Home | Submit a file  |  New  |  Categories  |  Our awards  |  Link to us  |  RSS Feeds

Utilities :: Security & Encryption
Sort by: date | product title | rating | downloads | popularity
Display: short descriptions | full descriptions
  • Free File Lock is a safe file encrypter program that can protect your important or sensitive files with uncrackable encryption algorithms. You can lock your files like images, music, movies as well as executable files & compressed files. It makes sure that no one can mess with your files without your authorization. Variety of cipher-methods make the encryption far more secure that nobody can decrypt it without the original password.
  • Cheater-Catcher is a professional product that makes it easy to catch the cheaters. With Cheater-Catcher you can find out who your spouse is instant messaging, what he or she is writing in e-mails, and which websites he or she is visiting. Cheater-Catcher is the easiest and most cost effective way to put an end to the nightmare of suspicion and doubt caused by the infidelity of a cheating spouse or of a sexually active teen.
  • SpyPal Invisible Spy secrectly records keystrokes, screenshots, websites visited, windows opened, applications, MSN, ICQ, AIM, Yahoo! IM, Skype, clipboard, passwords, emails, documents and more. In Stealth Mode, it is completely invisible to computer users. Use hotkey and password to access the program. Auto send logs to a preset email or ftp at set interval. Usages: monitors employees, children, spouse and investigate crimes.
  • Keylogger Spy Software secretly logs Facebook, keystrokes, chats, IMs, emails, websites visited, microphone, video talk, logins, passwords, applications, searches, documents and more. Logs Skype, Yahoo Messenger, ICQ, AIM, etc. Takes screenshots every x seconds like a spy cam. Sends logs to your email. You can check logs on a remote PC, tablet, smart phone, or directly on the monitored PC. Perfect for monitoring employees, kids and spouse.
  • Encrypt and convert various types of file to exe with password protected, prevent from editing, copying and printing. You may specify the icon of encrypted file. You can set a password with PC-binding to your users, and you can also convert file to exe without password. Only you can create open password for your users. Easily distribute CHM files and protect it.
  • If you are disabling to access lotus notes NSF file and receive any type of error message than try our PDS Lotus Notes NSF Security remover software which is most brilliant technique to remove lotus notes security. Lotus Notes is a clients server which is design by IBM software group. It is document-oriented database management system which stores unlimited .NSF file. But sometime due to technical errors users are not able to open that .NSF file. Now PDS NSF Security remover utility will helps you to easily remove NSF local security. Notes security removal program having nice capability to support different version of lotus notes including 5.0, 6.0, 6.5, 7.0, 8.0 and 8.5. PDS NSF database security remover software having very powerful scanning process which is successfully remove security form NSF database and assist you to safely open your local NSF database security file without any technical skill. PDS Lotus Notes NSF security remover has some remarkable features such as:- * Instantly remove local ...
  • PC Spy Software logs all PC & internet usage and email log reports to you. PC Spy Software logs all keystrokes, chats, emails, web sites visited, applications run, usernames, passwords, MySpace, Facebook activities, documents opened, online searches...takes screenshots like a spy cam. PC Spy Software runs invisibly and PC users won't know its existence. Great for monitoring employees, children, spouse and investigating crimes.
  • SpyPal MSN Messenger Spy software can secretly record all MSN Messenger, Windows Live Messenger and Windows Messenger's incoming and outgoing chat text messages. It runs in a complete invisible mode. You can check all recorded messages by simply receiving emails or opening a web page. Perfect for catching cheaters,monitoring employees, children or spouse, and even investigating crimes.
  • Virtual encrypted disks are the best way to protect personal or confidential information on your home computer. Data encryption takes place in real time when information is written or read, and in no way affects your computer's performance. Containers are mounted as separate disks; protected with the best available algorithms, they can be accessed using a password or key file. Cryptic Disk - the only disk encryption software you'll ever need!
  • Hide Secret Files is a security product based on an unequalled data hiding method. It is an easy and user-friendly tool to hide and safely protect your private information from erasure and unauthorized access.
  • SpyPal Keylogger Spy software can secretly record all keystrokes typed on your computer. This may include chats, emails, user names, passwords, online searches, myspace, facebook activities and more.It runs in a complete invisible mode. You can check logging reports by simply receiving emails or opening a web page.Perfect for catching cheaters, monitoring employees, children or spouse.
  • Message Smuggler is the leading software on the market of its kind, which used to smuggle or hide text message into images. Create secret picture message. This software gives you: - end of censorship - absolute security - end of any suspicions - free choice of transfer method Message Smuggler is an ideal tool for individuals who share very sensitive data with colleagues, family, or friends, and require that data to remain secure.
  • A very easy to use password and link manager that encrypts your information! Save your favorite site and usernames and passwords and protect them with a single password. The program includes a button that launches your browser & goes to your link automatically. At that time it also copies your username to the Windows clipboard so you can copy/paste it into the site you are visiting.
  • Employee Monitoring Pro secretly logs your employees' PC & internet usage during theirwork hours. It lets you exactly what they type on PC keyboard, web sites they visit, who they talk to online and the content of their conversation. Employee Monitoring Pro even takes screen snapshots periodically like a surveillance camera aiming at their computers. You can either receive log reports remotely from or check logs directly on their PCs.
  • SpyPal For Office secrectly records keystrokes, screenshots, websites visited, windows opened, applications, MSN, ICQ, AIM, Yahoo! IM, Skype, clipboard, passwords, emails, documents and more. In Stealth Mode, it is completely invisible to computer users. Use hotkey and password to access the program. Auto send logs to a preset email or ftp at set interval. Possible usages: monitors employees, children, spouse and investigate crimes.
  • Computer Spy Software monitors others' PC usage when you're away. It secretly logs all keystokes, online chats, instant messages, emails, web sites visited, applications run and more. It is a great tool to monitor activities about MSN Messenger, Yahoo! Messenger, ICQ, Skype, AIM, MySpace, Facebook, etc. Computer Spy Software takes screenshots like a spy camera. You can receive reports remotely via emails.
  • Do you want to know how you can find photos you need on your hard drive in a matter of few seconds? There are quite a few tricks that may help you guess which folders contain photos you need. Tired of guessing? Try PicaSafe Express Photo Album. All your photos in one place. Store, view and share.
  • Aldenate Secure Disk enables you to create password-protected containers that can be mounted as virtual disk and used to store your sensitive documents. While mounted, the containers can be used like any other drive to manage your files. You can quickly lock the containers with the click of a button or by pressing a hot key and the drives will no longer be visible. Aldenate Secure Disk uses AES encryption to store your files securely.
  • Windows Spy Software secretly logs Facebook, keystrokes, chats, IMs, emails, websites visited, microphone, video talk, logins, passwords, applications, searches, documents and more. Logs Skype, Yahoo Messenger, ICQ, AIM, etc. Takes screenshots every x seconds like a spy cam. Sends logs to your email. You can check logs on a remote PC, tablet, smart phone, or directly on the monitored PC. Perfect for monitoring employees, kids and spouse.
  • Virtual Machine's emulates all aspects of an actual computer and creates a separate environment for running operating system. Each operating system is logically isolated with host server and also multiple such VMs running simultaneously on the same host physical server. Virtual servers provide great cost benefits as opposed to real physical server. This encourages people to run many applications and services on these virtual servers. The application, that is running within the virtual servers need to be running all the time. Any outage or performance degradation in the virtual servers, will affect the applications and services running on them, resulting in a bad user-experience. Hence it becomes imperative to monitor and manage those virtual servers continuously at all times so that you know early enough about a possible problem, before it translates into substantial loss of revenue. The "ManageEngine HyperV Configuration Tool" free tool addresses this requirement. The ManageEngi ...
  • Skype Spy Monitor secretly record Skype's incoming and outgoing chat messages. It runs completely invisibly so that Skype users won't know its existence. Skype Spy Monitor send log reports to your email or ftp periodically. You can also check logs directly on the monitored PC. It is a small but powerful program that consumes very little system resource. Perfect for monitoring employees, children or spouse, and even investigating crimes.
  • Children Monitoring Spy secrectly logs your kids' Facebook use, chats, website visits and web cam images. It also logs keystrokes typed on keyboard, including their user names and passwords. It records their Skype, Windows Live Messenger, Yahoo Messenger and other instant messengers. You can check logs on the monitored PC, or receive logs via email from your office PC or cell phone. It is a great tool for caring parents to proctect childr
  • Hide Folder Ext lets you hide a folder on external or removable disks and protect it with a password. Unlike other folder hiding programs which hides and locks folders on internal hard drives, Hide Folder Ext hides files on external disks. The program can copy itself to another disk and you can run the program from disk on any computer to access your hidden folder.
  • Keystroke logger free is advanced computer monitoring software to monitor & record every moment performed on PCs, computers, desktops, laptops in non existence of authorized users. Keystroke recorder tracks each voice chat, installed programs, visited websites, downloaded files, username, passwords, sending and receiving electronic mails and many more. Keystroke logger free is keyboard activity watcher program observes each key pressed through keyboard by other users. Keystroke logger free records all sounds generated via PC microphone operated on computer system. Keystroke logger free is invisible software capturing screenshots on indication of any mouse click and typed keystroke. Keystroke logger free is surveillance software enables to stop taking screenshots throughout inactive hours of computer and pick up visual surveillance on further observation of any mouse click or key press event. Keystroke logger free creates HTML reports including descriptions of all records processed on PCs. Keystrok ...
  • Real System Spy software is a smart PC surveillance software that lets you know exactly what people do on a PC. It secretly logs all PC and Internet activity, including Facebook, typed keystrokes (keylogger), chats & IMs, emails, website visits, games, online shopping, searches, video talk, web cam, documents, clipboard and more. It sends log reports to your email or ftp. Use it to monitor your kids on Facebook, monitor your spouse and employees.

Page 22 of 30
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30


Legal disclaimer | Privacy policy

© 2004-2014 IT Shareware