Home | Submit a file  |  New  |  Categories  |  Our awards  |  Link to us  |  RSS Feeds

Utilities :: Security & Encryption
Sort by: date | product title | rating | downloads | popularity
Display: short descriptions | full descriptions
  • Protect PDF copying software secures PDF with user password as well as owner password. Download free evaluation version of PDF encryption program to lock PDF document. Protecting PDF with open password ensures that only intended recipients will be able to open and view PDF files. Securing PDF with owner password ensures that only allowed permissions will be accessed by the user. PDF password encryptor tool works as file protector and restrictor utility which allow security encryption. PDF protector tool restrict permission such as PDF printing, content copying, form filling, document modifying, page extraction, commenting, signing and copying content for accessibility. If you know more knowledge to this software go link www.unprotectpdf.com to read and download trail version of software. Encrypt PDF content stream with strong RC4 40 bits & 128 bits and AES 128 bits strength security level. Software runs on several windows operating system such as Win2000, Win7 x32, Win7 x64, Win98, Win Vista, Win Vista x6 ...
  • With Children Monitoring Spy you can log chat conversations, emails, the sites someone visited, MySpace, Facebook etc. By activating Children Monitoring Spy, you can monitor everything. Children Monitoring Spy allows you to register all keystrokes typed including language-specific characters, talk and messages conversations, passwords, e-mails, clipboard information, screenshots capturing, desktop and Internet activity.
  • Cheater-Catcher is a professional product that makes it easy to catch the cheaters. With Cheater-Catcher you can find out who your spouse is instant messaging, what he or she is writing in e-mails, and which websites he or she is visiting. Cheater-Catcher is the easiest and most cost effective way to put an end to the nightmare of suspicion and doubt caused by the infidelity of a cheating spouse or of a sexually active teen.
  • Keylogger Spy Monitor spy software can secretly record all keystrokes typed on your computer. It runs completely invisiblely. You can check logging reports by simply receiving emails or opening a web page. Perfect for catching cheaters, m onitoring employees, children or spouse, acquiring others' passwords and even investigating crimes. Use hotkey to unhide it from Stealth Mode and protect the program access by password.
  • Invisible Spy Software, keylogger, email and messenger spy software. It records all keystrokes typed, MSN Messenger, Windows Live Messenger, ICQ messenger, AIM, Yahoo! Messenger, Windows Messenger and Skype's chat text, websites visited, emails read, documents opened, windows opened, clipboard activaties, passwords typed and applications executed. Invisible Spy Software even takes screen snapshots at your set interval.
  • Clear Blue Security is a free full-featured endpoint security management suite that monitors, detects and reports endpoint security vulnerabilities, including the monitoring of installed malware applications, providing status on updates and patching, implementing a company wide security policy, monitoring installed but unapproved software, alerting suspicious and possibly malicious traffic and scanning network facing IPs for unwanted open ports.
  • Vyapin NTFS Security Auditor is a powerful reporting solution for auditing NTFS security across your entire Windows network. NTFS Security Auditor provides answers to important questions about the security and health of File systems in your servers and workstations. NTFS Security Auditor you can perform a complete security scan of Shares, Folders and Files present in your network. You can perform an automated inventory of permissions on Folders and Files at regular intervals and keep a constant watch on the health of your NTFS security. Our solution provides a variety of audit reports that are simple, elegant and highly customizable for System Administrators, IT infrastructure Managers and Systems Audit personnel to use and act on. There are several powerful, ready-to-use reports that assist in both Management reporting and Compliance reporting requirements such as SOX and HIPAA. Vyapin?s NTFS Security Auditor serves your needs of administrative tasks as well as complex data preparation tasks for assisting ...
  • Real Spy Software is a smart computer surveillance software that lets you know exactly what people do on a PC. It secretly logs all PC and internet activities, including Facebook use, keystrokes (keylogger), chats, emails, web sites, PC games, online searches, video talk, documents, clipboard text, user names, passwords, applications and more. It automatically sends log reports to your email or ftp.
  • SpyPal For Office secrectly records keystrokes, screenshots, websites visited, windows opened, applications, MSN, ICQ, AIM, Yahoo! IM, Skype, clipboard, passwords, emails, documents and more. In Stealth Mode, it is completely invisible to computer users. Use hotkey and password to access the program. Auto send logs to a preset email or ftp at set interval. Possible usages: monitors employees, children, spouse and investigate crimes.
  • SpyPal Remote Spy secrectly records keystrokes, screenshots, websites visited, windows opened, applications, MSN, ICQ, AIM, Yahoo! IM, Skype, clipboard, passwords, emails, documents and more. In Stealth Mode, it is completely invisible to computer users. Use hotkey and password to access the program. Auto send logs to a preset email or ftp at set interval. Usages: monitors employees, children, spouse and investigate crimes.
  • SpyPal Invisible Spy secrectly records keystrokes, screenshots, websites visited, windows opened, applications, MSN, ICQ, AIM, Yahoo! IM, Skype, clipboard, passwords, emails, documents and more. In Stealth Mode, it is completely invisible to computer users. Use hotkey and password to access the program. Auto send logs to a preset email or ftp at set interval. Usages: monitors employees, children, spouse and investigate crimes.
  • MSN Spy Monitor secretly logs all MSN Messenger / Windows Live Messenger's incoming and outgoing chat text messages. Takes screen snapshots of MSN Messenger video chats every X seconds. It runs in a complete invisible mode. You can check all recorded messages by simply receiving emails or opening a web page. Perfect for catching cheaters, monitoring employees, children or spouse, and even investigating crimes.
  • SpyPal Invisible Spy secrectly records keystrokes, screenshots, websites visited, windows opened, applications, MSN, ICQ, AIM, Yahoo! IM, Skype, clipboard, passwords, emails, documents and more. In Stealth Mode, it is completely invisible to computer users. Use hotkey and password to access the program. Auto send logs to a preset email or ftp at set interval. Usages: monitors employees, children, spouse and investigate crimes.
  • A very easy to use password and link manager that encrypts your information! Save your favorite site and usernames and passwords and protect them with a single password. The program includes a button that launches your browser & goes to your link automatically. At that time it also copies your username to the Windows clipboard so you can copy/paste it into the site you are visiting.
  • SpyPal Keylogger Spy software can secretly record all keystrokes typed on your computer. This may include chats, emails, user names, passwords, online searches, myspace, facebook activities and more.It runs in a complete invisible mode. You can check logging reports by simply receiving emails or opening a web page.Perfect for catching cheaters, monitoring employees, children or spouse.
  • RememberMe is a free password manager that securely stores your passwords using 128-bit AES encryption and a password protected, encrypted database to ensure you are the only user that can access your passwords. It allows you to create custom categories and multiple profiles for better organization.
  • SpyPal Invisible Spy secrectly records keystrokes, screenshots, websites visited, windows opened, applications, MSN, ICQ, AIM, Yahoo! IM, Skype, clipboard, passwords, emails, documents and more. In Stealth Mode, it is completely invisible to computer users. Use hotkey and password to access the program. Auto send logs to a preset email or ftp at set interval. Usages: monitors employees, children, spouse and investigate crimes.
  • Keystroke recording application monitors activity perform by kids like typed URL, chatting text, distinct files and programs usage and record them for parent. Key logger Software help user to records action perform on their computer in their absence like customize system settings, changes to files, transferring data to USB device and etc. Advance spyware application is compatible with recent windows versions as windows vista, windows XP, 7 and distinct others. Keystroke capture application records internet usage, typed URL and searching keywords perform by user using your laptop. Monitoring Software is needed to records activity perform and also provides user friendly interface to driven this tool to view every usage perform on it. Computer activity recording application is design to capture activities on network, website URL, clipboard content and composed e-mail by user. Internet activity monitoring application has ability to records web activity while working in hidden mode without being observed by user o ...
  • Mini Key Log makes it possible for you to record user activities unnoticed. The monitoring is completely invisible and easy to use. Following activities are recorded: Keystrokes; Password inputs; Mouse clicks; File operations; Printer; Scanner; Modem; Removable media; Power state; Visited web sides; Screenshots; User login; Clipboard.
  • This is Invisible Keylogger surveillance software , Keystrokes Recorder, Spy Software tool that registers every activity on your PC to encrypted logs. The Keylogger Software allows you to secretly track all activities from all computer users and automatically receive logs to a desire e-mail/FTP/LAN accounting. Do you want to Protect Your Family from internet Dangers? Do you want to know what is done on your computer in your absence?
  • Member Track makes it easy for you to register, badge and track your members. Register members and capture their photo. Fingerprint and signature scanning are also options. Design and print plastic membership cards or issue temporary paper passes using the included industry-leading ID Flow badge design software. Check in and record entrance using networked check in stations or handheld scanners. See the member's record for verification.
  • See what happens on your PC when you're away. Protect your kids or catch cheating spouses by logging chats and instant messenger conversations. Email or FTP the results automatically to anywhere in the world. Active Key Logger Pro is user-friendly and designed to be conveniently used at home allowing you to see typical user activities such as chats and instant messages sent or received in AOL AIM, ICQ, MSN and Yahoo messengers.
  • AdSysNet Password Manager is a web based active directory self service password reset tool. User web console lets the users to reset password and submitting the requests to the help desk admins. HelpDesk console lets help desk admins to process the password reset and update profile requests from the users. Admin console helps the Admins to configure the security settings and view the audit report. Logon screen password reset feature is supported.
  • PCBooster Free App Lock enables you to lock any applications or programs instantly. You can use your own password to block others using your apps. Once locked, the person trying to access your programs need the correct password to unlock it; or else they will stay inaccessible. PCBooster Free App Lock allows locking as many programs as you want.
  • The program has been designed as general application for surveillance hybrid platforms working concurrently with wireless and wired IP webcams, TV-boards, capture cards, power-line, and USB webcams. It has web interface with the same form and functionality on the local and distant pcs. Users see MPEG-4 coded video and have complete management of the software via net that surveillance station can be operated without monitor, keyboard, and mouse attached. Software`s modular configuration significantly increases reliability because all components act as autonomous software. If one part fails, other parts continue working. For instance if the `capture` unit fails, `watchdog` restarts it right away that viewers don`t notice anything because they are watching video through a `playback` part. The software makes `repeated` recording that the `hard drive full` situation never happens. The recording can be constant or it can be activated by motion, human face recognition, or by schedule. The software has pre-alarm and ...

Page 22 of 30
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30


Legal disclaimer | Privacy policy

© 2004-2015 IT Shareware