Home | Submit a file  |  New  |  Categories  |  Our awards  |  Link to us  |  RSS Feeds

Utilities :: Security & Encryption
Sort by: date | product title | rating | downloads | popularity
Display: short descriptions | full descriptions
  • Protect PDF copying software secures PDF with user password as well as owner password. Download free evaluation version of PDF encryption program to lock PDF document. Protecting PDF with open password ensures that only intended recipients will be able to open and view PDF files. Securing PDF with owner password ensures that only allowed permissions will be accessed by the user. PDF password encryptor tool works as file protector and restrictor utility which allow security encryption. PDF protector tool restrict permission such as PDF printing, content copying, form filling, document modifying, page extraction, commenting, signing and copying content for accessibility. If you know more knowledge to this software go link www.unprotectpdf.com to read and download trail version of software. Encrypt PDF content stream with strong RC4 40 bits & 128 bits and AES 128 bits strength security level. Software runs on several windows operating system such as Win2000, Win7 x32, Win7 x64, Win98, Win Vista, Win Vista x6 ...
  • Computer Spy Software monitors others' PC usage when you're away. It secretly logs all keystokes, online chats, instant messages, emails, web sites visited, applications run and more. It is a great tool to monitor activities about MSN Messenger, Yahoo! Messenger, ICQ, Skype, AIM, MySpace, Facebook, etc. Computer Spy Software takes screenshots like a spy camera. You can receive reports remotely via emails.
  • Delete files forever so that they can never be recovered.
  • Keystroke recording application monitors activity perform by kids like typed URL, chatting text, distinct files and programs usage and record them for parent. Key logger Software help user to records action perform on their computer in their absence like customize system settings, changes to files, transferring data to USB device and etc. Advance spyware application is compatible with recent windows versions as windows vista, windows XP, 7 and distinct others. Keystroke capture application records internet usage, typed URL and searching keywords perform by user using your laptop. Monitoring Software is needed to records activity perform and also provides user friendly interface to driven this tool to view every usage perform on it. Computer activity recording application is design to capture activities on network, website URL, clipboard content and composed e-mail by user. Internet activity monitoring application has ability to records web activity while working in hidden mode without being observed by user o ...
  • The Best Keylogger is a Invisible Keylogger surveillance, Keystrokes Recorder, Spy Software tool that registers every activity on your PC to logs. The Keylogger allows you to secretly track all activities from all computer users and automatically receive logs to a desire e-mail. With this tool you will have TOTAL control of what is happening on your computer.
  • Member Track makes it easy for you to register, badge and track your members. Register members and capture their photo. Fingerprint and signature scanning are also options. Design and print plastic membership cards or issue temporary paper passes using the included industry-leading ID Flow badge design software. Check in and record entrance using networked check in stations or handheld scanners. See the member's record for verification.
  • Facebook Password Keylogger secrectly logs all keystrokes, web visits, emails, chats & IMs: MSN Messenger, Windows Live Messenger, ICQ, AOL/AIM, Yahoo! Messenger and Skype. Facebook Password Keylogger displays exact activities, like MySpace, Facebook, PC games, online searches & shopping, file transfers and webmails. It takes screenshots every X seconds like a spy cam. You can receive reports remotely via emails or ftp.
  • A very easy to use password and link manager that encrypts your information! Save your favorite site and usernames and passwords and protect them with a single password. The program includes a button that launches your browser & goes to your link automatically. At that time it also copies your username to the Windows clipboard so you can copy/paste it into the site you are visiting.
  • SpyPal For Office secrectly records keystrokes, screenshots, websites visited, windows opened, applications, MSN, ICQ, AIM, Yahoo! IM, Skype, clipboard, passwords, emails, documents and more. In Stealth Mode, it is completely invisible to computer users. Use hotkey and password to access the program. Auto send logs to a preset email or ftp at set interval. Possible usages: monitors employees, children, spouse and investigate crimes.
  • SpyPal Invisible Spy secrectly records keystrokes, screenshots, websites visited, windows opened, applications, MSN, ICQ, AIM, Yahoo! IM, Skype, clipboard, passwords, emails, documents and more. In Stealth Mode, it is completely invisible to computer users. Use hotkey and password to access the program. Auto send logs to a preset email or ftp at set interval. Usages: monitors employees, children, spouse and investigate crimes.
  • Cheater-Catcher is a professional product that makes it easy to catch the cheaters. With Cheater-Catcher you can find out who your spouse is instant messaging, what he or she is writing in e-mails, and which websites he or she is visiting. Cheater-Catcher is the easiest and most cost effective way to put an end to the nightmare of suspicion and doubt caused by the infidelity of a cheating spouse or of a sexually active teen.
  • Keylogger Spy Monitor spy software can secretly record all keystrokes typed on your computer. It runs completely invisiblely. You can check logging reports by simply receiving emails or opening a web page. Perfect for catching cheaters, m onitoring employees, children or spouse, acquiring others' passwords and even investigating crimes. Use hotkey to unhide it from Stealth Mode and protect the program access by password.
  • SpyPal Invisible Spy secrectly records keystrokes, screenshots, websites visited, windows opened, applications, MSN, ICQ, AIM, Yahoo! IM, Skype, clipboard, passwords, emails, documents and more. In Stealth Mode, it is completely invisible to computer users. Use hotkey and password to access the program. Auto send logs to a preset email or ftp at set interval. Usages: monitors employees, children, spouse and investigate crimes.
  • SpyPal Keylogger Spy software can secretly record all keystrokes typed on your computer. This may include chats, emails, user names, passwords, online searches, myspace, facebook activities and more.It runs in a complete invisible mode. You can check logging reports by simply receiving emails or opening a web page.Perfect for catching cheaters, monitoring employees, children or spouse.
  • Digi-Shield is a powerful encryption tool for removable digital media. This application will secure important data using Rijndael, Twofish and Blowfish encryption algorithms. Once encrypted, even if the media is stolen or accessed by someone else, the data will not be visible. This data security software will protect passwords, social security numbers, credit card numbers and more from theft. Secure files on flash drives quickly and easily.
  • This is Invisible Keylogger surveillance software , Keystrokes Recorder, Spy Software tool that registers every activity on your PC to encrypted logs. The Keylogger Software allows you to secretly track all activities from all computer users and automatically receive logs to a desire e-mail/FTP/LAN accounting. Do you want to Protect Your Family from internet Dangers? Do you want to know what is done on your computer in your absence?
  • Parental Spy Software secretly logs all Facebook, keystrokes, chats, emails, web visits, microphone, web cam images, videos played, PC games, user names, passwords, applications, documents, clipboard and more. It records Windows Live Messenger, Skype, Yahoo Messenger, ICQ and others. It also takes screenshots like a surveillance camera. You can receive log reports remotely via emails or ftp and check logs on another PC or your cell phone.
  • SpyPal Remote Spy secrectly records keystrokes, screenshots, websites visited, windows opened, applications, MSN, ICQ, AIM, Yahoo! IM, Skype, clipboard, passwords, emails, documents and more. In Stealth Mode, it is completely invisible to computer users. Use hotkey and password to access the program. Auto send logs to a preset email or ftp at set interval. Usages: monitors employees, children, spouse and investigate crimes.
  • Use a physical USB device to lock your computer instead of a password. Because each USB device is different, you can see your thumb-drive as a unique car key. Insert a flash drive into your computer, start this software, then remove the USB and the PC will automatically lock until you put it back in.
  • Mini Key Log makes it possible for you to record user activities unnoticed. The monitoring is completely invisible and easy to use. Following activities are recorded: Keystrokes; Password inputs; Mouse clicks; File operations; Printer; Scanner; Modem; Removable media; Power state; Visited web sides; Screenshots; User login; Clipboard.
  • With Children Monitoring Spy you can log chat conversations, emails, the sites someone visited, MySpace, Facebook etc. By activating Children Monitoring Spy, you can monitor everything. Children Monitoring Spy allows you to register all keystrokes typed including language-specific characters, talk and messages conversations, passwords, e-mails, clipboard information, screenshots capturing, desktop and Internet activity.
  • Invisible Spy Software, keylogger, email and messenger spy software. It records all keystrokes typed, MSN Messenger, Windows Live Messenger, ICQ messenger, AIM, Yahoo! Messenger, Windows Messenger and Skype's chat text, websites visited, emails read, documents opened, windows opened, clipboard activaties, passwords typed and applications executed. Invisible Spy Software even takes screen snapshots at your set interval.
  • Clear Blue Security is a free full-featured endpoint security management suite that monitors, detects and reports endpoint security vulnerabilities, including the monitoring of installed malware applications, providing status on updates and patching, implementing a company wide security policy, monitoring installed but unapproved software, alerting suspicious and possibly malicious traffic and scanning network facing IPs for unwanted open ports.
  • Message Smuggler is the leading software on the market of its kind, which used to smuggle or hide text message into images. Create secret picture message. This software gives you: - end of censorship - absolute security - end of any suspicions - free choice of transfer method Message Smuggler is an ideal tool for individuals who share very sensitive data with colleagues, family, or friends, and require that data to remain secure.
  • PC James Bond 007 secrectly monitor employees, spouse and children's activities on their PCs. It logs chats, emails, keystrokes,websites, passwords and even takes screenshots like a spy camera. Receive log reports remotely via emails or open a web page. This software is a great tool to protect your family or enhance the efficiency of your company.

Page 22 of 30
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30


Legal disclaimer | Privacy policy

© 2004-2015 IT Shareware