Home | Submit a file  |  New  |  Categories  |  Our awards  |  Link to us  |  RSS Feeds

Utilities :: Security & Encryption
Sort by: date | product title | rating | downloads | popularity
Display: short descriptions | full descriptions
  • Hide your files and folders from prying eyes. Set your master password and lock your files. No one can access your files without your master password. Hide Files supports NTFS, FAT32 and FAT16 file system types, local hard drives, external hard drives, SSD drives, SD cards and USB flash disks. Hide Files can lock and unlock your gigabytes of data within seconds.
  • Encrypt Internet surfing data, and protect online privacy when using the Internet in potentially unsafe locations, such as unprotected WiFi hotspots in hotels or cafes.
  • KillDisk Desktop is a data destruction appliance that securely erases all the contents stored on hard disks and other storage devices. It permanently deletes all data so that it will never be recoverable, and it can automatically erase up to five hard disks as soon as you connect them to the system. For extra peace of mind, it can also print out certificates and reports detailing the process.
  • Encrypt Internet surfing data, and protect online privacy when using the Internet in potentially unsafe locations, such as unprotected WiFi hotspots in hotels or cafes.
  • Phone Spy Software is a stealth app which allows you to secretly record all activities of your smart phone. Phone Spy Software allows you to listen to actual phone calls and record every SMS and log every call. All the calls and SMS logs are uploaded to your online account. Phone Spy Software starts at the phone boot and records every SMS message sent or received, logs all inbound and outbound phone calls. See more: www.phonespysoftware.com
  • It doesn't require extraordinary motive or means to hack remotely accessible systems for their processing power. But due to many organizations poor security practices, there's plenty of opportunities. RDS-Knight is the optimal solution for the detection challenge, combining real-world experience and expert insights with smart, easy-to-use and efficient software, enabling rapid response to enforce security.
  • SterJo Wireless Key Generator is a tool that generates strong WEP, WPA or WPA2 key for your wireless network that cannot be easily broken by intruders. This product generates ASCII or HEX key that needs to be added into your router's configuration and prevent unauthorized access to your Wi-Fi network.
  • KillDisk Industrial is a secure eraser designed for large-scale industrial applications such as data centers where it's often necessary to wipe multiple hard drives at once securely and efficiently. Meeting more than 20 international data security standards, this disk sanitizer supports both Linux- and Windows-based servers.
  • Cloud secure allows you to password protect cloud folders on your PC. It works with Google Drive, One Drive, Dropbox and Box. It keeps your cloud files and folders synced, backed up and password-protected. Cloud secure is a comprehensive solution for users who don't want others tampering with their important files and folders saved in their cloud accounts.
  • SterJo Strong Password Generator creates strong and random passwords based on the characters you want to use. Nowadays password security should be taken really seriously, especially after several announces for security breaches into some large companies like Yahoo, Opera and Dropbox.
  • SterJo Browser Passwords is an easy-to-use tool that recovers passwords for most popular web browsers like: Chrome, Firefox, Internet Explorer, Microsoft Edge and Opera. Recovered data includes the URL (website address), the forgotten username with password, and the browser used to store those details. Other than that, you can easily save all recovered passwords to a text file clicking the save button.
  • Power Spy secretly logs Facebook use, keystrokes, chats, emails, web sites, web cam images, user names, passwords, applications excuted and more. It records IMs in Skype, Yahoo Messenger, ICQ and others. Power Spy runs silently with system startup and automatically sends log reports to your email or ftp. Easy to install and setup. It is widely used in offices, homes, schools, detective agencies and police department.
  • Autonomous Privacy Project - Secure your files with strong Whitenoise encryption. Whitenoise is patented globally including Canada, US, China, India and the European Union. Protect data from hackers. Save data with strong encryption. Send safely by email. Store files securely. Upload secure files to the cloud. You control your own private key with pass phrases. Cloud service providers do not ever have copies of your self directed encryption.
  • USB fingerprint scanners (i.e. Hamster IV, Hamster Plus) help you capture fingerprint images. These devices get plugged into the USB port of your computer. In order to use these devices in your application, you need legacy driver. It allows scanners to communicate with your computer. Usually Hamster IV or Hamster Plus fingerprint scanner devices come with 2 types of drivers, the legacy driver or the Windows Biometric Framework (WBF). The Legacy driver needs to be installed manually when you plug in the scanner on to the computer. If the legacy driver is installed on Windows 7 or later computer then there is a chance that the driver will be over-written by the WBF driver= during Windows updates. To avoid this, please update the SDK dll, for example, sgfplib.dll (from FDx SDK Pro).
  • Super Keylogger is a professional yet very easy to use invisible keylogger for big and small companies, network administrators, concerned parents and PC owners. Super Keylogger includes several integrated recording modules that monitor: chat convos, e-mails, Internet history, keystrokes recorder, passwords! For more details: www.superkeylogger.com
  • ATS Call Data Record analyzer can import and analyze CDR/Tower CDR Data from any service provider in India or Other Country and Its generates a comprehensive report of frequency statistics including service provider details and subscriber details.
  • An Open PGP add-in for Microsoft Office Outlook that is simple to install and easy to use. Integrates with the Outlook toolbar. Generate a key pair, or import your existing key. Configure sending rules. Upload or retrieve keys from open key servers. Compatible with Enigmail and PGP. Fully supported by the humans at Encryptomatic LLC. Free for personal use. Try it today!
  • CDR Data Analysis Software is best call data analysis software which is track call information from your CDR file extract your data according to max call, max durations, max cell tower information & grouping caller IMEI number - which is showing how much cell number you're using to your IMEI Numbers.
  • Our Spy Software is top-10-Spy Software Pro is a Complete Stealth Monitoring Software that can both monitor your Local PC and Remote PC or any Android (cell Phone or Tablet) device. WinSpy Software will capture anything the user sees or types on the keyboard. Win-spy will also capture WebCam shots and record surrounding sounds. Now Works behind Firewalls and Routers. New build includes JPG and PDF Remote File and Advanced Android Monitoring.
  • Decrypter is a freeware, portable, and simple app that allows the decryption of files encrypted by CryptoForge encryption software. It is very easy-to-use, it does not need to be installed on the computer, and it can run from external USB drives. Just drop the encrypted file into the app's window, enter the password, and you are done.
  • Free Password Strength Meter checks the level of strength of your passwords. It uses information entropy as a measure of strength and reliability. It shows you the level of password strength using a scale of levels: very weak, weak, reasonable, good, strong and very strong. It is recommended to use only strong and very strong passwords. Check your passwords and use only strong and secure passwords to protect your privacy.
  • CDR Analysis software helps to import CDR and analyze CDR/Tower file from any service and generates a comprehensive report of frequency statistics including service provider details and subscriber details (SDR)* of CDR Numbers. CDR Analysis software supports all type CDR file like as .Txt, .CSV,.XLS & .XLSX from All service providers. Software supports all country service provider & CDR file.
  • PDF Postman offers an easy way to send private emails with MS Outlook. Messages and files are placed in a PDF file then encrypted with strong AES-256 encryption. Since most recipients already have a PDF viewer, they only need to click on the encrypted pdf file and enter a password. Works across devices and platforms. No expensive or complex S/MIME certificates to install. Download a free trial of PDF Postman.
  • Mobile Spy Mobile Monitoring Software helps to keep records of your activities, logs details, GPS location, which quickly gets uploaded to your mobile spy account which you have created. It is compatible and works for most models of iPhone, Blackberry or Android. This software works independently. It does not depend on your phone. So even you try to delete the message in your phone it has no effect on the software, the details already gets save in the software. To view the details of the user you have to just login into your account with a computer or mobile. If you are concern about your child or employee misusing the cell phone then this software is for you. This mobile spy gets you the current location as often you want. It helps to keep track on your children and subordinates. The Parents can keep track of the website visited by their children with the help of this software.

Page 1 of 30
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30


Legal disclaimer | Privacy policy

© 2004-2017 IT Shareware