Home | Submit a file  |  New  |  Categories  |  Our awards  |  Link to us  |  RSS Feeds

Utilities :: Security & Encryption
Sort by: date | product title | rating | downloads | popularity
Display: short descriptions | full descriptions
  • The notes nsf local security software enables the user to access that NSF database which is under local security. That is, by using the notes nsf local security removal tool the user can remove local security which is set on the NSF database. It is susceptible of handling the numerous error messages which the user face while accessing the unauthorized NSF database such as "You are not authorized to access that database" and "You are not authorized to perform that operation". Despite of having such a wondrous capability to solve such complicated errors, this software is extremely simple to use and does not require much technical efficiency to get operated by the user. Moreover, it provides quick access to the NSF database and is available at a really affordable price. Furthermore, the notes nsf local security removal tool is compatible to use with almost all versions of Lotus notes. For more information please visit www.nucleusdatarecovery.org
  • PC Spy Software logs all Facebook, PC & internet activity and emails log reports to you. PC Spy Software logs all keystrokes, chats & IMs, emails, websites visited, applications, usernames, passwords, documents opened, online searches, microphone sound and more. It takes screenshots like a spy cam. PC Spy Software runs invisibly and PC users won't know its existence. Great for monitoring employees, children, spouse and investigating crime
  • Parental Spy Software secretly logs all Facebook, keystrokes, chats, emails, web visits, microphone, web cam images, videos played, PC games, user names, passwords, applications, documents, clipboard and more. It records Windows Live Messenger, Skype, Yahoo Messenger, ICQ and others. It also takes screenshots like a surveillance camera. You can receive log reports remotely via emails or ftp and check logs on another PC or your cell phone.
  • PC James Bond 007 secretly logs Facebook, keystrokes, chats, IMs, emails, websites visited, microphone, video talk, logins, passwords, applications, searches, documents and more. Logs Skype, Yahoo Messenger, MSN, ICQ, AIM, etc. Takes screenshots every x seconds like a spy cam. Sends logs to your email. You can check logs on a remote PC, tablet, smart phone, or directly on the monitored PC. Perfect for monitoring employees, kids and spouse
  • Is it possible to find out what web sites recently visited by kids even after they deleted all internet browser's history, cache, temp files, cookies and everything from PC? Yes, download highly reliable windows spy software from www.v-spy.com and start recording all online and offline activities of child without being noticing them. Keylogger software allowed business owners to catch all those employees sneaking around to look at websites that not related to office work. All-in-one windows spy software empowers schools and universities to keep eyes to students to know what they surfing around on the internet using computer lab PCs. Advance spyware utility allowed you to scrutinize and record web browsing habits of your spouse to catch him/her red handed in real time. Windows spy software records all typed instant messages, websites with login/password details, opened/modified documents, system logon and switch off time, chat conversation, social networking sites comments, blog posting, download/upl ...
  • Download reasonable priced Monitoring Software from http://www.digitalpccare.com that facilitates user to have full control over their computer system when they are outside and unable to monitor and come to know what activities were performed on PC by kids, friends, spouse, cousins, relatives, staff colleagues, business partners, classmate or others with the help of recorded log file of each key pressed. Most innovative PC monitoring tool automatically records all typed chat records, email conversations, website visited, password, each keystrokes typed in any application, browsing history even deleted by user, documents lists, download and accessed files. Comprehensive Monitoring Software runs as a background process in your system and nobody can detect its existence except system owner as it hides its visibility from desktop icons, start menu, add-remove programs, installation files-folders, control panel program and even from hidden files too. Outstanding Keystroke logger activities monitoring utility effec ...
  • Folder protect software password protects folders on hard drives and external drives with no extra software required. It doesn't matter if your folders are on hard drives, CD, flash drives, or other types of removable storage media, you can always password protect them using this folder protection software. There are no tricks to bypass security applied by folder protect software.
  • Clean cache, clear history automatically with NetShred X, the easy-to-use internet cache cleaner for Mac OS X that will erase files your browser and email programs leave behind. This internet eraser software is easy to use, fast and cleaner. Easy because it runs automatically - you don't have to remember to use it. Fast because you don't have to wait for it. Cleaner because it will erase, not just delete cache, history, deleted email, and more
  • JiJi Password Expiration Notification is a simple tool to notify users, managers and administrators through e-mail before their password and account expire. Administrator can receive the summary report to the specific email ids. Administrator can define the notification task for any specified target (Domain, an OU, Group, Set of Users).
  • JiJi Password Expiration Notification is a simple tool to notify users, managers and administrators through e-mail before their password and account expire. Administrator can receive the summary report to the specific email ids. Administrator can define the notification task for any specified target (Domain, an OU, Group, Set of Users).
  • AWinware Pdf encryption software locks pdf documents with user password and owner password security. User password ensures you that only authorized person can view locked pdf. Encrypt pdf password with strong RC4 and AES encryption. Owner password protection ensures that the document is restricted for editing, printing & copying. If you are having lots of private and confidential pdf documents and you wish all them to protect with password security, AWinware pdf encryption software is best choice because program is very easy to use, affordable and reliable for everyone. Tool provides option to lock pdf with file open password security and owner restrictions. You can set the restrictions on document according to need; like program lets you to disable pdf printing, deny content copying, block pdf editing, restrict pdf form filling, signing and commenting. Using this application, you can lock document with 40 bit and 128 bit encryption security.
  • JiJi Password Expiration Notification is a simple tool to notify users, managers and administrators through e-mail before their password and account expire. Administrator can receive the summary report to the specific email ids. Administrator can define the notification task for any specified target (Domain, an OU, Group, Set of Users).
  • ShareRight is a network administration tool providing detailed analysis of all file shares and documents on the network and their associated NTFS permissions, together with discovery and quick launch of each shared folder,document and VNC viewer. In addition, notes may be recorded for each machine for support and maintenance purposes.
  • JiJi Password Expiration Notification is a simple tool to notify users, managers and administrators through e-mail before their password and account expire. Administrator can receive the summary report to the specific email ids. Administrator can define the notification task for any specified target (Domain, an OU, Group, Set of Users).
  • iKeyMonitor is an iOS Keylogger for iPhone/iPad/iPodTouch that logs keystrokes, websites, screenshots and automatically sends the logs to you by email or FTP. And iKeyMonitor is the only Keylogger for iPhone/iPad/iPodTouch with the features of Keystrokes, websites, screenshots logging and email/FTP delivery. iKeyMonitor can be installed on any Jail-broken iOS devices.
  • Employee ID Cards utility provides facility to create Identity cards for professional users like company employee, security, visitors, staffs and other office members in efficient and organized way. Comprehensive card maker software offers easily adjustable font, image, color and style settings to build customized identity cards in easiest manner. Software offers password setting features to protect ID card maker utility from unauthorized users during designing process. Business oriented ID card maker application facilitates to modify existing card or create new card from scratch as per user requirements. Highly reliable ID card generator program offers wide range of designing tools such as pencil, arc, text, line, image, ellipse, picture, star and many more to built preferred style ID cards according to business needs. Users can generate stylish and innovative ID cards in different shapes like rectangle, ellipse, circle, triangle and rounded rectangle format. Versatile card designing application facilitates ...
  • CryptDecrypt provides an easy way to protect your sensitive information. CryptDecrypt securely encrypts your data with a password that you select. CryptDecrypt includes several encryption algorithms to protect your data: AES (USA Government Standard) Triple-DES, GOST, RC2, RC4 and Windows Data Protection API.
  • Sonar Lite is easy and smart in use software for work space and flat area acoustic control. Successfully works to control home employees of nanny housemaid class. Sonar Lite can easily keep under audio-control a room of 35+ square meters and neighboring apartments. Easy and quality records multi-parts' Skype and same software call dialogs without any computer stressing. Counts its time of possible unstoppable work, offers microphones sensitivity settings, time-period parameters and formats for output files. The inner software audio-player allows to work with recorded files easy and fast. Sonar Lite is protected from any direct access to the software interface and is equipped with hidden mode inside the system. Sonar is the multifunctional software that is useful for parental control purposes, as spy audio-recorder for Skype dialogs, as alarm-system solution or just for apartment monitoring. Sonar usage: - Acoustic apartments control - Audio-monitoring of work place - Skype dialogs recording - ...
  • The Internet is a dangerous place to your kids. With JuniorWatch you may have the peace of mind. You will sure your kids are safe. After you sign up the service, and install the client software on your junior's computer, the client software will consistently report locations, screen and webcam shots, and even key strokes from the computer. You can access the reports from any computer.
  • School Track is a robust solution for managing student attendance on school campuses. Track student attendance and tardiness, issue tardy slips and hall passes, assign warnings and detention. Parents can receive e-mail notification of any infraction occurred. Process late students quickly and automatically assign and manage detention for repeat offenders. Produce professional photo ID cards and paper badges. Easily deploys campus-wide.
  • Kernel file shredder is a professional tool that acts as a data privacy tool as it ensures that organization sensitive information is not been misused by any malicious users. It ensures this as it permanently deletes or removes crucial files and folders from your computer system after use. The free file shredder software performs efficient as well as impeccable file shredding in such a manner that once the files and folders are shred, they cannot be recovered back using any powerful data recovery tool. Kernel file shredder offers multiple file shredding options to the users. Moreover, it also enables you to create a list of files that you want to permanently remove from your computer system. This file has a .cfs format. Kernel file shredder comes with a free evaluation or free trial version which enables you to shred files on one hand and on the other hand lets you evaluate the features as well as performance of the tool. However, the limitation of this free trial version is that it is available for a time ...
  • Invisibe Keylogger will let you monitor what people you share your computer with type when you are away. Working in the background, Invisible Keylogger will record every keystroke a user makes in every application and save it to a text file. In Stealth mode, the program is totally invisible to other people who are not aware their computer activity is monitored.
  • Pdf encryption software lock pdf data with strong 128 bit encryption security level protection. Program is responsible for protecting batch pdf documents with open password security and owner password restrictions. Pdf encryption software facilitates to restrict desired function in any pdf file i.e. you can enable or disable pdf printing, copying, form filling, signing, commenting, editing, modifying etc permissions according to requirement. Application is Windows compatible, support RC4 40 bit & 128 bit encryption protection. In fact, you can secure bulk pdf documents only with open (user) password without applying any restrictions. This easy to use and awesome utility has inbuilt user help manual and does not require any extra technical skills for operating. Download free evaluation version of pdf security software, protect your private and confidential data from un-authorized access, prevent piracy & fraudulent. Program prompt for open password once set into the pdf and only intended person ...
  • SafeDeleter is a secure data removal tool for Windows. It completely removes sensitive data from your hard drive by overwriting it several times with military strength selected patterns.

Page 8 of 30
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30


Legal disclaimer | Privacy policy

© 2004-2017 IT Shareware