Home | Submit a file  |  New  |  Categories  |  Our awards  |  Link to us  |  RSS Feeds

Utilities :: Security & Encryption
Sort by: date | product title | rating | downloads | popularity
Display: short descriptions | full descriptions
  • The SafeWeb is a freely available utility that allows you to quickly and efficiently set up your computer to use DNS servers provided by OpenDNS.
  • Make use of Kernel File Shredder and delete files or folders from computer?s hard disc permanently. The best aspect about this tool is it comprises of multiple shredding algorithm to make files shredding impeccable. What makes it more special is its remarkable feature of data shredding algorithm. This algorithm has been embedded in this software that allows the user to select and shred files and folders depending on the data sensitivity. Apart from this, the product helps you to automatically shred the temporary system files, content of the Recycle Bin, and free disk space along with allowing you to shred them manually whenever you want. Another great aspect about Kernel File Shredder tool is it facilitates you specify password for secure software access so that no one can use it for destroying purpose. Moreover, you don?t even require spending pointless time in getting familiar with or installing such computer program into your personal computer. It doesn?t matter, whatever is the format of file that you wan ...
  • Skype Spy Monitor secretly record Skype's incoming and outgoing chat messages. It runs completely invisibly so that Skype users won't know its existence. Skype Spy Monitor send log reports to your email or ftp periodically. You can also check logs directly on the monitored PC. It is a small but powerful program that consumes very little system resource. Perfect for monitoring employees, children or spouse, and even investigating crimes.
  • The generation of cryptographic keys and certificate requests X.509, and other service functions associated with the formation and maintenance of key systems of the carriers in PKI (Public Key Infrastructure - PKI), supporting secure applications built on the basis 2-keys cryptographic algorithms. Support: GOST R34.10-2001, RSA, DSA, eToken, Rutoken EDS, KRYPTON, Accord-AMDZ, Sobol...
  • This is a free monitoring software designed for covert invisible surveillance. The main function of the program is keystrokes recording, but it can also capture visited web pages and save text data from Windows clipboard (copied text). WIth this program, you will always know what the users are doing on computer. This is a prefect solution for parents who care about their child's online safety; for system administrators, chiefs and so on.
  • VirShield - free program for safe web-surfing. VirShield is free site adviser and filter which guard you form the undesirable site visiting. Make your web surfing safe.
  • Secret File Messenger is a steganography software and you can easily encrypt file or text message and hide it in a picture. Once a file is hidden in an image the saved picture is still a picture, it will load just like any other image and appear as it did before, the only difference will be that it contains hidden file. The image can be saved, emailed, uploaded to the web as before the only difference will be that it contains hidden data. You can also decrypt and extract your hidden file or message. It is extremely user-friendly tool and help you step by step with its wizard. File security and integrity are currently the most important issues in the world of information technology. Keep your private data safe with the help of Secret File Messenger. Key Features : Hide Secret and Confidential File into an Image. Support JPG/PNG/BMP/GIF/TIF Image format. Support ALL Major File Format like (DOC/DOCX/XLS/XLSX/PPT/PPTX/TXT/INI/RTF/PDF) Encrypt File Before Hiding. Extract & Decrypt Hidden File ...
  • Automatically clear the list of recent documents history at specified intervals. You can choose clearing interval. You can enabled and disable the clear documents history procedure. This application sits in the system tray at the bottom right corner of the screen. Once you install it, it will start automatically with system boot.
  • Folder password protect software keeps your data safe even under the DOS and Windows Safe Mode. Folder password protect can be also used for password protecting portable drives such as USB, memory cards and CD/DVD drives. This application will only password protect files and folders, it does not encrypt the protected files and folders.
  • ShareRight is a network administration tool providing detailed analysis of all file shares and documents on the network and their associated NTFS permissions, together with discovery and quick launch of each shared folder,document and VNC viewer. In addition, notes may be recorded for each machine for support and maintenance purposes.
  • Ax3soft Scout process activity monitor is a professional monitoring tool for Windows, it can monitor a process all-sidedly in real time, including process/thread, file system, Registry and network activity whit its powerful features. To create a detail report for process, Ax3soft Scout makes it easy to find and solve your computer problems, e.g. malware, troubleshooting. Key Features Real-time monitor and analyze Ax3soft Scout can monitor process/thread, file system, Registry and network activity (includes: IP, ICMP, TCP and UDP conversations, HTTP visit, Email transfer and FTP transfer) real-time and analyze these activities to identify security threats with different colors. Detail reports Ax3soft Scout can analyze numerous activities to create a detail report for process, the report?s content is very clear, it includes all the threats found and some key activities events. You can find and solve computer problems quickly and easily with the report, even if you don?t have extensive computer knowled ...
  • Anykeylogger, as one of hot monitor software in the world, is widely applied to parental control, employee monitoring and private detective service. The keylogger allows you to record entire activities, including online chat details, typed keystrokes, clipboard contents and other activities performed on your PC. It can also captures screenshots at regular time of interval so that you can easily know what is happening on computers in your absence.
  • M3 Bitlocker Decryption Free is the World's first free Bitlocker drive decryption software to decrypt data from inaccessible, corrupted, damaged or failed Bitlocker encrypted hard drive under Windows 8.1/8/7/Vista and Windows Server 2012/2008 32 bit and 64 bit.
  • The all-in-one spy program which intercepts everything that is typed on keyboard, monitors visited websites, scans Windows clipboard for changes, makes screenshots every few minutes. It can also monitor both sides of IM chats and activity in social networks. And this program is absolutely invisible for everyone except you. You just have to press a speical hotkey, and enter your password to show the keylogger. You can easily read spy reports.
  • Malicious File Hunter, or MFH for short, is a security software that runs on Windows and allows IT Security Administrators to search for the presence of one or multiple files across their entire network of Windows systems. For example, if a known malicious file is found on one computer, an IT Administrator can use MFH to check if any other system on the network is infected with the same malware. Search query is based on full, partial or wild card
  • In the modern work place, managers effectively use network pc monitoring to ensure employee productivity and to keep an eye on undesirable system activities. Kernel Computer Activity Monitor is an advanced tool designed for this purpose. It is invisible to the PC users, as it does not appear in the Task Manager, Process List, Desktop, and Add/Remove Programs. It is a useful tool for organizations as well as individuals - investigators can use it to spy system happenings, and parents can use it to monitor the activities of children. It invisibly takes screenshots, records key strokes, monitors internet and email activities, gives information about Application accesses, saves clipboard activities, tracks passwords and notifies of print activities. Using this tool is an easy thing because of its user-friendly interface. You can configure this application to monitor and record the activities, so that your physical presence is not necessary at the time of monitoring. In addition, there is an option to receive reco ...
  • Encrypt and decrypt whole files or their parts using AES, Triple-DES (3DES), RC2, and DES symmetric algorithms. You can encrypt files with a single password or specify cryptographic keys (vectors) instead. You can change key bit length for better protection. You can select specifically which bytes in a file should be encrypted/decrypted, though by default the whole file is processed.
  • Power Spy secretly logs Facebook, keystrokes, chats & IMs, emails, web visits, video talk, logins, passwords, applications, searches and more. It also takes screenshots like a surveillance camera. Let you see exactly what they see on a computer screen. Automatically sends log reports to your email or ftp. Starts monitoring with system startup. Runs silently and invisibly. Only administrator of the software can manage it with hotkey.
  • Windows Spy Software secretly logs Facebook, keystrokes, chats, IMs, emails, websites visited, microphone, video talk, logins, passwords, applications, searches, documents and more. Logs Skype, Yahoo Messenger, MSN, ICQ, AIM, etc. Takes screenshots every x seconds like a spy cam. Sends logs to your email. You can check logs on a remote PC, tablet, smart phone, or directly on the monitored PC. Perfect for monitoring employees, kids and spo
  • PC Ports and connections data monitoring, logging and analyzing software. Device Monitor is an USB, Serial and Network protocol analyzer, data logger software and may be used to capture, log, view and analyze data coming to and out of your computer. Recorded log files can be replayed later even on another computer. Device Monitoring Studio provides you with complete set of features to figure out what's going on when device is connected to the PC
  • Store many passwords in software so that you do not need to remember them yourself.
  • JiJi Password Expiration Notification is a simple tool to notify users, managers and administrators through e-mail before their password and account expire. Administrator can receive the summary report to the specific email ids. Administrator can define the notification task for any specified target (Domain, an OU, Group, Set of Users).
  • IP Hider Ever is a professional software used to hide your IP address so that you can hide your internet traffic and the real location while surfing the web. This best IP hider software provides government-level safety protection, makes nobody know what you do on the internet. So you can surf wherever you want on the web without worrying about any of the information leaked. With a very friendly and simple-to-use user interface, an affordable and attractive price, as well as the best customer service, IP Hider Ever now has more then 23 thousands subscription users all over the world. We promise to continuously improve our technology and our service to meet the demands of all users, give them the best user experience ever. IP Hider Ever is a super easy program to hide your ip. Dozens of IP address from all countries available to be your choice. One-click to make connection anonymously. Government-level encrypted transmission, impeccable. Reconnect automatically when dropped , all-round protection of your privac ...
  • Stealth Parental Control offers a complete Internet Monitoring and Parental Control Software solution. Stealth Parental Control can secretly record information on your computer and allows you to specify what days and hours your children may access the computer, internet or any game on your system! Our advanced stealth technology ensures that Stealth Parental Control remains completely hidden from everyone except you.

Page 10 of 30
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30


Legal disclaimer | Privacy policy

© 2004-2017 IT Shareware