Home | Submit a file  |  New  |  Categories  |  Our awards  |  Link to us  |  RSS Feeds

Utilities :: Security & Encryption
Sort by: date | product title | rating | downloads | popularity
Display: short descriptions | full descriptions
  • Hide your files and folders from prying eyes. Set your master password and lock your files. No one can access your files without your master password. Hide Files supports NTFS, FAT32 and FAT16 file system types, local hard drives, external hard drives, SSD drives, SD cards and USB flash disks. Hide Files can lock and unlock your gigabytes of data within seconds.
  • Encrypt Internet surfing data, and protect online privacy when using the Internet in potentially unsafe locations, such as unprotected WiFi hotspots in hotels or cafes.
  • KillDisk Industrial is a secure eraser designed for large-scale industrial applications such as data centers where it's often necessary to wipe multiple hard drives at once securely and efficiently. Meeting more than 20 international data security standards, this disk sanitizer supports both Linux- and Windows-based servers.
  • KillDisk Desktop is a data destruction appliance that securely erases all the contents stored on hard disks and other storage devices. It permanently deletes all data so that it will never be recoverable, and it can automatically erase up to five hard disks as soon as you connect them to the system. For extra peace of mind, it can also print out certificates and reports detailing the process.
  • Phone Spy Software is a stealth app which allows you to secretly record all activities of your smart phone. Phone Spy Software allows you to listen to actual phone calls and record every SMS and log every call. All the calls and SMS logs are uploaded to your online account. Phone Spy Software starts at the phone boot and records every SMS message sent or received, logs all inbound and outbound phone calls. See more: www.phonespysoftware.com
  • It doesn't require extraordinary motive or means to hack remotely accessible systems for their processing power. But due to many organizations poor security practices, there's plenty of opportunities. RDS-Knight is the optimal solution for the detection challenge, combining real-world experience and expert insights with smart, easy-to-use and efficient software, enabling rapid response to enforce security.
  • Encrypt Internet surfing data, and protect online privacy when using the Internet in potentially unsafe locations, such as unprotected WiFi hotspots in hotels or cafes.
  • PC Activity Viewer is a PC activity monitoring software that gives you access to live video and statistical information of all PCs on the network. PC Activity Viewer also allows you to record videos, take pictures, and run a wide range of tasks on the monitored computers. PC Activity Viewer allows you to remotely install its client agent on remote computers as long as you provide administrator credentials for the target computer.
  • Easy and comfortable Smarthide VPN Client for secure Internet surfing. Unblock blocked sites, full Internet traffic encryption, hide your IP. Complete security and protection.
  • SterJo Wireless Key Generator is a tool that generates strong WEP, WPA or WPA2 key for your wireless network that cannot be easily broken by intruders. This product generates ASCII or HEX key that needs to be added into your router's configuration and prevent unauthorized access to your Wi-Fi network.
  • SterJo Browser Passwords is an easy-to-use tool that recovers passwords for most popular web browsers like: Chrome, Firefox, Internet Explorer, Microsoft Edge and Opera. Recovered data includes the URL (website address), the forgotten username with password, and the browser used to store those details. Other than that, you can easily save all recovered passwords to a text file clicking the save button.
  • Cloud secure allows you to password protect cloud folders on your PC. It works with Google Drive, One Drive, Dropbox and Box. It keeps your cloud files and folders synced, backed up and password-protected. Cloud secure is a comprehensive solution for users who don't want others tampering with their important files and folders saved in their cloud accounts.
  • RDS-Knight is the optimal solution to detect cyber threats, defend RDS servers and develop remote desktop systems' security. RDS-Knight combines five great protections to keep Remote connections safe at all time. Easy-to-use and efficient RDP software, it enables rapid response to cyber breaches to enforce security for both Remote Desktop' users and administrators. Download it now and keep the hackers away from your RDS Servers !
  • In order to use biometric devices in your application, you need driver for your scanners. Fingerprint scanner driver allows biometric devices to communicate with your computer. Software developers can use this driver in their application along with a fingerprint SDK (software development kit). These scanners support various third party fingerprint software applications. The driver needs to be manually installed on your computer. Biometric devices are USB based and can get connected through a USB port of your computer. These devices help you capture fingerprint images and save it on your computer. While you install the driver, the fingerprint image capture software also gets installed on your computer and is readily available for you to use. The fingerprint capture software allows you to store fingerprint images on your computer as BMP (bitmap image file) image files. You can download the fingerprint scanner driver (EasyInstallation v3.12) Windows 32 bit & 64 bit from: https://www.bayometric. ...
  • SterJo Strong Password Generator creates strong and random passwords based on the characters you want to use. Nowadays password security should be taken really seriously, especially after several announces for security breaches into some large companies like Yahoo, Opera and Dropbox.
  • Autonomous Privacy Project - Secure your files with strong Whitenoise encryption. Whitenoise is patented globally including Canada, US, China, India and the European Union. Protect data from hackers. Save data with strong encryption. Send safely by email. Store files securely. Upload secure files to the cloud. You control your own private key with pass phrases. Cloud service providers do not ever have copies of your self directed encryption.
  • USB fingerprint scanners (i.e. Hamster IV, Hamster Plus) help you capture fingerprint images. These devices get plugged into the USB port of your computer. In order to use these devices in your application, you need legacy driver. It allows scanners to communicate with your computer. Usually Hamster IV or Hamster Plus fingerprint scanner devices come with 2 types of drivers, the legacy driver or the Windows Biometric Framework (WBF). The Legacy driver needs to be installed manually when you plug in the scanner on to the computer. If the legacy driver is installed on Windows 7 or later computer then there is a chance that the driver will be over-written by the WBF driver= during Windows updates. To avoid this, please update the SDK dll, for example, sgfplib.dll (from FDx SDK Pro).
  • Power Spy secretly logs Facebook use, keystrokes, chats, emails, web sites, web cam images, user names, passwords, applications excuted and more. It records IMs in Skype, Yahoo Messenger, ICQ and others. Power Spy runs silently with system startup and automatically sends log reports to your email or ftp. Easy to install and setup. It is widely used in offices, homes, schools, detective agencies and police department.
  • CDR Data Analysis Software is best call data analysis software which is track call information from your CDR file extract your data according to max call, max durations, max cell tower information & grouping caller IMEI number - which is showing how much cell number you're using to your IMEI Numbers.
  • Secure File Sharing With Digital Rights Management.Safeguard file sharing without boundaries. AssureFiles Secure File Sharing combines AES 256 bit encryption with digital rights management to give businesses persistent control over all stages of its life,enable employees to share files safely. Dynamically control file access,grant or revoke the file access control at any time even files were shared. Keep tracking and auditing to the shared files.
  • ATS Call Data Record analyzer can import and analyze CDR/Tower CDR Data from any service provider in India or Other Country and Its generates a comprehensive report of frequency statistics including service provider details and subscriber details.
  • Our Spy Software is top-10-Spy Software Pro is a Complete Stealth Monitoring Software that can both monitor your Local PC and Remote PC or any Android (cell Phone or Tablet) device. WinSpy Software will capture anything the user sees or types on the keyboard. Win-spy will also capture WebCam shots and record surrounding sounds. Now Works behind Firewalls and Routers. New build includes JPG and PDF Remote File and Advanced Android Monitoring.
  • An Open PGP add-in for Microsoft Office Outlook that is simple to install and easy to use. Integrates with the Outlook toolbar. Generate a key pair, or import your existing key. Configure sending rules. Upload or retrieve keys from open key servers. Compatible with Enigmail and PGP. Fully supported by the humans at Encryptomatic LLC. Free for personal use. Try it today!
  • Super Keylogger is a professional yet very easy to use invisible keylogger for big and small companies, network administrators, concerned parents and PC owners. Super Keylogger includes several integrated recording modules that monitor: chat convos, e-mails, Internet history, keystrokes recorder, passwords! For more details: www.superkeylogger.com

Page 1 of 30
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30


Legal disclaimer | Privacy policy

© 2004-2017 IT Shareware