Home | Submit a file  |  New  |  Categories  |  Our awards  |  Link to us  |  RSS Feeds

Utilities :: Security & Encryption
Sort by: date | product title | rating | downloads | popularity
Display: short descriptions | full descriptions
  • Real Internet Spy software is a smart computer surveillance software that lets you know exactly what people do on a PC. It secretly records all PC and internet activity, including typed keystrokes (keylogger), chats & IMs, emails read, web sites visited, Facebook use, twitter, Google Talk, webmail, PC games, online shopping and searches, video talk, documents opened, clipboard text and more. Automatically sends logs to your email or ftp.
  • Spy Camera Software secretly logs all their Facebook activity, chats & IMs, emails, web visits, web cam images, applications use, documents opend, online searches, user names and passwords. Logs will be sent to your email and you can check it no matter where you are. It runs secretly with Windows startup. Users won't know it is running. However, the software's administrator can bring it back with hotkey and change settings or check logs.
  • Lock your desktop with one mouse and prevent anyone from accessing your programs and your importand data, no one can access your locked desktop without the valid password, mte desktop locker provide the following features: - lock your desktop with virtual desktop, - you must enter valid password to access the desktop, - show custom alert to any one try access your locked desktop, - you can select from many virtual desktop lockers, - mte desktop locker prevent access to task manager program in the locker mode, - mte desktop locker prevent access to the following keys: (CTRL+ALt+Del), (Alt+F4) to prevent closing the application, - you can lock your desktop with transparent desktop locker, - mte desktop locker provide log feature that enable you record all mouse clicks and invalid passwords input to know if someone try to open your protected desktop, - program allows you to set password to protect the options dialog for more security, - you can set the program to run at windows startup, - program allows you to p ...
  • PC Spy Monitor secretly monitors Facebook, chats, emails, keystrokes, passwords and sends reports to your email or ftp. It logs Windows Live Messenger, Skype, Yahoo Messenger and other IMs. It also takes photo shots of online video talk like a surveillance camera. PC Spy Monitor runs so stealthily that the monitored user won't even know it. You can use hotkey to unhide it and change settings. It is a must have tool for you to reveal the
  • Highly recommended Free Keylogger software available at www.freekeylogger.in secretly captures and record all system activities performed on the user computer in his absence by any outside user which may include employees, kids, family members, spouse, colleagues, friends etc. Technically sound advanced keylogger utility allows user to set hot keys or run commands to access the software settings while running in invisible mode and hence restrict unauthorized users from accessing the software settings and log reports. Simple to understand key logger application aid in secret monitoring of employees activities on computer during office hours. Hidden keylogger program allows parents to keep a secret eye on kids system and internet activities including websites accessed, applications run, searches made, online chats etc behind their back and allow them to protect kids from online threats. Professionally developed keylogger software allows you to keep a check on your spouse activities on the computer behind your b ...
  • The generation of cryptographic keys and certificate requests X.509, and other service functions associated with the formation and maintenance of key systems of the carriers in PKI (Public Key Infrastructure - PKI), supporting secure applications built on the basis 2-keys cryptographic algorithms. Support: GOST R34.10-2001, RSA, DSA, eToken, Rutoken EDS, KRYPTON, Accord-AMDZ, Sobol...
  • Power Spy software secrectly logs Facebook use, keystrokes, website visits, emails, chats and IMs: Skype, Windows Live Messenger (MSN), Yahoo Messenger and more. Takes screen snapshots at every X seconds like a surveillance camera. Displays exact activities, like Facebook, PC games, online searches & shopping, file transfers and webmails. You can receive reports remotely via emails or ftp. Perfect for monitoring kids, spouse and employe
  • Power PC Keylogger secretly logs Facebook, keystrokes, chats, IMs, emails, websites visited, microphone, video talk, logins, passwords, applications, searches, documents and more. Logs Skype, Yahoo Messenger, MSN, ICQ, AIM, etc. Takes screenshots every x seconds like a spy cam. Sends logs to your email. You can check logs on a remote PC, tablet, smart phone, or directly on the monitored PC. Perfect for monitoring employees, kids and spous
  • Sentry locks down your computer on demand so it stays secure when you aren't using it. No other programs can be opened, no browser history snooped at, and nobody will be touching your files while you're gone. Sentry even takes messages from people who dropped by while you were away. The program appearance is customizable, and can be quickly deployed to a USB flashdrive, floppy disk, or CD to quickly lock any public workstation you may use.
  • Plato Safe Password Manager is and easy-to-use password manager for Windows to store your passwords in a highly encrypted database, need not to remember many passwords.
  • Power Spy for Home secretly logs Facebook, keystrokes, chats, IMs, emails, websites visited, microphone, video talk, logins, passwords, applications, searches, documents and more. Logs Skype, Yahoo Messenger, MSN, ICQ, AIM, etc. Takes screenshots every x seconds like a spy cam. Sends logs to your email. You can check logs on a remote PC, tablet, smart phone, or directly on the monitored PC. Perfect for monitoring employees, kids and spous
  • 360 Spy Software secretly logs Facebook, keystrokes, chats, IMs, emails, websites visited, microphone, video talk, logins, passwords, applications, searches, documents and more. Logs Skype, Yahoo Messenger, MSN, ICQ, AIM, etc. Takes screenshots every x seconds like a spy cam. Sends logs to your email. You can check logs on a remote PC, tablet, smart phone, or directly on the monitored PC. Perfect for monitoring employees, kids and spouse.
  • SpyPal PC Spy secrectly logs Facebook activities, keystrokes, websites visited, emails, Windows Live Messenger (MSN), Yahoo Messenger, Skype, clipboard, user names, passwords, applications run and more. In Stealth Mode, it is completely invisible to computer users. You can use hotkey and password to access the program. Automatically sends logs to a preset email or ftp. Possible usages: monitors employees, children, spouse and investigat
  • Keylogger Spy Software secretly logs Facebook, keystrokes, chats, IMs, emails, websites visited, microphone, video talk, logins, passwords, applications, searches, documents and more. Logs Skype, Yahoo Messenger, MSN, ICQ, AIM, etc. Takes screenshots every x seconds like a spy cam. Sends logs to your email. You can check logs on a remote PC, tablet, smart phone, or directly on the monitored PC. Perfect for monitoring employees, kids and s
  • Facebook Activity Spy secrectly logs all Facebook use, keystrokes, web visits, emails, chats & IMs: Windows Live Messenger, Yahoo Messenger, Skype and other IMs. It logs applications, documents, clipboard, user names, passwords, video talk, video played and more. It also takes screenshots at every X seconds like a surveillance camera. It runs invisibly so that monitored users won't know it. You can receive log reports remotely via email
  • USB Lock can password protect any portable drives including USB drives, external drives and even memory cards. No administrative rights or installation required. You can take your USB drive anywhere without fear of data leak or data theft, even if your USB drive is stolen or lost. USB Lock is a very important application for people who keep private or restricted data on portable devices.
  • Technically advanced key logger application facilitates users to conveniently capture entire external user computer system performed activities including typed each and every keystrokes (like pressed username, password, created Microsoft word files, excel spread sheets, presentation files, text files and others), clipboard content (including cut, copy, paste action etc), accessed documents and many others. PC data manager software offer users to record unauthorized user internet activities such as online chat conversation by using numerous service providers including (Google mail, yahoo messenger, Orkut, MSN messenger, Face book, AIM, Rediffmail, Bing, AOL chat room, hi5, ICQ chats, MySpace etc), voice chat conversation, send or received instant messages, search engine search, online played games, composed emails, downloaded items, visited web pages, opened websites and many others. GUI wizard feature allows users to friendly work with www.keyloggers.in without taking any special technical knowledge or exper ...
  • Keylogger secretly logs all Facebook use, keystrokes, chats & IMs, emails, web visits, video talk, microphone, user names, passwords, searches and more. It records instant messenger, such as Skype, Windows Live Messenger, Yahoo Messenger, ICQ and others. It takes screenshots like a surveillance camera. Runs silently and monitored users won't know it. Log reports will be sent to you via email or ftp.
  • Leawo SWF Encrypt is a professional SWF Protector designed to protect Flash SWF files from being decompiled by SWF decompilers or Flash Decompiler tools. With Advanced Obfuscation Techniques and proven Encryption Technology, Leawo SWF Encrypt could act as an ActionScript Obfuscator to obfuscate the ActionScript of your SWF flash files so as to secure and protect SWF ActionScript files, and prevent from SWF Reverse Engineering and Decompiling.
  • Simple application that prevents launch of any processes that you specify. It can be used, for example, in order that the children could not play games in your absence. You can register in the autorun, it will run in stealth mode, call using hot key Ctrl-Shift-F5. You can use it for free.
  • DISKExtinguisher totally eliminates confidential information. Sensitive data removal is crucial when selling, donating or discarding computers. Data such as passwords, credit card numbers, trade secrets, customer information, tax records and more could be exploited. The unique BIOS technology will completely destroy deleted data and file fragments.
  • FILExtinguisher securely deletes all confidential information. You can securely erase passwords, credit card numbers, customer information, tax records and other types of sensitive data. This software offers different 14 delete methods that vary from a fast zero-write to an extremely high security NATO level. Upon completion a certificate is created as a printable log file that displays deleted files, delete dates and method used.
  • Hibosoft BossComing Boss Key is a professional and reliable application designed to protect your privacy and hide sensitive information. It is a powerful, intuitive and easy to use boss key application based on virtual desktop techniques. Hibosoft BossComing Boss Key can hide window, protect your privacy and hide sensitive information from prying eyes in seconds.
  • TCP Port scanner Multi threaded with possibility to scan 65535 TCP ports on an IP address. You can specify how many threads to run and the timeout. Further more it will tell you the MAC address of the target and the service running. For LINUX, Windows and Mac OS X.
  • Netbios Share Scanner is a free network share scanner from SecPoint, one of the leading producers of IT security software. In this day and age when hackers are a constant threat to a business's web servers, it is more important than ever to frequently test IT systems for security vulnerabilities. Netbios Share Scanner is a user-friendly and effective solution for both Linux and Windows.

Page 22 of 30
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30


Legal disclaimer | Privacy policy

© 2004-2014 IT Shareware