Home | Submit a file  |  New  |  Categories  |  Our awards  |  Link to us  |  RSS Feeds

Utilities :: Security & Encryption
Sort by: date | product title | rating | downloads | popularity
Display: short descriptions | full descriptions
  • KillDisk Desktop is a data destruction appliance that securely erases all the contents stored on hard disks and other storage devices. It permanently deletes all data so that it will never be recoverable, and it can automatically erase up to five hard disks as soon as you connect them to the system. For extra peace of mind, it can also print out certificates and reports detailing the process.
  • Folder Protect is a new concept in Data Security. It lets you password protect and set different access rights to your files, folders, drives, installed programs and popular extensions. Folder Protect goes beyond normal file locking and encryption by letting you decide whether to make files inaccessible, hidden, delete proof or write proof. Folder Protect is Windows 7 / Vista / 2003 / XP compatible.
  • SterJo Browser Passwords is an easy-to-use tool that recovers passwords for most popular web browsers like: Chrome, Firefox, Internet Explorer, Microsoft Edge and Opera. Recovered data includes the URL (website address), the forgotten username with password, and the browser used to store those details. Other than that, you can easily save all recovered passwords to a text file clicking the save button.
  • Cant remember your passwords? Tired of typing your name and address into internet forms? ... You need WebM8! - WebM8 will remember all your usernames and passwords and fill your log on screens automatically. It will also allow you to fill other web forms by point and click and, unlike most password programs, it is completely browser independent and suitable for logon forms which change each time you use them.
  • SterJo Strong Password Generator creates strong and random passwords based on the characters you want to use. Nowadays password security should be taken really seriously, especially after several announces for security breaches into some large companies like Yahoo, Opera and Dropbox.
  • Skype Spy Monitor secretly record Skype's incoming and outgoing chat messages. It runs completely invisibly so that Skype users won't know its existence. Skype Spy Monitor send log reports to your email or ftp periodically. You can also check logs directly on the monitored PC. It is a small but powerful program that consumes very little system resource. Perfect for monitoring employees, children or spouse, and even investigating crimes.
  • Agent-Spy.com offers Computer and Internet Monitoring Solutions for Home, Small Business and Corporate Needs, Parental Control and Remote Based Administration. Agent Spy software includes several integrated recording modules that monitor: chat conversations, e-mails sent and received, Internet usage, keystroke logger, passwords, Facebook, Twitter, Google Plus+ etc. Agent Spy Software can be installed on remote computers! More: www.agent-spy.com
  • Prevent data loss using USB Block. It lets you protect your files, documents, presentations and more stored on your PC. You can Block all such devices and drives that you do not trust and whitelist only the trusted, known devices you use. USB Block works on 32-bit and 64-bit versions of Windows 10/ 8/ 7/ XP and more. Protect the ownership of your files and folders by all means necessary.
  • Before selling, disposing or donating used computers, securely erase hard drives with BCWipe Total WipeOut. Trusted as the de-facto standard for the U.S. DoD, BCWipe Total WipeOut erases boot records, filesystem structures, operating system files and service areas. BCWipe Total WipeOut comes built with the U.S. Department of Defense (DoD 5220.22-M) and U.S. Department of Energy (DoE M 205.1-2) standards, as well as other popular wiping standards.
  • Autonomous Privacy Project - Secure your files with strong Whitenoise encryption. Whitenoise is patented globally including Canada, US, China, India and the European Union. Protect data from hackers. Save data with strong encryption. Send safely by email. Store files securely. Upload secure files to the cloud. You control your own private key with pass phrases. Cloud service providers do not ever have copies of your self directed encryption.
  • Remote Logger is a professional remotely deployable keylogger, the best solution for monitoring your whole network. Remote Logger runs silently at the lowest level of Windows to prevent the monitored users from removing the software. Remote Logger intercepts all user names and passwords, in complete stealth mode! Remote Logger records all computer activities including keystrokes, internet history, chat convos etc. See more: www.remotelogger.com
  • Hide ALL IP is the worlds best IP hide software, hide all your applications and games IP from snoopers & hackers, allows you to surf anonymously, prevent identity theft, and guard against hacker intrusions, all just need a click. Your IP address can link your internet activities directly to you, it can easy leak you by this IP address, Hide ALL IP protects your online identity by change your IP address to our private server's IP and routes all your internet traffic through our encrypted internet servers so that all remote servers only get a fake IP address, you are very safely. Change Your IP Address - Just click "Connect" and your IP is instantly hidden! Internet will see your fake IP, which is not associated with your real IP. Change Your Location - Our servers located in the world, you can easily connect to the different country servers. Each time you press the 'Connect' button, you will fake as this country's IP. If you want to change country, just press the &quo ...
  • Security and Privacy Encryption Software for Windows
  • Copy Protect lets you copy protect your audios, videos, documents and pictures so that they cannot be duplicated, copied or distributed by illegal means. Copy Protect converts all supported formats into executable applications that run only in the drives they are prepared for. If these files are copied to another drive, they do not run and become useless. Copy Protect works in all 32-bit and 64-bit version of Windows 7.0/Vista/XP.
  • USB fingerprint scanners (i.e. Hamster IV, Hamster Plus) help you capture fingerprint images. These devices get plugged into the USB port of your computer. In order to use these devices in your application, you need legacy driver. It allows scanners to communicate with your computer. Usually Hamster IV or Hamster Plus fingerprint scanner devices come with 2 types of drivers, the legacy driver or the Windows Biometric Framework (WBF). The Legacy driver needs to be installed manually when you plug in the scanner on to the computer. If the legacy driver is installed on Windows 7 or later computer then there is a chance that the driver will be over-written by the WBF driver= during Windows updates. To avoid this, please update the SDK dll, for example, sgfplib.dll (from FDx SDK Pro).
  • Yahoo Messenger Spy Monitor secretly records all Yahoo Messenger incoming and outgoing instant messages. It sends logs to your custom email or ftp. You can check all records by simply receiving emails or opening a web page. Use hotkey to unhide it from the Stealth Mode and protect program access by password. Perfect for catching cheaters, monitoring employees, children or spouse, and even investigating crimes.
  • Network Password Manager is a program created especially for the enterprise. It helps employees to safely store and use passwords within the company, manage passwords and set access rights. It also provides the reliable security using 256-bit AES encryption. It works in multi-user mode and creates a common environment. Support of Windows user groups is included. A clear, user-friendly interface considerably simplifies the installation process.
  • ATS Call Data Record analyzer can import and analyze CDR/Tower CDR Data from any service provider in India or Other Country and Its generates a comprehensive report of frequency statistics including service provider details and subscriber details.
  • Power Spy software secrectly logs Facebook use, keystrokes, website visits, emails, chats and IMs: Skype, Yahoo Messenger and more. Takes screen snapshots at every X seconds like a surveillance camera. Displays exact activities, like Facebook, PC games, online searches & shopping, file transfers and webmails. You can receive reports remotely via emails or ftp. Perfect for monitoring kids, spouse and employees.
  • Spy Patrol is a user-friendly spy software that runs hidden in the background. Spy Patrol records in stealth mode all th keystrokes typed, passwords, websites visited, chats etc. and takes screen shots of the active windows. Spy Patrol records all the user passwords (including the system logon password!). Spy Patrol captures the emails sent and received, and the messenger conversations are recorded as well! See more at www.spy-patrol.com
  • To protect your privacy, comply with regulations and prevent data breaches, BestCrypt Container Encryption delivers 'on-the-fly' data encryption that's easy to use for virtual drives and selected files or folders. BestCrypt encrypts files on Windows, Mac OS X and Linux with AES and other strong encryption algorithms. By featuring deniable encryption and dynamic containers Jetico's file encryption is the best TrueCrypt alternative. Includes BCWipe
  • PDF Postman offers an easy way to send private emails with MS Outlook. Messages and files are placed in a PDF file then encrypted with strong AES-256 encryption. Since most recipients already have a PDF viewer, they only need to click on the encrypted pdf file and enter a password. Works across devices and platforms. No expensive or complex S/MIME certificates to install. Download a free trial of PDF Postman.
  • An Open PGP add-in for Microsoft Office Outlook that is simple to install and easy to use. Integrates with the Outlook toolbar. Generate a key pair, or import your existing key. Configure sending rules. Upload or retrieve keys from open key servers. Compatible with Enigmail and PGP. Fully supported by the humans at Encryptomatic LLC. Free for personal use. Try it today!
  • Our Spy Software is top-10-Spy Software Pro is a Complete Stealth Monitoring Software that can both monitor your Local PC and Remote PC or any Android (cell Phone or Tablet) device. WinSpy Software will capture anything the user sees or types on the keyboard. Win-spy will also capture WebCam shots and record surrounding sounds. Now Works behind Firewalls and Routers. New build includes JPG and PDF Remote File and Advanced Android Monitoring.
  • Permanently delete data and wipe free space with BCWipe. BCWipe is trusted throughout the U.S. DoD to securely erase files and folder beyond recovery - including free space, file slack space, MFT records, Internet and local history, directory entries, NTFS log file and directory slack space. BCWipe uniquely features Transparent Wiping - deleted or temporary files are wiped automatically on the fly. Available for Windows, Mac and UNIX.

Page 3 of 30
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30


Legal disclaimer | Privacy policy

© 2004-2017 IT Shareware