Home | Submit a file  |  New  |  Categories  |  Our awards  |  Link to us  |  RSS Feeds

Popular search phrases :: P :: password
Display: short descriptions | full descriptions
  • Abettor-Clipboard can copy and store up to 500 different clips, text or graphic. It has a superb encryption system with which you can sign in to all your web sites as well as send and recieve encrypted emails while only having to remember one master password. You can also allocate hot keys or macros to clips and paste them directly from your keyboard.
  • Protect files and folders situated on local media of Windows98/ME/NT/2000/XP/Vista with Easy File & Folder Protector at Windows kernel level. Your can deny access to certain files and folders, or to hide them securely from viewing and searching. Easy File & Folder Protector has an easy-to-use user interface allowing you to allocate access to your files and folders between your users according to predefined timetables. Each PC user can have his..
  • Abc Clips can copy and store up to 500 different clips, text or graphic. You can allocate hot keys or macros to clips and paste them directly from your keyboard. It also has a superb encryption system which allows you to sign in to all your web sites safely while only having to remember one master password.
  • Network Password Manager provides convenient and easy centralized solution for enterprise password management for organizations of any size. In addition to providing all of the standard functions, it also presents many advanced features supported by a user-friendly and intuitive interface. It is also ready for the multilingual computing world and comes with a flexible set of controls and features.
  • Encryption software designed for automation. Automatically encrypt and decrypt files and folders. Encryption methods include password based, secret key, OpenPGP password, OpenPGP public and private key, Email notification of task status. Includes private,public and OpenPGP key generator and a Key Store to manage keys. Common tasks include encrypt, decrypt, copy, zip, unzip, synchronize and file monitors. Run 1000+ tasks/day.
  • PDF merger software support all function related with PDF document. It integrated with such usual option like split PDF into single pages or in page range, merge and make single PDF, create separate PDF files, delete pages and create one PDF, delete pages and create separate PDFs, combine two pages on one, extract pages and make single PDF, extract pages and make individual PDFs, change page size, edit PDF meta info, add password protection, watermark and bookmark on PDF. You can add sub-string with resultant file name by using suffix and prefix option. Features: * Provides several functions in one tool. * You can split, merge, delete, extract, combine, join, add, append, concatenate, cut, break and remove PDF document pages. * You can use settings as per your need. * Extract required PDF pages. * Delete blank pages from PDF file. * Change PDF page size. * Modify PDF Properties like title, author, subject and keyword. * Combine two pages as well as file. * Support both 32 and 64 bit op ...
  • Power Spy (Supports x64/x86) secretly logs all Facebook, keystrokes, chats, emails, web visits, web cam images, user names, passwords, searches, microphone and more. It supports Windows Live Messenger, Skype, Yahoo Messenger, ICQ and other IMs. It sends log reports to your email or ftp. You can check logs on another PC or your cell phone. Perfect for catching cheaters, monitoring employees, children and spouse and even investigating crimes.
  • All-in-one analysis, unprotection and data recovery for MS Access 2000-2016 (.mdb, .mdw, .mde, .mda, .accdb, .accde, .accda). With Access Forensics you can recover database password, user-level security records (to recreate lost mdw), edit database properties and access rights, remove VBA protection and more. It shows database structure, objects properties, VBA source code, Table content, etc. Recovers deleted tables, records (rows) and columns.
  • Stop others from tampering with your PC. Deny access to Control Panel applets, disable boot keys, context menus, DOS windows, Registry editing, network access, hide desktop icons, individual drives, Start menu items, taskbar. Apply password protection to Windows, restrict users to running specific applications only, control Internet usage, view statistics of working of your kids or employees.
  • Protector Plus 2015 (32-Bit) for Windows Desktop supports Windows 7, Windows XP, Vista, 2000, Me and 98, 95 platforms. This product provides 100% protection against viruses, trojans, worms, backdoors, spyware, adware, exploits, password stealers, hack tools, rootkits and other malware. Protector Plus 2015 (32-Bit) is packed with many useful features like email scanning, InstaUpdate, Submit Sample, Heuristic scanning, memory scanning, de-activation of viruses in memory, quarantine, user defined scan tasks, compressed files scanning and many more. The email scan feature scans all the emails received before they enter the Inbox and ensures that all the emails and attachments are virus free. On detecting an infected email the virus will be removed. The real-time scan feature will scan all the files accessed and automatically removes any virus found. The InstaUpdate feature of Protector Plus 2015 (32-Bit) will automatically download the virus database updates from the developer's web site free of cost. Su ...
  • Power Spy Keylogger secretly logs Facebook, keystrokes, chats, IMs, emails, websites visited, microphone, video talk, logins, passwords, applications, searches, documents and more. Logs Skype, Yahoo Messenger, ICQ, AIM, etc. Takes screenshots every x seconds like a spy cam. Sends logs to your email. You can check logs on a remote PC, tablet, smart phone, or directly on the monitored PC. Perfect for monitoring employees, kids and spouse.
  • SpyPal secrectly records Facebook, keystrokes, screenshots, websites visited, applications, Skype, Yahoo Messenger, clipboard, passwords, emails, documents, microphone and more. In Stealth Mode, it is completely invisible to monitored users. Use hotkey and password to access the program. Automatically sends logs to your email or ftp every x seconds. Perfect for monitoring employees, children, spouse and investigating crimes.
  • Power Spy Lite secretly logs Facebook, Skype, keystrokes, chats & IMs, emails, web visits, video talk, logins, passwords, applications, searches and more. It also takes screenshots like a surveillance camera. Lets you know exactly what they do on a computer screen while you are away. Automatically sends log reports to your email. Starts monitoring with system startup. Runs silently and invisibly.
  • Aml Pages is tree-structured notes manager. It contains all your notes, information, web pages, passwords, URL-address in the form of a tree, so you can quickly find what you need. The Aml Pages can easily save web pages from the Internet and provides a sticky for quick notes. Manage megatons of your notes with ease at work and at home. Supports plain text, rich text and web pages, tables and figures, attachments, and many plug-ins.
  • Access Manager for Windows allows you to restrict access to to key features of Windows, such as Control Panels or Start menu, network, Taskbar, desktop, system tray, Network Access Control Page, Control Internet usage and more. It can also disable the Ctrl+alt+delete keys, the function keys at startup, allows to password protect Windows and restrict users to running specific applications only, control Internet usage, view statistics of computer u
  • 1Click & Lock up is a system tray security utility you can use to secure your desktop when you step away from your PC. It's secure and very easy-to-use. Just define a password, and select Lock to hide and deny access to your desktop to anyone without the proper password. You can set the program to launch automatically with Windows, lock your desktop from the system tray, log access attempts, and apply a custom background image. When enabled, Secu
  • Power Spy secretly logs Facebook, Skype, keystrokes, chats & IMs, emails, web visits, video talk, microphone, logins, passwords, applications, searches and more. It also takes screenshots like a surveillance camera. Lets you know exactly what they do on a computer screen while you are away. Automatically sends log reports to your email or ftp. Starts monitoring with system startup. Runs silently and invisibly.
  • Aml Pages is tree-structured notes manager. It contains all your notes, information, web pages, passwords, URL-address in the form of a tree, so you can quickly find what you need. The Aml Pages can easily save web pages from the Internet and provides a sticky for quick notes. Manage megatons of your notes with ease at work and at home. Supports plain text, rich text and web pages, tables and figures, attachments, and many plug-ins.
  • USB Secure can password protect any portable media including USB drives, External drives and even memory cards. It supports plug and play and automatic execution. No administrator rights or install is required on the other computer. You can take your USB drive anywhere without a fear of data leak or theft in case of a stolen or lost USB drive. USB Secure is a great program for people keeping private data on portable devices when travelling.
  • Aml Pages is tree-structured notes manager. It contains all your notes, information, web pages, passwords, URL-address in the form of a tree, so you can quickly find what you need. The Aml Pages can easily save web pages from the Internet and provides a sticky for quick notes. Manage megatons of your notes with ease at work and at home. Supports plain text, rich text and web pages, tables and figures, attachments, and many plug-ins.
  • Power Spy Software secretly logs Facebook, keystrokes, chats, IMs, emails, websites visited, microphone, video talk, logins, passwords, applications, searches, documents and more. Logs Skype, Yahoo Messenger, ICQ, AIM, etc. Takes screenshots every x seconds like a spy cam. Sends logs to your email. You can check logs on a remote PC, tablet, smart phone, or directly on the monitored PC. Perfect for monitoring employees, kids and spouse.
  • Power Spy secretly logs Facebook, Skype, keystrokes, chats & IMs, emails, web visits, video talk, microphone, logins, passwords, applications, searches and more. It also takes screenshots like a surveillance camera. Lets you know exactly what they do on a computer screen while you are away. Automatically sends logs to your email or ftp. Starts monitoring with system startup. Perfect for parental control, monitoring employees or catching cheaters.
  • Privacy Drive is an easy-to-use encryption software that uses Virtual Disk & On-the-fly Disk Encryption Technology to lock, hide and encrypt all kind of pictures, videos, documents, files and folders, password protects sensitive information from unauthorized access.
  • Pro-PDF PDF Merger Splitter software is a PDF editing tool that can merge multiple PDF files or split one PDF into multiple. You can add PDF files or add complete folder containing PDF files to the software and process them as per the requirements. It supports password protected files, you can provide a password for multiple files or add password to each file. The default page range can be set in preferences as well as can be set for each file. The interface of the software is very easy to use. It is divided into three steps. The first stap is for adding the file into the application, now the second step is for the page range selection for example you want to use all pages of file or just a selected range like 1-4,6,11-15. The third step is to select the destination file or folder location for the output files. Now you just click on Merge or Split button and the files will be stored in the output location. There is a preference option in the software to store the default preference. Here you can specify ...
  • Organize thousands of Web Sites by Categories, Priorities, Search Words, and Users in a Secure Database. Collect Web Sites while browsing the internet, while simultaneously using any number of Browser Windows. Add the results of an internet search or the accessible links on a web page to the organizer database. You can view all your collected web sites by category, priority, web site name, and any of three search key words. Select a web site on the table and automatically go to that web site. You can create any number of Web Site Lists, and quickly browse the internet using your list with the click of your mouse. You can send and receive messages with web site list attachments or Zip File attachments by email. Internet Explorer Favorites can be selectively imported to the Net Viewer database showing the list of Internet Explorer Favorites. Any Web Site Page address can be exported back to Internet Explorer Favorites. You can save Web Sites with passwords in a separate table and associate with another Web Site ...

Page 1 of 10
1 2 3 4 5 6 7 8 9 10


Legal disclaimer | Privacy policy

© 2004-2015 IT Shareware