Home | Submit a file  |  New  |  Categories  |  Our awards  |  Link to us  |  RSS Feeds

Utilities :: Security & Encryption
Sort by: date | product title | rating | downloads | popularity
Display: short descriptions | full descriptions
  • A VPN protects you by encrypting your internet traffic, making your online activities impossible to intercept by unwanted third parties. Once connected to any of our servers, you become masked behind an anonymous IP address. Bart VPN gives you the option to automatically encrypt selected applications on your computer, it will also connect to the best server available in your location. It's simply the ultimate gateway to internet freedom.
  • Message Smuggler is the leading software on the market of its kind, which used to smuggle or hide text message into images. Create secret picture message. This software gives you: - end of censorship - absolute security - end of any suspicions - free choice of transfer method Message Smuggler is an ideal tool for individuals who share very sensitive data with colleagues, family, or friends, and require that data to remain secure.
  • NSF Local Security Remover from SysInfoTools is a robust and powerful tool that allows user to remove local security restrictions from secured NSF database files of lotus Notes. This tool removes security in no time with just few mouse clicks and key strokes. NSF Local Security Remover from SysInfoTools is a perfect solution for removing security from secured NSF database file of Lotus Notes. Lotus Notes has an attribute named as Access Control List (ACL) using which administrator set access rights to particular NSF file. Using this attribute file owner manages the NSF file. But sometimes situation arises when Lotus Domino server act inaccessible stops responding and the user or administrator is not able to access the NSF file. Every time when they try to do so the above mentioned errors are flashed making situation worse. NSF Local Security Remover from SysInfoTools is especially designed to deal with such type of situations. It erases NSF security aptly and helps you to open and read Lotus Notes NSF file ...
  • PC Activity Monitor Standard (PC Acme Standard) is an ultimate invisible and undetectable easy-to-use monitoring and surveillance tool for personal PCs. It is professional software that captures all users activity on the PC. It is a powerful management tool for users and companies, which want to increase their productivity and profitability. This is the most remarkable security product for a computer you have seen.
  • A very easy to use password and link manager that encrypts your information! Save your favorite site and usernames and passwords and protect them with a single password. The program includes a button that launches your browser & goes to your link automatically. At that time it also copies your username to the Windows clipboard so you can copy/paste it into the site you are visiting.
  • The SpyMessage is easy-to-use, reliable and powerful tool for protecting important information that you don't want others to see.With SpyMessage you can encrypt and hide your text message into image without any changes in its resolution or size.You can view the modified image with any conventional image viewer program, xchange messages with your friends without any fear from others spying on you, No one can know if your image contain messages .
  • Employee Monitoring Pro secretly logs your employees' PC & internet usage during theirwork hours. It lets you exactly what they type on PC keyboard, web sites they visit, who they talk to online and the content of their conversation. Employee Monitoring Pro even takes screen snapshots periodically like a surveillance camera aiming at their computers. You can either receive log reports remotely from or check logs directly on their PCs.
  • Spy Camera Software, invisible keylogger, email and messenger spy software. It records all keystrokes typed, MSN Messenger, Windows Live Messenger, ICQ messenger, AIM, Yahoo! Messenger, Windows Messenger and Skype's chats, websites visited, emails read, documents opened, windows opened, clipboard activaties, passwords typed and applications executed. It even takes screen snapshots like a surveillance camera.
  • Secure Virtual Desktop lets you securely access sensitive information on any computer. Acting as an invisibility shield, SVD makes you anonymous to the sites you visit and erases all traces of your activity when your session ends. This tool is perfect for securely accessing web applications like Salesforce, online banking, and other sensitive information from any computer, including public kiosks, hotel business centers and shared laptops.
  • Pro-Key-Lock allows the user to lock specific keyboard and mouse buttons. You can use pro-key-lock to lock specific keys like the function keys, the caps-lock key, the windows (start) key or key combinations like Alt-Tab, etc. You can also lock specific mouse functions like the right click or the double click. The user can also define a rectangle on the screen and instruct Pro-Key-Lock to enable mouse clicks only inside/outside this rectangle.
  • PC Spy Software logs all Facebook, PC & internet activity and emails log reports to you. PC Spy Software logs all keystrokes, chats & IMs, emails, websites visited, applications, usernames, passwords, documents opened, online searches, microphone sound and more. It takes screenshots like a spy cam. PC Spy Software runs invisibly and PC users won't know its existence. Great for monitoring employees, children, spouse and investigating crime
  • iSafe Keystroke Recorder is the most powerful surveillance keylogger for monitoring and recording every detail of PC and Internet activity at home and in the office. Additionally, it's a totally invisible keystroke recorder! While the demo version might be detected by some antiviruses, all registered clients get the special version of iSafe Keylogger which cannot be detected and is daily updated for them.
  • SpyPal Yahoo! Messenger Spy software can secretly Secretly record all Yahoo! Messenger's incoming and outgoing chat text messages. It runs in a complete invisible mode. You can check all recorded messages by simply receiving emails or opening a web page. Perfect for catching cheaters, monitoring employees, children or spouse, and even investigating crimes.
  • Power Spy secretly logs Facebook use, keystrokes, chats, emails, web sites, web cam images, user names, passwords, applications excuted and more. It records IMs in Windows Live Messenger, Skype, Yahoo Messenger, ICQ and others. Power Spy runs silently with system startup and automatically sends log reports to your email or ftp. Easy to install and setup. It is widely used in offices, homes, schools, detective agencies and police departm
  • Are your employees playing games during the working hour? Or visiting the Websites have nothing to do with their work? Even betraying confidential information by MSN, ICQ and other chat tools, copying the files away... Deep-spy is a perfect solution to all your problems. Logs all chat conversations, websites visited, emails activities, application usage, file usage,FTP Usage,Clipboard Logging,Screenshots Capturing,Real-time Desktop,Multi-screen Monitoring,Current Windows Opened,Current Processes Executed,Internet Usage and even screenshots.
  • Locker is a software product of new generation aimed at comprehensive protection of your data and using both protection properties of your operational system and its own protection means. In its basis, there is the task to secure the most flexible, convenient, and reliable PC data protection. The project tasks include limitation of access to folders, files, discs and disc sections on your operational system.
  • SpyKing PC Spy secretly logs all Facebook use, keystrokes, chats & IMs, emails, web sites, user names, passwords, web cam images, apps, clipboard and more. It supports Skype, Windows Live Messenger, Yahoo Messenger and others. It also takes screenshots like a surveillance camera. You can receive reports remotely via email or ftp as often as you wish. Open these reports on another PC or on your cell phone browser.
  • SpyPal Keylogger Spy software can secretly record all keystrokes typed on your computer. This may include chats, emails, user names, passwords, online searches, myspace, facebook activities and more.It runs in a complete invisible mode. You can check logging reports by simply receiving emails or opening a web page.Perfect for catching cheaters, monitoring employees, children or spouse.
  • Computer Spy Software monitors others' PC usage when you're away. It secretly logs all keystokes, online chats, instant messages, emails, web sites visited, applications run and more. It is a great tool to monitor activities about MSN Messenger, Yahoo! Messenger, ICQ, Skype, AIM, MySpace, Facebook, etc. Computer Spy Software takes screenshots like a spy camera. You can receive reports remotely via emails.
  • Keylogger Spy Monitor spy software can secretly record all keystrokes typed on your computer. It runs completely invisiblely. You can check logging reports by simply receiving emails or opening a web page. Perfect for catching cheaters, m onitoring employees, children or spouse, acquiring others' passwords and even investigating crimes. Use hotkey to unhide it from Stealth Mode and protect the program access by password.
  • Most technically powerful spyware on Mac software allows user to take a complete records of all visited data in hidden mode and save them at safe place in system or at user defined location. Amazing Macintosh Os X based monitoring application allows both technical and non-technical user to operate such type software without taking extra expertise classes in efficient manner. Expertise Mac key logger software is able to record all actions like insertions and removal of different USB media such as pen drive, thumb drive, micro drive, flash drive, digital camera, jump drive, key chain drive, flash drive and many others. Best and easy to understand Mac keylogger software is used widely in different fields like university, colleges, schools, cyber café, hospitals, shipping, police forces, investigation sector and many other fields at reasonable cost. Cost-effective and affordable spyware on Macintosh application is coming in market with extraordinary features that is very helpful for parents so that user is able t ...
  • Parental Control Keylogger secrectly logs your kids' Facebook use, keystrokes, chats, emails, website visits, video chat, login name, passwords and more. Supports Windows Live Messenger, Yahoo Messenger, Skype and others. Sends log reports to your email every hour or sooner. It runs silently with Windows startup and monitored users won't know its existence. Parental Control Keylogger is a great tool to monitor and protect your kids onli
  • Power Spy Keylogger spy software can secretly record all keystrokes typed on your computer. It runs completely invisiblely. You can check log reports by simply receiving emails or opening a web page. Power Spy Keylogger is perfect for catching cheaters, monitoring employees, children or spouse, acquiring others' passwords and even investigating crimes. Use hotkey to unhide it from Stealth Mode and protect the program access by password.
  • FREE SafeHouse Explorer provides total privacy and protection for your sensitive files and folders using passwords and strong 256-bit encryption. This software is amazingly simple to use and features a familiar Windows Explorer-like look and feel. Protecting files is as simple as dragging and dropping them into SafeHouse Explorer. Create any number of private storage vaults on any media including external drives, USB memory sticks and CD/DVDs.
  • SpyPal Email Spy software secretly monitors and records all emails opened in popular email clients, such as Microsoft Outlook 2000/XP/2003/2007, Microsoft Outlook Express 5/6, Windows Vista WinMail and IncrediMail. It runs in a complete invisible mode. You can check all recorded messages by simply receiving emails or opening a web page.

Page 22 of 30
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30


Legal disclaimer | Privacy policy

© 2004-2016 IT Shareware