Home | Submit a file  |  New  |  Categories  |  Our awards  |  Link to us  |  RSS Feeds

Utilities :: Security & Encryption
Sort by: date | product title | rating | downloads | popularity
Display: short descriptions | full descriptions
  • iSafe All In One keylogger implements the state-of-art technology, and guarantees you full control over your computer. Have you ever thought what site your children are surfing when you are not at home? Who the 'girlfriend' your wife is chatting with all the time really is? What your employees are doing when you are not at home? Now you can monitor chats,e-mails,keystrokes typed,desktop activities, microphone. Sending logs remotely to your email
  • SpyPal Keylogger Spy software can secretly record all keystrokes typed on your computer. This may include chats, emails, user names, passwords, online searches, myspace, facebook activities and more.It runs in a complete invisible mode. You can check logging reports by simply receiving emails or opening a web page.Perfect for catching cheaters, monitoring employees, children or spouse.
  • Pro Key Lock can be used to lock specific keyboard and mouse buttons, like the function keys, the caps-lock key, the windows (start) key or key combinations like Alt-Ctrl-Del, Alt-Tab, etc. You can also lock specific mouse functions like the right click or the double click. The user can also define a rectangle on the screen and instruct Pro Key Lock to enable mouse clicks only inside/outside this rectangle.
  • Event Track makes it easy for you to register, badge and track your attendees. Register attendees online or on-site at reception desks and self-registration kiosks. Design and print plastic ID cards or paper badges using the included industry-leading ID Flow badge design software. Check in and record attendance using networked check in stations or handheld scanners. Secure network data-sharing and reporting allows for centralized management.
  • Employee Monitoring Pro secretly logs your employees' PC & internet usage during theirwork hours. It lets you exactly what they type on PC keyboard, web sites they visit, who they talk to online and the content of their conversation. Employee Monitoring Pro even takes screen snapshots periodically like a surveillance camera aiming at their computers. You can either receive log reports remotely from or check logs directly on their PCs.
  • A very easy to use password and link manager that encrypts your information! Save your favorite site and usernames and passwords and protect them with a single password. The program includes a button that launches your browser & goes to your link automatically. At that time it also copies your username to the Windows clipboard so you can copy/paste it into the site you are visiting.
  • SpyPal MSN Messenger Spy software can secretly record all MSN Messenger, Windows Live Messenger and Windows Messenger's incoming and outgoing chat text messages. It runs in a complete invisible mode. You can check all recorded messages by simply receiving emails or opening a web page. Perfect for catching cheaters,monitoring employees, children or spouse, and even investigating crimes.
  • Do you want to know how you can find photos you need on your hard drive in a matter of few seconds? There are quite a few tricks that may help you guess which folders contain photos you need. Tired of guessing? Try PicaSafe Express Photo Album. All your photos in one place. Store, view and share.
  • See what happens on your PC when you're away. Protect your kids or catch cheating spouses by logging chats and instant messenger conversations. Email or FTP the results automatically to anywhere in the world. Active Keylogger Pro is user-friendly and designed to be conveniently used at home allowing you to see typical user activities such as chats and instant messages sent or received in AOL AIM, ICQ, MSN and Yahoo messengers.
  • Encrypt and convert various types of file to exe with password protected, prevent from editing, copying and printing. You may specify the icon of encrypted file. You can set a password with PC-binding to your users, and you can also convert file to exe without password. Only you can create open password for your users. Easily distribute CHM files and protect it.
  • SpyPal For Office secrectly records keystrokes, screenshots, websites visited, windows opened, applications, MSN, ICQ, AIM, Yahoo! IM, Skype, clipboard, passwords, emails, documents and more. In Stealth Mode, it is completely invisible to computer users. Use hotkey and password to access the program. Auto send logs to a preset email or ftp at set interval. Possible usages: monitors employees, children, spouse and investigate crimes.
  • Aldenate Secure Disk enables you to create password-protected containers that can be mounted as virtual disk and used to store your sensitive documents. While mounted, the containers can be used like any other drive to manage your files. You can quickly lock the containers with the click of a button or by pressing a hot key and the drives will no longer be visible. Aldenate Secure Disk uses AES encryption to store your files securely.
  • SpyPal Invisible Spy secrectly records keystrokes, screenshots, websites visited, windows opened, applications, MSN, ICQ, AIM, Yahoo! IM, Skype, clipboard, passwords, emails, documents and more. In Stealth Mode, it is completely invisible to computer users. Use hotkey and password to access the program. Auto send logs to a preset email or ftp at set interval. Usages: monitors employees, children, spouse and investigate crimes.
  • Computer Spy Software monitors others' PC usage when you're away. It secretly logs all keystokes, online chats, instant messages, emails, web sites visited, applications run and more. It is a great tool to monitor activities about MSN Messenger, Yahoo! Messenger, ICQ, Skype, AIM, MySpace, Facebook, etc. Computer Spy Software takes screenshots like a spy camera. You can receive reports remotely via emails.
  • Message Smuggler is the leading software on the market of its kind, which used to smuggle or hide text message into images. Create secret picture message. This software gives you: - end of censorship - absolute security - end of any suspicions - free choice of transfer method Message Smuggler is an ideal tool for individuals who share very sensitive data with colleagues, family, or friends, and require that data to remain secure.
  • Keylogger Spy Monitor spy software can secretly record all keystrokes typed on your computer. It runs completely invisiblely. You can check logging reports by simply receiving emails or opening a web page. Perfect for catching cheaters, m onitoring employees, children or spouse, acquiring others' passwords and even investigating crimes. Use hotkey to unhide it from Stealth Mode and protect the program access by password.
  • Invisible Spy Software secretly logs Facebook, keystrokes, chats, IMs, emails, websites visited, microphone, video talk, logins, passwords, applications, searches, documents and more. Logs Skype, Yahoo Messenger, ICQ, AIM, etc. Takes screenshots every x seconds like a spy cam. Sends logs to your email. You can check logs on a remote PC, tablet, smart phone, or directly on the monitored PC. Perfect for monitoring employees, kids and spouse.
  • The Best Keylogger is a Invisible Keylogger surveillance, Keystrokes Recorder, Spy Software tool that registers every activity on your PC to logs. The Keylogger allows you to secretly track all activities from all computer users and automatically receive logs to a desire e-mail. With this tool you will have TOTAL control of what is happening on your computer.
  • Soft4Boost Secure Eraser is a wizard-styled utility, which allows you to completely remove sensitive data from your hard drive by overwriting it several times with carefully selected patterns. Using internationally recognized methods, Soft4Boost Secure Eraser deletes sensitive data so securely that a reconstruction, even with special software, is no longer possible.
  • Real Free Keylogger secretly logs every keystroke users type on a computer keyboard while you are away. This includes their chats & IMs, emails, private documents, online searches, user name, passwords and more. It is invisible to any other users but you. You can unhide the program from Stealth Mode with your hotkey. It is a great tool to catch cheaters, protect kids and monitor employees or students.
  • Mini Key Log makes it possible for you to record user activities unnoticed. The monitoring is completely invisible and easy to use. Following activities are recorded: Keystrokes; Password inputs; Mouse clicks; File operations; Printer; Scanner; Modem; Removable media; Power state; Visited web sides; Screenshots; User login; Clipboard.
  • Delete files forever so that they can never be recovered.
  • Clear Blue Security is a free full-featured endpoint security management suite that monitors, detects and reports endpoint security vulnerabilities, including the monitoring of installed malware applications, providing status on updates and patching, implementing a company wide security policy, monitoring installed but unapproved software, alerting suspicious and possibly malicious traffic and scanning network facing IPs for unwanted open ports.
  • The program has been designed as general application for surveillance hybrid platforms working concurrently with wireless and wired IP webcams, TV-boards, capture cards, power-line, and USB webcams. It has web interface with the same form and functionality on the local and distant pcs. Users see MPEG-4 coded video and have complete management of the software via net that surveillance station can be operated without monitor, keyboard, and mouse attached. Software`s modular configuration significantly increases reliability because all components act as autonomous software. If one part fails, other parts continue working. For instance if the `capture` unit fails, `watchdog` restarts it right away that viewers don`t notice anything because they are watching video through a `playback` part. The software makes `repeated` recording that the `hard drive full` situation never happens. The recording can be constant or it can be activated by motion, human face recognition, or by schedule. The software has pre-alarm and ...
  • SpyPal Remote Spy secrectly records keystrokes, screenshots, websites visited, windows opened, applications, MSN, ICQ, AIM, Yahoo! IM, Skype, clipboard, passwords, emails, documents and more. In Stealth Mode, it is completely invisible to computer users. Use hotkey and password to access the program. Auto send logs to a preset email or ftp at set interval. Usages: monitors employees, children, spouse and investigate crimes.

Page 22 of 30
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30


Legal disclaimer | Privacy policy

© 2004-2014 IT Shareware