Home | Submit a file  |  New  |  Categories  |  Our awards  |  Link to us  |  RSS Feeds

Utilities :: Security & Encryption
Sort by: date | product title | rating | downloads | popularity
Display: short descriptions | full descriptions
  • The Restrict PDF Software is the best option to Disable PDF Printing, Editing, Modifying, Copying, Extracting, etc. With Disable PDF Printing program users can secure, prevent, protect PDF files from being printed with a few clicks of mouse. The Disable PDF Printing not just allows you to add printing restriction on PDF it is also allows you to add copying, editing, modifying restriction on PDF documents.
  • www.usbsquad.com enable users to prominently capture overall information including USB removable mass storage devices plug in and plug out activities done on client machine even network cable on machine is unplugged or network connection is accidentally broken. Highly interactive USB Port Blocker utility allow users to save record entire client machine information at user defined location in computer system or laptop for future reference and can be viewed by them whenever required. Graphical user interface facilitates users with advanced feature to frequently work with USB data protection tool for windows network without having any specialized technical knowledge or professionally expert guidance for operating. USB device activity monitoring software is available with enhanced feature it informs server with beep alert when any removable media device is inserted or removed to client machine. USB device activity monitoring Application for Windows network is beneficial for different sectors including software co ...
  • StaffCop allows you to efficiently monitor your employees' activities during their work time: monitor in real time (acquire screenshots, list of currently running applications and open web sites). The program allows generating miscellaneous reports on employees' activities for any particular time span. Based on these reports you can optimize work schedule for a single specialist, department or the entire company.
  • EBook protection software can lock multiple PDF documents with owner and user password encryption. Owner password is used to prevent accessing of document features like printing, copying, modifying, commenting, signing, extracting images, assembling and copying content for accessibility and user password is used to block opening of PDF documents. It works on all Windows 32 bit and 64 bit operating system like XP, Vista and 7.
  • jiji self service password resetl,In this the end-users can securely reset their own Active Directory passwords without having to involve highly technical helpdesk professionals. Gartner states that 30% of helpdesk queries are related to password resets management and account lockout. With Self Service Password Reset end-users no longer have to wait for a member of the helpdesk staff to reset their forgotten or lost password
  • SpyPal Facebook Spy is a Facebook activity monitoring and parental control software. It secretly records PC users' Facebook private profile, emails, chats & IMs, photos, interests, contatcts and events by taking screen snapshots periodically. It also records popular Facebook instant messenging clients and Facebook related web sites and searches. See exactly what users were doing just like watching a surveillance video playback.
  • Password Box is one of the best password managers and private information to keep you safe. It is easy to use and yet powerful multipurpose program allows users to create their own arbitrary number of categories and fields that can be flexibly configured to fit your goals. This approach provides new ways to store and organize information. Password Box allows you to store all the important information in one file, which is securely encrypted.
  • Smart Protector is an easy to use software, that completely erases history, cookies, temporary files(cache), typed URLs(the drop down address list), AutoComplete, recent document list, recycle bin and more. It allows you to choose which of these items to clear and which to keep. Other features: Cookie Manager; Save/Restore State; Scheduling; Stealth mode; Emergency Key; Deleting of custom files and folders; Recent Program Files.
  • Remo File Eraser a secure data eraser application, which erases important and confidential files / folders beyond recovery. The software is also capable of wiping free disk space to erase deleted data using various shredding patterns leaving no traces of critical data. Superior drive wipe feature facilitates you to wipe entire hard drive permanently.
  • SpyPal Keylogger Spy software can secretly record all keystrokes typed on your computer. This may include chats, emails, user names, passwords, online searches, myspace, facebook activities and more.It runs in a complete invisible mode. You can check logging reports by simply receiving emails or opening a web page.Perfect for catching cheaters, monitoring employees, children or spouse.
  • Gecko Computer Monitoring Software is the complete solution to monitoring everything that happens on your computer while you're away. Perfect for parents who want to monitor their childs computer or bosses who want to monitor their employees computers - Gecko Monitor has everything you'll need to give you peace of mind by monitoring screenshots, keystrokes, websites, applications, documents, printers and more.
  • Power Spy secretly logs Facebook use, keystrokes, chats, emails, web sites, web cam images, user names, passwords, applications excuted and more. It records IMs in Windows Live Messenger, Skype, Yahoo Messenger, ICQ and others. Power Spy runs silently with system startup and automatically sends log reports to your email or ftp. Easy to install and setup. It is widely used in offices, homes, schools, detective agencies and police departm
  • The notes nsf local security software enables the user to access that NSF database which is under local security. That is, by using the notes nsf local security removal tool the user can remove local security which is set on the NSF database. It is susceptible of handling the numerous error messages which the user face while accessing the unauthorized NSF database such as "You are not authorized to access that database" and "You are not authorized to perform that operation". Despite of having such a wondrous capability to solve such complicated errors, this software is extremely simple to use and does not require much technical efficiency to get operated by the user. Moreover, it provides quick access to the NSF database and is available at a really affordable price. Furthermore, the notes nsf local security removal tool is compatible to use with almost all versions of Lotus notes. For more information please visit www.nucleusdatarecovery.org
  • PC Spy Software logs all Facebook, PC & internet activity and emails log reports to you. PC Spy Software logs all keystrokes, chats & IMs, emails, websites visited, applications, usernames, passwords, documents opened, online searches, microphone sound and more. It takes screenshots like a spy cam. PC Spy Software runs invisibly and PC users won't know its existence. Great for monitoring employees, children, spouse and investigating crime
  • Parental Spy Software secretly logs all Facebook, keystrokes, chats, emails, web visits, microphone, web cam images, videos played, PC games, user names, passwords, applications, documents, clipboard and more. It records Windows Live Messenger, Skype, Yahoo Messenger, ICQ and others. It also takes screenshots like a surveillance camera. You can receive log reports remotely via emails or ftp and check logs on another PC or your cell phone.
  • PC James Bond 007 secretly logs Facebook, keystrokes, chats, IMs, emails, websites visited, microphone, video talk, logins, passwords, applications, searches, documents and more. Logs Skype, Yahoo Messenger, MSN, ICQ, AIM, etc. Takes screenshots every x seconds like a spy cam. Sends logs to your email. You can check logs on a remote PC, tablet, smart phone, or directly on the monitored PC. Perfect for monitoring employees, kids and spouse
  • SpyPal Invisible Spy secrectly records Facebook, keystrokes, screenshots, websites visited, windows opened, applications, MSN, ICQ, AIM, Yahoo IM, Skype, clipboard, passwords, emails, documents and more. In Stealth Mode, it is completely invisible to computer users. Use hotkey and password to access the program. Auto send logs to a preset email or ftp at set interval. Usages: monitors employees, children, spouse and investigate crimes.
  • Web Cam Spy, invisible keylogger, email and messenger spy software. It records all keystrokes typed, MSN Messenger, Windows Live Messenger, ICQ messenger, AIM, Yahoo! Messenger, Windows Messenger and Skype's chats, websites visited, emails read, documents opened, windows opened, clipboard activaties, passwords typed and applications executed. It even takes screen snapshots like a surveillance camera.
  • Power Spy software secretly logs Facebook use, keystrokes, chats & IMs, emails, web visits, games, searches, shopping history, user names, passwords and more. It supports Windows Live Messenger, Yahoo Messenger, Skype, ICQ and more. It's invisible to monitored users. However, it is easy for you to unhide its interface with hotkeys. You can receive reports remotely via email or ftp. Perfect for monitoring employees, kids and spouse.
  • Children Monitoring Spy secrectly logs your kids' Facebook use, chats, website visits and web cam images. It also logs keystrokes typed on keyboard, including their user names and passwords. It records their Skype, Windows Live Messenger, Yahoo Messenger and other instant messengers. You can check logs on the monitored PC, or receive logs via email from your office PC or cell phone. It is a great tool for caring parents to proctect childr
  • Invisible Spy Software secretly logs Facebook, keystrokes, chats, IMs, emails, websites visited, microphone, video talk, logins, passwords, applications, searches, documents and more. Logs Skype, Yahoo Messenger, MSN, ICQ, AIM, etc. Takes screenshots every x seconds like a spy cam. Sends logs to your email. You can check logs on a remote PC, tablet, smart phone, or directly on the monitored PC. Perfect for monitoring employees, kids and s
  • SECUDRIVE Device Control Basic is the USB port security system that allows the administrator to disable USB drives connecting to the PC. It can also disable the connection of other devices such as IEEE1394, Bluetooth, CD/DVD-RW, and Serial/Parallel/IrDA ports. This program is the perfect solution to lock USB flash drives or any other devices connected to a PC without permission. Thus, eliminating every single route that can lead to data leakage.
  • SpyPal Remote Spy secrectly records Facebook use, keystrokes, screenshots, websites visited, applications,Windows Live Messenger, Yahoo Messenger, Skype, clipboard, passwords, emails, documents and more. In Stealth Mode, it is completely invisible to monitored users. You can use hotkey and password to access the program. It sends logs to a preset email or ftp at set interval. Usages: monitor employees, children, spouse and investigate c
  • Keystroke recording application monitors activity perform by kids like typed URL, chatting text, distinct files and programs usage and record them for parent. Key logger Software help user to records action perform on their computer in their absence like customize system settings, changes to files, transferring data to USB device and etc. Advance spyware application is compatible with recent windows versions as windows vista, windows XP, 7 and distinct others. Keystroke capture application records internet usage, typed URL and searching keywords perform by user using your laptop. Monitoring Software is needed to records activity perform and also provides user friendly interface to driven this tool to view every usage perform on it. Computer activity recording application is design to capture activities on network, website URL, clipboard content and composed e-mail by user. Internet activity monitoring application has ability to records web activity while working in hidden mode without being observed by user o ...
  • SpyPal Windows Spy secrectly records Facebook, keystrokes, websites visited, applications, Windows Live Messenger, ICQ, Yahoo Messenger, Skype, clipboard, passwords, emails, documents and more. In Stealth Mode, it is completely invisible to monitored users. Automatically sends logs to a preset email or ftp at set interval. Usages: monitors employees, children, spouse and investigate crimes.

Page 22 of 30
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30


Legal disclaimer | Privacy policy

© 2004-2015 IT Shareware