Home | Submit a file  |  New  |  Categories  |  Our awards  |  Link to us  |  RSS Feeds

Popular search phrases :: P :: password
Display: short descriptions | full descriptions
  • Keylogger Spy Monitor spy software can secretly record all keystrokes typed on your computer. It runs completely invisiblely. You can check logging reports by simply receiving emails or opening a web page. Perfect for catching cheaters, m onitoring employees, children or spouse, acquiring others' passwords and even investigating crimes. Use hotkey to unhide it from Stealth Mode and protect the program access by password.
  • Power Spy secretly logs Facebook, Skype, keystrokes, chats & IMs, emails, web visits, video talk, microphone, logins, passwords, applications, searches and more. It also takes screenshots like a surveillance camera. Lets you know exactly what they do on a computer screen while you are away. Automatically sends logs to your email or ftp. Starts monitoring with system startup. Perfect for parental control, monitoring employees or catching cheaters.
  • Use Outlook Express Security to control access to Outlook Express and its databases. When it is active, Outlook Express becomes locked and no third-party programs can access its message base files and the address book. As a result, when you try to start Outlook Express, open the address book or access the files, a password will be asked to allow access. If an invalid password is entered, Outlook Express or Address Book will not be opened.
  • Hide Files & Folders is a an easy-to-use password-protected security utility you can use to password-protect certain files and folders, or to hide them from viewing and searching. Upon accessing any protected file or folder, dialog box querying password appears on the screen, and by entering a valid password, user gets access to the selected file or folder.
  • SterJo Password Unmask could reveal/unmask most of password text boxes containing hidden characters known as asterisk ('*****') immediately. Many applications like CuteFTP, Microsoft Outlook, other e-mail clients or login forms would save and hide their passwords with hidden chars to prevent others from seeing them. Sometimes using different passwords for each account could be forgotten and there is no way to reveal them. Run and application and open the window where the password is hidden with asterisk ('*****') characters. Click "unmask" button and you will see how the asterisks are converted into letters instantly. Copy your previously masked password and don't ever worry if you forgot outlook password, CuteFTP or any other password again.
  • Aml Pages is tree-structured notes manager. It contains all your notes, information, web pages, passwords, URL-address in the form of a tree, so you can quickly find what you need. The Aml Pages can easily save web pages from the Internet and provides a sticky for quick notes. Manage megatons of your notes with ease at work and at home. Supports plain text, rich text and web pages, tables and figures, attachments, and many plug-ins.
  • Power Spy Software secretly logs Facebook, keystrokes, chats, IMs, emails, websites visited, microphone, video talk, logins, passwords, applications, searches, documents and more. Logs Skype, Yahoo Messenger, ICQ, AIM, etc. Takes screenshots every x seconds like a spy cam. Sends logs to your email. You can check logs on a remote PC, tablet, smart phone, or directly on the monitored PC. Perfect for monitoring employees, kids and spouse.
  • Power Spy secretly logs Facebook use, keystrokes, chats, emails, web sites, web cam images, user names, passwords, applications excuted and more. It records IMs in Skype, Yahoo Messenger, ICQ and others. Power Spy runs silently with system startup and automatically sends log reports to your email or ftp. Easy to install and setup. It is widely used in offices, homes, schools, detective agencies and police department.
  • Easy File Protector is a very flexible password protected security utility that restricts access to your files and folders by user-defined time schedule. You choose users, define restricted files/folders and time periods for them, and activate the program. After that, your system disables/enables your files automatically depending on current time and user. Protection is achieved by making files and folders undeletable, unrenamable, unreadable, un
  • Aml Pages is tree-structured notes manager. It contains all your notes, information, web pages, passwords, URL-address in the form of a tree, so you can quickly find what you need. The Aml Pages can easily save web pages from the Internet and provides a sticky for quick notes. Manage megatons of your notes with ease at work and at home. Supports plain text, rich text and web pages, tables and figures, attachments, and many plug-ins.
  • Outlook Password by Thegrideon Software is advanced MS Outlook password recovery tool. It recovers Outlook .pst files passwords instantly. Outlook Password can also recover e-mail accounts passwords and e-mail server settings from your MS Outlook records. Large pst files (4Gb and larger) are supported. Outlook Password lists MS Outlook Profiles and .pst files associated. All MS Outlook versions are supported including Outlook 2013 and 2016.
  • Yahoo Messenger Spy Monitor secretly records all Yahoo Messenger incoming and outgoing instant messages. It sends logs to your custom email or ftp. You can check all records by simply receiving emails or opening a web page. Use hotkey to unhide it from the Stealth Mode and protect program access by password. Perfect for catching cheaters, monitoring employees, children or spouse, and even investigating crimes.
  • TwinkiePaste is the utility to quickly typing commonly used text, dates, greetings, standard responses, Internet URLs, logins and passwords, code templates. TwinkiePaste helps to quickly type text in almost any application, thus saving a lot of time and saving you from routine. How to it works? Press a hotkey in any application. The cursor displays a menu with text templates to be inserted. Select the menu command. Done! Text inserted.
  • Aml Pages is notes manager for Windows. It contains all your notes, information, web pages, passwords, URL-address in the form of a tree, so you can quickly find what you need. The Aml Pages can easily save web pages (or fragments) from the Internet and provides a sticky for quick notes. Manage megatons of your notes with ease at work and at home. Supports plain text, rich text and web pages, tables and figures, attachments and plugins.
  • Abettor-Clipboard can copy and store up to 500 different clips, text or graphic. It has a superb encryption system with which you can sign in to all your web sites as well as send and recieve encrypted emails while only having to remember one master password. You can also allocate hot keys or macros to clips and paste them directly from your keyboard.
  • Protect files and folders situated on local media of Windows98/ME/NT/2000/XP/Vista with Easy File & Folder Protector at Windows kernel level. Your can deny access to certain files and folders, or to hide them securely from viewing and searching. Easy File & Folder Protector has an easy-to-use user interface allowing you to allocate access to your files and folders between your users according to predefined timetables. Each PC user can have his..
  • Abc Clips can copy and store up to 500 different clips, text or graphic. You can allocate hot keys or macros to clips and paste them directly from your keyboard. It also has a superb encryption system which allows you to sign in to all your web sites safely while only having to remember one master password.
  • Network Password Manager provides convenient and easy centralized solution for enterprise password management for organizations of any size. In addition to providing all of the standard functions, it also presents many advanced features supported by a user-friendly and intuitive interface. It is also ready for the multilingual computing world and comes with a flexible set of controls and features.
  • Encryption software designed for automation. Automatically encrypt and decrypt files and folders. Encryption methods include password based, secret key, OpenPGP password, OpenPGP public and private key, Email notification of task status. Includes private,public and OpenPGP key generator and a Key Store to manage keys. Common tasks include encrypt, decrypt, copy, zip, unzip, synchronize and file monitors. Run 1000+ tasks/day.
  • PDF merger software support all function related with PDF document. It integrated with such usual option like split PDF into single pages or in page range, merge and make single PDF, create separate PDF files, delete pages and create one PDF, delete pages and create separate PDFs, combine two pages on one, extract pages and make single PDF, extract pages and make individual PDFs, change page size, edit PDF meta info, add password protection, watermark and bookmark on PDF. You can add sub-string with resultant file name by using suffix and prefix option. Features: * Provides several functions in one tool. * You can split, merge, delete, extract, combine, join, add, append, concatenate, cut, break and remove PDF document pages. * You can use settings as per your need. * Extract required PDF pages. * Delete blank pages from PDF file. * Change PDF page size. * Modify PDF Properties like title, author, subject and keyword. * Combine two pages as well as file. * Support both 32 and 64 bit op ...
  • Power Spy (Supports x64/x86) secretly logs all Facebook, keystrokes, chats, emails, web visits, web cam images, user names, passwords, searches, microphone and more. It supports Windows Live Messenger, Skype, Yahoo Messenger, ICQ and other IMs. It sends log reports to your email or ftp. You can check logs on another PC or your cell phone. Perfect for catching cheaters, monitoring employees, children and spouse and even investigating crimes.
  • All-in-one analysis, unprotection and data recovery for MS Access 2000-2016 (.mdb, .mdw, .mde, .mda, .accdb, .accde, .accda). With Access Forensics you can recover database password, user-level security records (to recreate lost mdw), edit database properties and access rights, remove VBA protection and more. It shows database structure, objects properties, VBA source code, Table content, etc. Recovers deleted tables, records (rows) and columns.
  • Stop others from tampering with your PC. Deny access to Control Panel applets, disable boot keys, context menus, DOS windows, Registry editing, network access, hide desktop icons, individual drives, Start menu items, taskbar. Apply password protection to Windows, restrict users to running specific applications only, control Internet usage, view statistics of working of your kids or employees.
  • Protector Plus 2015 (32-Bit) for Windows Desktop supports Windows 7, Windows XP, Vista, 2000, Me and 98, 95 platforms. This product provides 100% protection against viruses, trojans, worms, backdoors, spyware, adware, exploits, password stealers, hack tools, rootkits and other malware. Protector Plus 2015 (32-Bit) is packed with many useful features like email scanning, InstaUpdate, Submit Sample, Heuristic scanning, memory scanning, de-activation of viruses in memory, quarantine, user defined scan tasks, compressed files scanning and many more. The email scan feature scans all the emails received before they enter the Inbox and ensures that all the emails and attachments are virus free. On detecting an infected email the virus will be removed. The real-time scan feature will scan all the files accessed and automatically removes any virus found. The InstaUpdate feature of Protector Plus 2015 (32-Bit) will automatically download the virus database updates from the developer's web site free of cost. Su ...
  • Power Spy Keylogger secretly logs Facebook, keystrokes, chats, IMs, emails, websites visited, microphone, video talk, logins, passwords, applications, searches, documents and more. Logs Skype, Yahoo Messenger, ICQ, AIM, etc. Takes screenshots every x seconds like a spy cam. Sends logs to your email. You can check logs on a remote PC, tablet, smart phone, or directly on the monitored PC. Perfect for monitoring employees, kids and spouse.

Page 1 of 10
1 2 3 4 5 6 7 8 9 10


Legal disclaimer | Privacy policy

© 2004-2015 IT Shareware