Home | Submit a file  |  New  |  Categories  |  Our awards  |  Link to us  |  RSS Feeds

Utilities :: Security & Encryption
Sort by: date | product title | rating | downloads | popularity
Display: short descriptions | full descriptions
  • The SpyMessage is easy-to-use, reliable and powerful tool for protecting important information that you don't want others to see.With SpyMessage you can encrypt and hide your text message into image without any changes in its resolution or size.You can view the modified image with any conventional image viewer program, xchange messages with your friends without any fear from others spying on you, No one can know if your image contain messages .
  • Company designs Keylogger Free software with full functionality and flexibility to consistent watch over entire work performed by company employees without actually being noticed them. Download cost effective Keylogger Free tool from www.keylogger.in to secretly maintain encrypted log file of unknown user actions on your personal computer or laptop in txt or html file formats as per convenient. Comprehensive keyboard monitoring application allows user to record windows login and system time modifications in simplified manner. Most innovative Keylogger Free program traces all type of web pages with complete information of name, accessed time and title of website. Keylogger Free program facilitates you to records login name and password typed in various applications by outside person on your system. Highly interactive Keylogger Free application provides the easiest way to monitor overall activities performed on PC by children, outside user, staff employees, office colleagues, friends, family members, relatives, ...
  • PC Activity Monitor Standard (PC Acme Standard) is an ultimate invisible and undetectable easy-to-use monitoring and surveillance tool for personal PCs. It is professional software that captures all users activity on the PC. It is a powerful management tool for users and companies, which want to increase their productivity and profitability. This is the most remarkable security product for a computer you have seen.
  • Spy Camera Software, invisible keylogger, email and messenger spy software. It records all keystrokes typed, MSN Messenger, Windows Live Messenger, ICQ messenger, AIM, Yahoo! Messenger, Windows Messenger and Skype's chats, websites visited, emails read, documents opened, windows opened, clipboard activaties, passwords typed and applications executed. It even takes screen snapshots like a surveillance camera.
  • SpyKing Windows Spy secrectly logs all keystrokes, web sites, emails, chats & IMs: MSN Messenger, Windows Live Messenger, ICQ, AOL Messenger, AIM, Yahoo! Messenger, Windows Messenger and Skype. Takes screen snapshots at every X seconds like a surveillance camera. Displays exact activities, like MySpace, Facebook, PC games, online searches & shopping, file transfers and webmails. You can receive reports remotely via emails or ftp.
  • Secure PDF Copying ability of your files to yourself with the help of the Restrict PDF software. The software helps you to Secure PDF Copy ability by putting either the user password or the owner password. While the former blocks the files from being viewed, the latter though letting you check out the content of the files, doesn't allows for the usage of the options of copy, print and edit on the PDF files.
  • Bsecsoft Data Locker is professional file encryption and folder lock software which offers you best way of encrypting and password protecting files and folders. It can safely protect any file and folder on your PC from being seen, read or modified. The Data Locker is easy to use, just like a safety box, and support to drag and drop the folders or files you want to hide or protect.
  • Employee Monitoring Pro secretly logs your employees' PC & internet usage during theirwork hours. It lets you exactly what they type on PC keyboard, web sites they visit, who they talk to online and the content of their conversation. Employee Monitoring Pro even takes screen snapshots periodically like a surveillance camera aiming at their computers. You can either receive log reports remotely from or check logs directly on their PCs.
  • Locker is a software product of new generation aimed at comprehensive protection of your data and using both protection properties of your operational system and its own protection means. In its basis, there is the task to secure the most flexible, convenient, and reliable PC data protection. The project tasks include limitation of access to folders, files, discs and disc sections on your operational system.
  • PCMate Free File Shredder is a secure and accurate free file eraser application for Windows that allows you to completely remove sensitive data from your hard drive by overwriting it several times with carefully selected patterns (Gutman, USDoD and others). This free file shredder helps shred files, folders as well as wipe recycle bin to protect your private data.
  • SpyPal Yahoo! Messenger Spy software can secretly Secretly record all Yahoo! Messenger's incoming and outgoing chat text messages. It runs in a complete invisible mode. You can check all recorded messages by simply receiving emails or opening a web page. Perfect for catching cheaters, monitoring employees, children or spouse, and even investigating crimes.
  • Are your employees playing games during the working hour? Or visiting the Websites have nothing to do with their work? Even betraying confidential information by MSN, ICQ and other chat tools, copying the files away... Deep-spy is a perfect solution to all your problems. Logs all chat conversations, websites visited, emails activities, application usage, file usage,FTP Usage,Clipboard Logging,Screenshots Capturing,Real-time Desktop,Multi-screen Monitoring,Current Windows Opened,Current Processes Executed,Internet Usage and even screenshots.
  • SpyPal Keylogger Spy software can secretly record all keystrokes typed on your computer. This may include chats, emails, user names, passwords, online searches, myspace, facebook activities and more.It runs in a complete invisible mode. You can check logging reports by simply receiving emails or opening a web page.Perfect for catching cheaters, monitoring employees, children or spouse.
  • Power Spy Keylogger spy software can secretly record all keystrokes typed on your computer. It runs completely invisiblely. You can check log reports by simply receiving emails or opening a web page. Power Spy Keylogger is perfect for catching cheaters, monitoring employees, children or spouse, acquiring others' passwords and even investigating crimes. Use hotkey to unhide it from Stealth Mode and protect the program access by password.
  • A VPN protects you by encrypting your internet traffic, making your online activities impossible to intercept by unwanted third parties. Once connected to any of our servers, you become masked behind an anonymous IP address. Bart VPN gives you the option to automatically encrypt selected applications on your computer, it will also connect to the best server available in your location. It's simply the ultimate gateway to internet freedom.
  • Power Spy secretly logs Facebook use, keystrokes, chats, emails, web sites, web cam images, user names, passwords, applications excuted and more. It records IMs in Windows Live Messenger, Skype, Yahoo Messenger, ICQ and others. Power Spy runs silently with system startup and automatically sends log reports to your email or ftp. Easy to install and setup. It is widely used in offices, homes, schools, detective agencies and police departm
  • Secure Virtual Desktop lets you securely access sensitive information on any computer. Acting as an invisibility shield, SVD makes you anonymous to the sites you visit and erases all traces of your activity when your session ends. This tool is perfect for securely accessing web applications like Salesforce, online banking, and other sensitive information from any computer, including public kiosks, hotel business centers and shared laptops.
  • Most technically powerful spyware on Mac software allows user to take a complete records of all visited data in hidden mode and save them at safe place in system or at user defined location. Amazing Macintosh Os X based monitoring application allows both technical and non-technical user to operate such type software without taking extra expertise classes in efficient manner. Expertise Mac key logger software is able to record all actions like insertions and removal of different USB media such as pen drive, thumb drive, micro drive, flash drive, digital camera, jump drive, key chain drive, flash drive and many others. Best and easy to understand Mac keylogger software is used widely in different fields like university, colleges, schools, cyber café, hospitals, shipping, police forces, investigation sector and many other fields at reasonable cost. Cost-effective and affordable spyware on Macintosh application is coming in market with extraordinary features that is very helpful for parents so that user is able t ...
  • Computer Spy Software monitors others' PC usage when you're away. It secretly logs all keystokes, online chats, instant messages, emails, web sites visited, applications run and more. It is a great tool to monitor activities about MSN Messenger, Yahoo! Messenger, ICQ, Skype, AIM, MySpace, Facebook, etc. Computer Spy Software takes screenshots like a spy camera. You can receive reports remotely via emails.
  • SpyPal Email Spy software secretly monitors and records all emails opened in popular email clients, such as Microsoft Outlook 2000/XP/2003/2007, Microsoft Outlook Express 5/6, Windows Vista WinMail and IncrediMail. It runs in a complete invisible mode. You can check all recorded messages by simply receiving emails or opening a web page.
  • Vyapin NTFS Security Auditor is a powerful reporting solution for auditing NTFS security across your entire Windows network. NTFS Security Auditor provides answers to important questions about the security and health of File systems in your servers and workstations. NTFS Security Auditor you can perform a complete security scan of Shares, Folders and Files present in your network. You can perform an automated inventory of permissions on Folders and Files at regular intervals and keep a constant watch on the health of your NTFS security. Our solution provides a variety of audit reports that are simple, elegant and highly customizable for System Administrators, IT infrastructure Managers and Systems Audit personnel to use and act on. There are several powerful, ready-to-use reports that assist in both Management reporting and Compliance reporting requirements such as SOX and HIPAA. Vyapin?s NTFS Security Auditor serves your needs of administrative tasks as well as complex data preparation tasks for assisting ...
  • SpyKing PC Spy secretly logs all Facebook use, keystrokes, chats & IMs, emails, web sites, user names, passwords, web cam images, apps, clipboard and more. It supports Skype, Windows Live Messenger, Yahoo Messenger and others. It also takes screenshots like a surveillance camera. You can receive reports remotely via email or ftp as often as you wish. Open these reports on another PC or on your cell phone browser.
  • Pro-Key-Lock allows the user to lock specific keyboard and mouse buttons. You can use pro-key-lock to lock specific keys like the function keys, the caps-lock key, the windows (start) key or key combinations like Alt-Tab, etc. You can also lock specific mouse functions like the right click or the double click. The user can also define a rectangle on the screen and instruct Pro-Key-Lock to enable mouse clicks only inside/outside this rectangle.
  • Keylogger Spy Monitor spy software can secretly record all keystrokes typed on your computer. It runs completely invisiblely. You can check logging reports by simply receiving emails or opening a web page. Perfect for catching cheaters, m onitoring employees, children or spouse, acquiring others' passwords and even investigating crimes. Use hotkey to unhide it from Stealth Mode and protect the program access by password.
  • NSF Local Security Remover from SysInfoTools is a robust and powerful tool that allows user to remove local security restrictions from secured NSF database files of lotus Notes. This tool removes security in no time with just few mouse clicks and key strokes. NSF Local Security Remover from SysInfoTools is a perfect solution for removing security from secured NSF database file of Lotus Notes. Lotus Notes has an attribute named as Access Control List (ACL) using which administrator set access rights to particular NSF file. Using this attribute file owner manages the NSF file. But sometimes situation arises when Lotus Domino server act inaccessible stops responding and the user or administrator is not able to access the NSF file. Every time when they try to do so the above mentioned errors are flashed making situation worse. NSF Local Security Remover from SysInfoTools is especially designed to deal with such type of situations. It erases NSF security aptly and helps you to open and read Lotus Notes NSF file ...

Page 22 of 30
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30


Legal disclaimer | Privacy policy

© 2004-2016 IT Shareware