Home | Submit a file  |  New  |  Categories  |  Our awards  |  Link to us  |  RSS Feeds

Utilities :: Security & Encryption
Sort by: date | product title | rating | downloads | popularity
Display: short descriptions | full descriptions
  • StatWin is a comprehensive computer activity monitoring solution for individuals and businesses. It offers valuable statistics and lets you analyze how effectively you or your employees are using computers.
  • Laptop lid controller will increase your laptop security -- it will lock laptop when you close it. Also, it can suspend/shutdown the computer after specified time, play the sounds and execute applications. Different schemes for different power sources. The auto-mute option makes your PC silent when it going to sleep/suspend mode, turning off or while desktop locked. Also, the sound is automatically muted when the screensaver appears.
  • Indigo Scape Home delivers advanced Internet security features at a budget price and is perfect for restricting Internet access to family and home office computers systems. Parents or home users worried about allowing children or other sensitive Users Internet access can feel confident when using Indigo Scape.
  • If you are a collection agency or other business - privacy compliance and concerns have been on the rise and on the minds and agendas of our elected officials. The Collection Agency File Decimator is an eas to use utility that will completely erase the contents of sensitive files and folders that you specify. Normal file deletion only removes a file's directory entry, but leaves the data contained in the file on your disk drive.
  • Sticky Password creates the strongest passwords possible and manages them for you. With Sticky Password's password generator, you're just a click away from another strong password. The database is encrypted with the strongest encryption algorithms available in the industry, including the military-grade AES algorithm. You'll be protected from phishing scams, because Sticky Password won't send your login and password to fake websites.
  • TyphoonPassword provides a 100% secure place to keep all your login and password information, accessible by using a single master password that can be frequently rotated. By automatically detecting when you return to configured login screens, logging in is easy as copying and pasting. All passwords are stored using military strength encryption.
  • Snipe is a technological product based on both hardware and software. It was developed to empower parents and help them regulate the use of Internet by their children. It allows parents to use their own USB disk on a key and turn it in to a key for their computer.
  • Power Spy (Supports x64/x32) secretly logs all Facebook, keystrokes, chats, emails, web visits, web cam images, user names, passwords, searches and more. It supports Windows Live Messenger, Skype, Yahoo Messenger, ICQ and other IMs. It sends log reports to your email or ftp. You can check logs on another PC or your cell phone. Perfect for catching cheaters, monitoring employees, children and spouse and even investigating crimes.
  • Nowadays, USB drives are inevitable carrier of information for work and personal uses. However, many of us witness privacy disasters caused by unlucky handling of USB drives, typically losing them. xcept.me is invented to overcome this. It protects secret inside USB drives by pairing them with authorized computers. I shall no longer worry to lose my secret. Even the password is cracked, no one could access the information inside, except me.
  • Receive HTTP(HTTPS)-traffic from user applications. Send traffic HTTP(HTTPS)-traffic back to your applications. Work with proxy "CONNECT" commands. Work via proxy-servers. Encrypt outgoing traffic from your applications. Decrypt incoming traffic to your applications. Simultaneously operate with all your applications. Work with several iSec-servers and Update-servers. Automatically switch to available iSec-servers. Automatic software updates.
  • MySpace Spy Monitor is a MySpace profile monitoring software and parental control software. It secretly records PC users' MySpace private profile, emails, chats & IMs, list of friends, photos and events. MySpace Spy Monitor also records users' online searches about MySpace, its instant messenger MySpaceIM, and MySpace related web sites. You can see exactly what the users were doing just like watching a surveillance video playback.
  • Facebook Spy Monitor is a Facebook profile monitoring and parental control software. It secretly records PC users' Facebook private profile, emails, chats & IMs, photos, interests, contatcts and events by taking screen snapshots periodically. It also records popular Facebook instant messenging clients and Facebook related web sites and searches. See exactly what users were doing just like watching a surveillance video playback.
  • Dp Hash 1.0 is the succession from my DPASHA. This program supported at this time the following hash: adler32, crc16, crc24, crc32, crc64, EDonkey, MD2, MD4, MD5, SHA, SHA1, SHA256, SHA384, SHA512, Sapphire, Panama, Tiger, RipeMD128, RipeMD160, RipeMD256, RipeMD320, Haval128, Haval160, Haval192, Haval224, Haval256, Whirlpool, Whirlpool1, Square, Snefru128, Snefru256 and BMW224/BMW256 Blue Midnight Wish=BMW experimental version
  • AutoRun Disable is a free tool that helps you secure your PC. With it you can easily disable the possibly dangerous AutoRun feature of Windows (XP, Vista, 7). You can disable the auto-run feature based on device types (USB and other removable devices, CD/DVD, internal or network drives) or specific drive letters. Disabling auto-run will protect your PC against auto-run based malware like Stuxnet, Conficker, Downadup and others threats. To further protect your PC, we recommend to use Endpoint Protector Basic to monitor and control ports and interfaces such as USB, FireWire, card reader, CD / DVD, etc on your PC. This will protect them against unwanted use of portable storage devices like USB sticks, SD cards or portable hard drives to prevent data theft or data leaks.
  • To protect your PC, we recommend to use Endpoint Protector Basic to monitor and control ports and interfaces such as USB, FireWire, card reader, CD / DVD, etc on your PC. This will protect them against unwanted use of portable storage devices like USB sticks, SD cards or portable hard drives to prevent data theft or data leaks. The best companion for your application firewall, Endpoint Protector Basic is designed to protect your computer?s endpoints acting as a USB firewall. Endpoint Protector Basic installs on your PC and helps you manage your USB device fleet and also to control what devices are authorized to connect to your computer. With its ability to uniquely identify devices you can be sure that you are in control, no 3rd party can use your USB ports to copy data from your computer or to place potential malicious files on it. Gain full control over your laptop?s endpoint devices, everywhere you are: at the office, on the road or in an airport. All portable storage devices such as USB Flash Drives, iPod ...
  • CryptBox creates secure Safes, that can be used just like normal drives and which can be filled with yur data. All content of those safes are encrypted. Safes can only be opened if you know the password.
  • The program has been designed as general application for surveillance hybrid platforms working concurrently with wireless and wired IP webcams, TV-boards, capture cards, power-line, and USB webcams. It has web interface with the same form and functionality on the local and distant pcs. Users see MPEG-4 coded video and have complete management of the software via net that surveillance station can be operated without monitor, keyboard, and mouse attached. Software`s modular configuration significantly increases reliability because all components act as autonomous software. If one part fails, other parts continue working. For instance if the `capture` unit fails, `watchdog` restarts it right away that viewers don`t notice anything because they are watching video through a `playback` part. The software makes `repeated` recording that the `hard drive full` situation never happens. The recording can be constant or it can be activated by motion, human face recognition, or by schedule. The software has pre-alarm and ...
  • The program has been designed as common product for surveillance hybrid platforms running simultaneously with wireless and wired Internet cameras, TV-boards, capture boards, power-line, and USB cameras. It has web interface with the same form and functionality on the local and apart workstations. Customers see MPEG coded picture and have full management of the program through net that surveillance server can be operated with no monitor, keyboard, and mouse connected. Software`s modular configuration drastically increases reliability because all components proceed as independent software. If one unit stops working, other units continue working. For instance if the `capture` component fails, `watchdog` restarts it right away that users don`t notice anything because they are viewing picture through a `playback` unit. The software does `repeated` recording that the `hard drive full` situation never appears. The recording can be non-stop or it can be initiated by motion, human face detection, or by schedule. The s ...
  • Very simple free text/email encryption tool. Works in ANY windows program - Email-software, Word, Notepad etc etc. Just select some text in any software, press a key combination, select the encryption password and thats it. Your text becomes unreadable until you enter your password again.
  • The program locks desktop Windows on the lock. After you have closed the program on the lock, on a desktop cockroaches will run, they can be pressed which cursor of the mouse they are afraid, and also it is possible to choose in program adjustment an electronic eye or cockroaches.
  • The software has been created as general application for surveillance hybrid platforms functioning all together with wireless and wired Internet cameras, TV-cards, capture cards, power-line, and USB cameras. It has web interface with the same form and functionality on the local and apart workstations. Users view MPEG-4 coded picture and have complete control of the software through network that security server can be run with no screen, keyboard, and mouse attached. Program`s modular composition extensively improves reliability because all components act as autonomous applications. If one component stops working, other parts keep on running. For instance if the `capture` unit freezes, `watchdog` restarts it right away that users don`t notice anything because they are watching picture using a `playback` part. The program does `cyclic` recording that the `hard drive full` situation never happens. The recording can be constant or it can be initiated by movement, human face recognition, or by timetable. T ...
  • The software has been designed as universal program for security hybrid platforms functioning concurrently with wireless and wired Internet cameras, Television-boards, capture boards, power-line, and USB cameras. It has web interface with the equal look and functionality on the local and remote workstations. Users view MPEG coded picture and have full management of the software through net that surveillance workstation can be operated without screen, keyboard, and mouse attached. Program`s modular composition extensively improves reliability because all parts work as autonomous programs. If one component freezes, other modules go on running. For instance if the `capture` module stops working, `watchdog` starts again it right away that viewers don`t notice anything because they are viewing video using a `playback` part. The program performs `repeated` recording that the `disk full` situation never happens. The recording can be non-stop or it can be initiated by motion, human face detection, or by schedul ...
  • Catch a cheating spouse with evidences provided by Power Spy software. Power Spy secrectly logs all keystrokes, web sites, emails,, MySpace, Facebook, online searches, chats & IMs: MSN Messenger, Windows Live Messenger, ICQ, AOL Messenger, AIM, Yahoo! Messenger, Windows Messenger and Skype. Takes screen snapshots at every X seconds like a surveillance camera. You can receive reports remotely via emails or ftp.
  • Mini Key Log makes it possible for you to record user activities unnoticed. The monitoring is completely invisible and easy to use. Following activities are recorded: Keystrokes; Password inputs; Mouse clicks; File operations; Printer; Scanner; Modem; Removable media; Power state; Visited web sides; Screenshots; User login; Clipboard.
  • PDF Encryption software set pdf passwords, block pdf from printing and text copying. Software easily and instantly adds pdf open password and owner password. Batch pdf restrictions software disables pdf print option; protect pdf data by applying 40 bits, 128 bits RC4 and AES encryption. Software batch encrypt pdf files, instantly restrict pdf form filling, signing, commenting, extraction etc with owner password. Using AWinware pdf password software, protects pdf from unauthorized person, insure that the pdf file is only opened by intended recipient only. Software supports all windows based operating systems including Windows 7, Vista and XP. Tool is useful to disallow pdf printing copying editing filling, turn permissions to Not Allow mode. Features: # PDF encryption tool process multiple documents in a single hit. # Tool can be easily installed and run on latest windows including Win7 32bits and 64bits. # Software supports both 40 bits and 128 bits encryption security. # Tool preserves last setting used ...

Page 21 of 30
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30


Legal disclaimer | Privacy policy

© 2004-2017 IT Shareware