Home | Submit a file  |  New  |  Categories  |  Our awards  |  Link to us  |  RSS Feeds

Utilities :: Security & Encryption
Sort by: date | product title | rating | downloads | popularity
Display: short descriptions | full descriptions
  • Use a physical USB device to lock your computer instead of a password. Because each USB device is different, you can see your thumb-drive as a unique car key. Insert a flash drive into your computer, start this software, then remove the USB and the PC will automatically lock until you put it back in.
  • Power Spy software secrectly logs Facebook use, keystrokes, website visits, emails, chats and IMs: Skype, Windows Live Messenger (MSN), Yahoo Messenger and more. Takes screen snapshots at every X seconds like a surveillance camera. Displays exact activities, like Facebook, PC games, online searches & shopping, file transfers and webmails. You can receive reports remotely via emails or ftp. Perfect for monitoring kids, spouse and employe
  • Protect PDF copying software secures PDF with user password as well as owner password. Download free evaluation version of PDF encryption program to lock PDF document. Protecting PDF with open password ensures that only intended recipients will be able to open and view PDF files. Securing PDF with owner password ensures that only allowed permissions will be accessed by the user. PDF password encryptor tool works as file protector and restrictor utility which allow security encryption. PDF protector tool restrict permission such as PDF printing, content copying, form filling, document modifying, page extraction, commenting, signing and copying content for accessibility. If you know more knowledge to this software go link www.unprotectpdf.com to read and download trail version of software. Encrypt PDF content stream with strong RC4 40 bits & 128 bits and AES 128 bits strength security level. Software runs on several windows operating system such as Win2000, Win7 x32, Win7 x64, Win98, Win Vista, Win Vista x6 ...
  • Vyapin NTFS Security Auditor is a powerful reporting solution for auditing NTFS security across your entire Windows network. NTFS Security Auditor provides answers to important questions about the security and health of File systems in your servers and workstations. NTFS Security Auditor you can perform a complete security scan of Shares, Folders and Files present in your network. You can perform an automated inventory of permissions on Folders and Files at regular intervals and keep a constant watch on the health of your NTFS security. Our solution provides a variety of audit reports that are simple, elegant and highly customizable for System Administrators, IT infrastructure Managers and Systems Audit personnel to use and act on. There are several powerful, ready-to-use reports that assist in both Management reporting and Compliance reporting requirements such as SOX and HIPAA. Vyapin?s NTFS Security Auditor serves your needs of administrative tasks as well as complex data preparation tasks for assisting ...
  • SpyPal Remote Spy secrectly records keystrokes, screenshots, websites visited, windows opened, applications, MSN, ICQ, AIM, Yahoo! IM, Skype, clipboard, passwords, emails, documents and more. In Stealth Mode, it is completely invisible to computer users. Use hotkey and password to access the program. Auto send logs to a preset email or ftp at set interval. Usages: monitors employees, children, spouse and investigate crimes.
  • With Children Monitoring Spy you can log chat conversations, emails, the sites someone visited, MySpace, Facebook etc. By activating Children Monitoring Spy, you can monitor everything. Children Monitoring Spy allows you to register all keystrokes typed including language-specific characters, talk and messages conversations, passwords, e-mails, clipboard information, screenshots capturing, desktop and Internet activity.
  • SpyPal For Office secrectly records keystrokes, screenshots, websites visited, windows opened, applications, MSN, ICQ, AIM, Yahoo! IM, Skype, clipboard, passwords, emails, documents and more. In Stealth Mode, it is completely invisible to computer users. Use hotkey and password to access the program. Auto send logs to a preset email or ftp at set interval. Possible usages: monitors employees, children, spouse and investigate crimes.
  • PCBooster Free App Lock enables you to lock any applications or programs instantly. You can use your own password to block others using your apps. Once locked, the person trying to access your programs need the correct password to unlock it; or else they will stay inaccessible. PCBooster Free App Lock allows locking as many programs as you want.
  • Keylogger Spy Monitor spy software can secretly record all keystrokes typed on your computer. It runs completely invisiblely. You can check logging reports by simply receiving emails or opening a web page. Perfect for catching cheaters, m onitoring employees, children or spouse, acquiring others' passwords and even investigating crimes. Use hotkey to unhide it from Stealth Mode and protect the program access by password.
  • Keystroke recording application monitors activity perform by kids like typed URL, chatting text, distinct files and programs usage and record them for parent. Key logger Software help user to records action perform on their computer in their absence like customize system settings, changes to files, transferring data to USB device and etc. Advance spyware application is compatible with recent windows versions as windows vista, windows XP, 7 and distinct others. Keystroke capture application records internet usage, typed URL and searching keywords perform by user using your laptop. Monitoring Software is needed to records activity perform and also provides user friendly interface to driven this tool to view every usage perform on it. Computer activity recording application is design to capture activities on network, website URL, clipboard content and composed e-mail by user. Internet activity monitoring application has ability to records web activity while working in hidden mode without being observed by user o ...
  • See what happens on your PC when you're away. Protect your kids or catch cheating spouses by logging chats and instant messenger conversations. Email or FTP the results automatically to anywhere in the world. Active Key Logger Pro is user-friendly and designed to be conveniently used at home allowing you to see typical user activities such as chats and instant messages sent or received in AOL AIM, ICQ, MSN and Yahoo messengers.
  • A very easy to use password and link manager that encrypts your information! Save your favorite site and usernames and passwords and protect them with a single password. The program includes a button that launches your browser & goes to your link automatically. At that time it also copies your username to the Windows clipboard so you can copy/paste it into the site you are visiting.
  • Cheater-Catcher is a professional product that makes it easy to catch the cheaters. With Cheater-Catcher you can find out who your spouse is instant messaging, what he or she is writing in e-mails, and which websites he or she is visiting. Cheater-Catcher is the easiest and most cost effective way to put an end to the nightmare of suspicion and doubt caused by the infidelity of a cheating spouse or of a sexually active teen.
  • PC James Bond 007 secrectly monitor employees, spouse and children's activities on their PCs. It logs chats, emails, keystrokes,websites, passwords and even takes screenshots like a spy camera. Receive log reports remotely via emails or open a web page. This software is a great tool to protect your family or enhance the efficiency of your company.
  • SpyPal Keylogger Spy software can secretly record all keystrokes typed on your computer. This may include chats, emails, user names, passwords, online searches, myspace, facebook activities and more.It runs in a complete invisible mode. You can check logging reports by simply receiving emails or opening a web page.Perfect for catching cheaters, monitoring employees, children or spouse.
  • Invisible Spy Software, keylogger, email and messenger spy software. It records all keystrokes typed, MSN Messenger, Windows Live Messenger, ICQ messenger, AIM, Yahoo! Messenger, Windows Messenger and Skype's chat text, websites visited, emails read, documents opened, windows opened, clipboard activaties, passwords typed and applications executed. Invisible Spy Software even takes screen snapshots at your set interval.
  • Clear Blue Security is a free full-featured endpoint security management suite that monitors, detects and reports endpoint security vulnerabilities, including the monitoring of installed malware applications, providing status on updates and patching, implementing a company wide security policy, monitoring installed but unapproved software, alerting suspicious and possibly malicious traffic and scanning network facing IPs for unwanted open ports.
  • Member Track makes it easy for you to register, badge and track your members. Register members and capture their photo. Fingerprint and signature scanning are also options. Design and print plastic membership cards or issue temporary paper passes using the included industry-leading ID Flow badge design software. Check in and record entrance using networked check in stations or handheld scanners. See the member's record for verification.
  • SpyPal Invisible Spy secrectly records keystrokes, screenshots, websites visited, windows opened, applications, MSN, ICQ, AIM, Yahoo! IM, Skype, clipboard, passwords, emails, documents and more. In Stealth Mode, it is completely invisible to computer users. Use hotkey and password to access the program. Auto send logs to a preset email or ftp at set interval. Usages: monitors employees, children, spouse and investigate crimes.
  • Active Directory Change Tracker, a powerful tool to track, analyze, and report all changes made to your AD configuration. Active Directory Change Tracker audits all changes made to your Active Directory by periodically collecting only the changed data, reporting what exactly changed, along with the new and old values, when the change was made, where the change happened in your Active Directory. Active Directory Change Tracker also determines who made the change by looking up the Security Event logs of your audit-enabled Active Directory. Active Directory Change Tracker may be configured to work with or without the native Auditing capabilities of Active Directory. You can use the tool to track and audit AD configuration changes on what exactly changed even without using the native auditing of AD. You can additionally combine the tool with the default native auditing of AD to capture Security event log audit records of changes from all domain controllers in your domain (since event log data is not repli ...
  • MSN Spy Monitor secretly logs all MSN Messenger / Windows Live Messenger's incoming and outgoing chat text messages. Takes screen snapshots of MSN Messenger video chats every X seconds. It runs in a complete invisible mode. You can check all recorded messages by simply receiving emails or opening a web page. Perfect for catching cheaters, monitoring employees, children or spouse, and even investigating crimes.
  • SpyPal Invisible Spy secrectly records keystrokes, screenshots, websites visited, windows opened, applications, MSN, ICQ, AIM, Yahoo! IM, Skype, clipboard, passwords, emails, documents and more. In Stealth Mode, it is completely invisible to computer users. Use hotkey and password to access the program. Auto send logs to a preset email or ftp at set interval. Usages: monitors employees, children, spouse and investigate crimes.
  • Facebook Password Keylogger secrectly logs all keystrokes, web visits, emails, chats & IMs: MSN Messenger, Windows Live Messenger, ICQ, AOL/AIM, Yahoo! Messenger and Skype. Facebook Password Keylogger displays exact activities, like MySpace, Facebook, PC games, online searches & shopping, file transfers and webmails. It takes screenshots every X seconds like a spy cam. You can receive reports remotely via emails or ftp.
  • Mini Key Log makes it possible for you to record user activities unnoticed. The monitoring is completely invisible and easy to use. Following activities are recorded: Keystrokes; Password inputs; Mouse clicks; File operations; Printer; Scanner; Modem; Removable media; Power state; Visited web sides; Screenshots; User login; Clipboard.
  • RememberMe is a free password manager that securely stores your passwords using 128-bit AES encryption and a password protected, encrypted database to ensure you are the only user that can access your passwords. It allows you to create custom categories and multiple profiles for better organization.

Page 22 of 30
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30


Legal disclaimer | Privacy policy

© 2004-2015 IT Shareware