Home | Submit a file  |  New  |  Categories  |  Our awards  |  Link to us  |  RSS Feeds

Utilities :: Security & Encryption
Sort by: date | product title | rating | downloads | popularity
Display: short descriptions | full descriptions
  • USB Block prevents leakage and copy of your data to USB Drives, External Drives, CDs/DVDs or other such portable devices. Once installed, USB Block lets you block all such drives and devices that do not belong to you. It prevents illegal copy, leakage and duplication of your private files. USB Block works perfectly on all 32-bit and 64-bit versions of Windows 7, Windows Vista, Windows 2008 Server, Windows XP and Window 2003 Server.
  • Before selling, disposing or donating used computers, securely erase hard drives with BCWipe Total WipeOut. Trusted as the de-facto standard for the U.S. DoD, BCWipe Total WipeOut erases boot records, filesystem structures, operating system files and service areas. BCWipe Total WipeOut comes built with the U.S. Department of Defense (DoD 5220.22-M) and U.S. Department of Energy (DoE M 205.1-2) standards, as well as other popular wiping standards.
  • Autonomous Privacy Project - Secure your files with strong Whitenoise encryption. Whitenoise is patented globally including Canada, US, China, India and the European Union. Protect data from hackers. Save data with strong encryption. Send safely by email. Store files securely. Upload secure files to the cloud. You control your own private key with pass phrases. Cloud service providers do not ever have copies of your self directed encryption.
  • Remote Logger is a professional remotely deployable keylogger, the best solution for monitoring your whole network. Remote Logger runs silently at the lowest level of Windows to prevent the monitored users from removing the software. Remote Logger intercepts all user names and passwords, in complete stealth mode! Remote Logger records all computer activities including keystrokes, internet history, chat convos etc. See more: www.remotelogger.com
  • Hide ALL IP is the worlds best IP hide software, hide all your applications and games IP from snoopers & hackers, allows you to surf anonymously, prevent identity theft, and guard against hacker intrusions, all just need a click. Your IP address can link your internet activities directly to you, it can easy leak you by this IP address, Hide ALL IP protects your online identity by change your IP address to our private server's IP and routes all your internet traffic through our encrypted internet servers so that all remote servers only get a fake IP address, you are very safely. Change Your IP Address - Just click "Connect" and your IP is instantly hidden! Internet will see your fake IP, which is not associated with your real IP. Change Your Location - Our servers located in the world, you can easily connect to the different country servers. Each time you press the 'Connect' button, you will fake as this country's IP. If you want to change country, just press the &quo ...
  • Security and Privacy Encryption Software for Windows
  • Copy Protect lets you copy protect your audios, videos, documents and pictures so that they cannot be duplicated, copied or distributed by illegal means. Copy Protect converts all supported formats into executable applications that run only in the drives they are prepared for. If these files are copied to another drive, they do not run and become useless. Copy Protect works in all 32-bit and 64-bit version of Windows 7.0/Vista/XP.
  • USB fingerprint scanners (i.e. Hamster IV, Hamster Plus) help you capture fingerprint images. These devices get plugged into the USB port of your computer. In order to use these devices in your application, you need legacy driver. It allows scanners to communicate with your computer. Usually Hamster IV or Hamster Plus fingerprint scanner devices come with 2 types of drivers, the legacy driver or the Windows Biometric Framework (WBF). The Legacy driver needs to be installed manually when you plug in the scanner on to the computer. If the legacy driver is installed on Windows 7 or later computer then there is a chance that the driver will be over-written by the WBF driver= during Windows updates. To avoid this, please update the SDK dll, for example, sgfplib.dll (from FDx SDK Pro).
  • Yahoo Messenger Spy Monitor secretly records all Yahoo Messenger incoming and outgoing instant messages. It sends logs to your custom email or ftp. You can check all records by simply receiving emails or opening a web page. Use hotkey to unhide it from the Stealth Mode and protect program access by password. Perfect for catching cheaters, monitoring employees, children or spouse, and even investigating crimes.
  • Network Password Manager is a program created especially for the enterprise. It helps employees to safely store and use passwords within the company, manage passwords and set access rights. It also provides the reliable security using 256-bit AES encryption. It works in multi-user mode and creates a common environment. Support of Windows user groups is included. A clear, user-friendly interface considerably simplifies the installation process.
  • ATS Call Data Record analyzer can import and analyze CDR/Tower CDR Data from any service provider in India or Other Country and Its generates a comprehensive report of frequency statistics including service provider details and subscriber details.
  • Power Spy software secrectly logs Facebook use, keystrokes, website visits, emails, chats and IMs: Skype, Yahoo Messenger and more. Takes screen snapshots at every X seconds like a surveillance camera. Displays exact activities, like Facebook, PC games, online searches & shopping, file transfers and webmails. You can receive reports remotely via emails or ftp. Perfect for monitoring kids, spouse and employees.
  • Spy Patrol is a user-friendly spy software that runs hidden in the background. Spy Patrol records in stealth mode all th keystrokes typed, passwords, websites visited, chats etc. and takes screen shots of the active windows. Spy Patrol records all the user passwords (including the system logon password!). Spy Patrol captures the emails sent and received, and the messenger conversations are recorded as well! See more at www.spy-patrol.com
  • To protect your privacy, comply with regulations and prevent data breaches, BestCrypt Container Encryption delivers 'on-the-fly' data encryption that's easy to use for virtual drives and selected files or folders. BestCrypt encrypts files on Windows, Mac OS X and Linux with AES and other strong encryption algorithms. By featuring deniable encryption and dynamic containers Jetico's file encryption is the best TrueCrypt alternative. Includes BCWipe
  • PDF Postman offers an easy way to send private emails with MS Outlook. Messages and files are placed in a PDF file then encrypted with strong AES-256 encryption. Since most recipients already have a PDF viewer, they only need to click on the encrypted pdf file and enter a password. Works across devices and platforms. No expensive or complex S/MIME certificates to install. Download a free trial of PDF Postman.
  • An Open PGP add-in for Microsoft Office Outlook that is simple to install and easy to use. Integrates with the Outlook toolbar. Generate a key pair, or import your existing key. Configure sending rules. Upload or retrieve keys from open key servers. Compatible with Enigmail and PGP. Fully supported by the humans at Encryptomatic LLC. Free for personal use. Try it today!
  • Our Spy Software is top-10-Spy Software Pro is a Complete Stealth Monitoring Software that can both monitor your Local PC and Remote PC or any Android (cell Phone or Tablet) device. WinSpy Software will capture anything the user sees or types on the keyboard. Win-spy will also capture WebCam shots and record surrounding sounds. Now Works behind Firewalls and Routers. New build includes JPG and PDF Remote File and Advanced Android Monitoring.
  • Permanently delete data and wipe free space with BCWipe. BCWipe is trusted throughout the U.S. DoD to securely erase files and folder beyond recovery - including free space, file slack space, MFT records, Internet and local history, directory entries, NTFS log file and directory slack space. BCWipe uniquely features Transparent Wiping - deleted or temporary files are wiped automatically on the fly. Available for Windows, Mac and UNIX.
  • BestCrypt Volume for Disk Encryption protects all data on fixed and removable disks, while also working on RAID, UEFI and GPT partitions. Jetico's encryption software provides protection from physical threats, such as lost computers and USB sticks, by utilizing a wide variety of algorithms (AES, Twofish, Serpent) and the largest possible key sizes with XTS, LRW encryption modes.
  • Spytech SpyAgent is powerful spy software that allows you to monitor EVERYTHING users do on your computer - in total STEALTH. SpyAgent provides essential computer monitoring features, as well as website and application content filtering, chat client blocking, lockdown scheduling, and remote delivery of logs via email. SpyAgent's advanced, easy to use feature-set is unmatched, and provides the ultimate all-in-one computer monitoring solution.
  • PWMinder is a cross-platform, Password Manager application that is used to store all of your passwords and other sensitive data in a secure encrypted file. With PWMinder, you don't need to try and remember all of your various passwords, but rather create one very secure password, to be able access all of your other passwords in one place. Includes a configurable Password Generator Tool, and File Encryption Tool.
  • CDR Data Analysis Software is best call data analysis software which is track call information from your CDR file extract your data according to max call, max durations, max cell tower information & grouping caller IMEI number - which is showing how much cell number you're using to your IMEI Numbers.
  • Heimdal FREE scans your computer every 2h for outdated software. You can choose from a list of the most used software apps in the world. When it spots an outdated application, it immediately updates it for you. Software vulnerabilities are blocked faster than cyber criminals can exploit them. The updates are installed automatically, in the background. You can also install new apps directly and safely, through Heimdal FREE, with just one click.
  • CDR Analysis software helps to import CDR and analyze CDR/Tower file from any service and generates a comprehensive report of frequency statistics including service provider details and subscriber details (SDR)* of CDR Numbers. CDR Analysis software supports all type CDR file like as .Txt, .CSV,.XLS & .XLSX from All service providers. Software supports all country service provider & CDR file.
  • Ardamax Free Keylogger supports several levels of user activity monitoring and saves recorded data to an encrypted log file only viewable through a proprietary tool. The program can be configured to constantly capture different types of data, from simple keystrokes to audio and photos, and offers a simple, self-explanatory interface. The product supports all known languages and remains invisible to users being monitored.

Page 3 of 30
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30


Legal disclaimer | Privacy policy

© 2004-2017 IT Shareware