Home | Submit a file  |  New  |  Categories  |  Our awards  |  Link to us  |  RSS Feeds

Utilities :: Security & Encryption
Sort by: date | product title | rating | downloads | popularity
Display: short descriptions | full descriptions
  • ScreenBackTracker saves compressed pictures of the desktop every time you click the mouse left button, therefore recording your past activities that you can consult fast and easy in a slide show fashion. ScreenBackTracker records all your steps in case you ever need them. The program is light and has a very low CPU consumption.
  • With KeyLord you can keep your passwords, credit card and bank account numbers, and other sensitive information in a tree-like structure, secured with passwords or X.509 certificates for increased protection. Powerful and flexible password generator, included in KeyLord, lets you create unique and cryptographically strong passwords, which are possible to remember.
  • Have you got any doubts or concerns about productivity of your employees? Do you need to check on productivity of certain people in your company? Are you looking for a way of exposing exports of confidential data and information from your web?
  • BizCrypto for BizTalk lets you secure the data and internet communications in your BizTalk orchestrations. The product includes SFTP, SSH, FTPS, OpenPGP, SMTP, POP3, AS2, HTTPS, S3 adapters and S/MIME, PGP, PKI, PDF, XML, ZIP pipelines.
  • LuJoSoft DeskLockII is an easy in use and compact tool for quick computer locking when you leave it unattended. It shows a lock screen, disables any user from accessing your pc. You can lock your PC by double clicking on DesktLockII.exe. To unlock the computer you must enter correct password only. Unlike another similar computer lock software LuJoSoft DeskLockII won't be affect Ctrl+Alt+Del or a system reset.
  • Encrypt Outlook attachments. Decrypt on all devices without the need for tools. You may switch the encryption on or off with a single click. Secure automatically your PDFs and Microsoft Office documents Word, Powerpoint, Excel.
  • Password Confidential keeps your passwords secure and makes your life easier at the same time. You will no longer have to remember or keep track of dozens of different passwords. With Password Confidential you can capture and manage all your passwords and IDs in one secure account. Password Confidential automatically captures passwords and user ids for the websites you visit. The next time you visit a site you will be automatically logged in.
  • HDD Safeguard is a portable software that allows you to protect your private files with a password on your external big drive using the secure AES 256 bits key. It protects data with a password for the entire portable storage device (HDD hard drive, USB flash drive, SSD, etc.) and not just for an virtual partition. Once the drive is locked, one cannot read nor write any data to it without the correct password! No requires installation.
  • Most powerful Excel Password recovery tool quickly & securely recover Excel file password and unlock XLS protection. In some conditions you lost or forget your excel protection password and unable to open the file, so you need to get your XLS file password to open it instantly, then try PDS Excel Password Remover program and recover Excel sheet protection password. With help of this program you can speedily scan and get Excel file password. Remove Excel sheet protection password immediately and recover modify password or open Excel file password. Unlock Excel spreadsheet password software professionally recover lost Excel password with fast and unique techniques by using Brute force attack and Dictionary attack. PDS Excel sheet password removal tool comfortably support MS Excel 95, 97, 2000, XP, 2003, 2007, 2010 and 2013. Software has excellent features- * Strongly recover lost or forget Excel file password. * Incredibly recover Excel sheet password and excel spreadsheet password. * Speedily search passwo ...
  • CrococryptMirror is an encryption tool which mirrors complete folders to encrypted folders. The encryption algorithms that are used are AES and Twofish (256 bits, cascading). The keyfile is secured by a password using PKCS #5 (PBKDF2) with a SHA512/Whirlpool based HMAC using 100000 iterations and also AES and Twofish. Mirroring can be done manually (on-demand) or by using the sync service which detects directory changes on the fly.
  • PDF Postman offers an easy way to send private emails with MS Outlook that is friendly for the recipient. Messages and files are placed in a PDF file then encrypted with strong AES-256 encryption. Since most recipients already have a PDF viewer, they need only click on the encrypted pdf file and enter a password. Works across devices and platforms. No expensive or complex S/MIME certificates to install. Download a free trial of PDF Postman.
  • MessageLock adds email encryption and zip file compression to Microsoft Outlook. It combines strong U.S. Gov't approved AES-256 bit encryption with the near-universal compatibility of the Zip file format. MessageLock delivers email encryption and zip compression for your message and/or file attachments. With version 2.2, MessageLock now integrates with the Lockbin.com web service, allowing you to send secure messages to anyone. Download a trial
  • Encrypt and decrypt files, documents, and archives through major cryptographic standards, including, TripleDES, Blowfish, TwoFish, Cast128, DES, Ice, Ice2, RC2, RC4, RijnDael, Serpent, Tea, Thin Ice.
  • Mikey keeps track of your login usernames, user ids, passwords, web page logins, email accounts; you name it. Now you only have to remember one password for Mikey to keep your information private. Mikey will secure your information with a single access password and a unique file encryption method. Open up Mikey and you get one click access to enter passwords, activation codes or any other similar data. Easily search, print, or delete entries all from one screen. Easily print individual entries or even export the entire database in two popular formats. Mikey has a unique approach to auto fill forms. You control the information that Mikey gives out. When you need a username or password simply search for the item then click on the clipboard icon to transfer that information to the clipboard. Then you can paste it right to the place where you need it. This unique feature makes Mikey perfect for use on computers with more than one person. Since Mikey is password protected you no longer have to worry abo ...
  • Do you want to know they are doing at your computer in your absence? Now to make this possible, when you come home you can view pictures of the screen with everything it displayed via screenshots that were taken at an interval you set (i.e. every minute, 5 minutes, hour, etc.). Use the start function to spy with Windows, so you do not miss a single moment.
  • PDF encryption software protect your PDF document from harmful user those defect your valuable document. PDF file encrypted application support most of all required option those able to protect your PDF document. Tool permitted you to set password on PDF file, use PDF encryption technique like 128 bit and 40 bits. You can restrict PDF page by locking PDF printing, content copying, content editing, form-filling, annotation, page extraction and document assembling etc. program authorize you to select page resolution values like high resolution and low resolution. Features: * Software Protect your PDF document from illegal user. * Set password on PDF file. * User encryption technique like 128 bit and 40 bit. * Restrict page permissions values like print, copy, edit, extract, annotation etc. * Choose page resolution setting like low and high. * Create efficient resultant file name. * Perform operation into batch style. * Work with 32 and 64 bit operating system. * Work with all Window oper ...
  • KillDisk Industrial is a secure eraser designed for large-scale industrial applications such as data centers where it's often necessary to wipe multiple hard drives at once securely and efficiently. Meeting more than 20 international data security standards, this disk sanitizer supports both Linux- and Windows-based servers.
  • USB fingerprint scanners (i.e. Hamster IV, Hamster Plus) help you capture fingerprint images. These devices get plugged into the USB port of your computer. In order to use these devices in your application, you need legacy driver. It allows scanners to communicate with your computer. Usually Hamster IV or Hamster Plus fingerprint scanner devices come with 2 types of drivers, the legacy driver or the Windows Biometric Framework (WBF). The Legacy driver needs to be installed manually when you plug in the scanner on to the computer. If the legacy driver is installed on Windows 7 or later computer then there is a chance that the driver will be over-written by the WBF driver= during Windows updates. To avoid this, please update the SDK dll, for example, sgfplib.dll (from FDx SDK Pro).
  • Permanently delete data and wipe free space with BCWipe. BCWipe is trusted throughout the U.S. DoD to securely erase files and folder beyond recovery - including free space, file slack space, MFT records, Internet and local history, directory entries, NTFS log file and directory slack space. BCWipe uniquely features Transparent Wiping - deleted or temporary files are wiped automatically on the fly. Available for Windows, Mac and UNIX.
  • BestCrypt Volume for Disk Encryption protects all data on fixed and removable disks, while also working on RAID, UEFI and GPT partitions. Jetico's encryption software provides protection from physical threats, such as lost computers and USB sticks, by utilizing a wide variety of algorithms (AES, Twofish, Serpent) and the largest possible key sizes with XTS, LRW encryption modes.
  • Ardamax Free Keylogger supports several levels of user activity monitoring and saves recorded data to an encrypted log file only viewable through a proprietary tool. The program can be configured to constantly capture different types of data, from simple keystrokes to audio and photos, and offers a simple, self-explanatory interface. The product supports all known languages and remains invisible to users being monitored.
  • Advanced-PasswordManager is a secure password management software that stores all your passwords in an encrypted vault protected by one master password. It removes identity traces from your PC after saving them to encrypted vault. You can auto fill web forms using your saved details. Free download Advanced-PasswordManager and protect your passwords, social security number, personal and credit card details from identity theft and fraud.
  • HashTab provides OS extensions to calculate file hashes and supports many hash algorithms such as MD5, SHA1, SHA2, RipeMD, HAVAL and Whirlpool.
  • iKeyMonitor iPhone Spy App is an invisible spy app for iPhone/iPad/iPod touch that logs keystrokes, passwords, calls, SMS, WhatsApp/Skype/Viber/Line/Kik/Hangouts/Facebook messages, GPS locations, websites and screenshots, and it will automatically send the logs to users by email or FTP. What does iKeyMonitor iPhone Spy App do? 1. iKeyMonitor records passwords entered and keystrokes typed on the targeted iOS device. 2. Call logging is available as well. Users can see the phone numbers, call durations and time stamps. Meanwhile, it supports logging of Contacts/Notes/Calendars/Reminders/Voice Memos. 3. The iPhone spy app for iOS devices not only tracks incoming and outgoing text messages, but also records WhatsApp/Viber/Kik/Skype messages sent and received. 4. It also offers information of the GPS locations of the iOS device. 5. Another feature is websites history tracking. This invisible spy app logs all the websites visited in Safari and shows users the URLs, time and titles. 6. What&a ...
  • WinGuard Pro 2016 can Password Protect Programs and encrypt files on your computer. Users can add Password Protection to any Windows Program (ie Store Apps, Desktop Apps, Exe's). Lock Installers, Internet and File Explorer - that's right; if you need some extra security, WinGuard Pro 2016 can Block Software Installations, Internet, File Explorer, Harddrive Access and a whole lot more, all for free.

Page 3 of 30
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30


Legal disclaimer | Privacy policy

© 2004-2017 IT Shareware