails, web sites, Microphone, PC games, online searches, shopping records, webmails, documents opened, user names, passwords and more. It takes screenshots like a hidden surveillance camera. SpyKing Invisible Spy is completely invisible to computer users. People won't know its existence. You can receive reports remotely via emails or ftp like every 60 minutes.
  • SpyKing PC Spy secretly logs all Facebook use, keystrokes, chats & IMs, emails, web sites, user names, passwords, web cam images, apps, clipboard and more. It supports Skype, Windows Live Messenger, Yahoo Messenger and others. It also takes screenshots like a surveillance camera. You can receive reports remotely via email or ftp as often as you wish. Open these reports on another PC or on your cell phone browser.
  • These days, everyone has many different passwords, to login to a messenger or an e-mail account, security codes for online banking, PINs for his telephone and so on. 1-abc.net Password Organizer allows you to organize all your passwords and login data, you only have to remember your master password. Additionally, it offers many useful functions concerning secure password management, a random password generator, own encryption engine, txt export..
  • Eusing Maze Lock uses a pattern based technique to lock your computer. You need first to set your own unlock pattern by connecting some of the nine dots together or keep the default unlock pattern. The next time you need to unlock the pc, the pattern and image must be entered correctly. It can lock your computer with a single click on the tray icon or using a custom hotkey. It can change the lock screen background image, the pattern size etc.
  • Passwords can be trouble especially on the Internet. You may have too many to remember and if you don't take care someone else will gain access to them! ID_Bank can help solve your problem. ID_Bank is a secure identity and password protection system ID_Bank is able to hold your personal information relating to usernames, passwords, pins, login details etc; information in a secure encrypted file.
  • Pro-Key-Lock allows the user to lock specific keyboard and mouse buttons. You can use pro-key-lock to lock specific keys like the function keys, the caps-lock key, the windows (start) key or key combinations like Alt-Tab, etc. You can also lock specific mouse functions like the right click or the double click. The user can also define a rectangle on the screen and instruct Pro-Key-Lock to enable mouse clicks only inside/outside this rectangle.
  • GateWall DNS Filter allows ultimate control of your Internet usage without the need for any additional software, proxy servers or hardware solutions in your corporate network. This utility will help you make your corporate Internet safer, minimize unwanted traffic and increase the performance of your Internet users.

Page 22 of 30
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30


Legal disclaimer | Privacy policy

© 2004-2016 IT Shareware