Home | Submit a file  |  New  |  Categories  |  Our awards  |  Link to us  |  RSS Feeds

Utilities :: Security & Encryption
Sort by: date | product title | rating | downloads | popularity
Display: short descriptions | full descriptions
  • Xlinksoft Picture Encryption is a professional picture encryption software which can encrypt all picture formats like BMP, JPG, JPEG, GIF, PNG and ICO file, TIF file, etc. Perfect picture encryption function provides for you. It can encrypt and decrypt pictures within minimum time. It's an easy-to-use picture encryption software. Changing the background color of interface is available. And setting the output path is also up to you.
  • Data Wiper removes completely all deleted confidential files folders from your hard drive and USB drives. Generally when a user delete a file from hard disk, deleted data can be recovered by data recovery software's. Data wiping tool easley wipe data and no data recovery software will recover your data after wiping. Data erasure utility supports both FAT and NTFS file system and runs under all major windows operating systems including Windows XP, Win 2000, Windows 98, Win ME and Vista. It can wipe system files like clipboard contents, administrator s temporary files, recent folder, system registry traces, recycle bin, recent documents. It removes data permanently from hard drive that can never be recovered by any data recovery tools. Data wiping utility is able to permanently remove files and folders from hard drives, USB Removable Storage media, memory cards, compact flash cards, SD cards, and other flash drives. Data wiper software features - Erasing and destroying all the deleted files wipes all ...
  • How to block USB drive activities! Protect your USB port software is an easy and handy way to disable illegal access of removable drives. Pen drive blocker utility is fully reliable in lock out use of any removable media over a centralized network of computers or individual systems. USB anti data theft software ensures you to get relief from several unauthorized use of pen drives. LAN USB drive blocker utility supports all kinds of the newest removable media available in market such as flash drive, pen drive, thumb drive, multimedia card, memory stick, iPod, MP3 Player, digital camera etc. Tool is capable to stay track online and offline activities (i.e. network connection is broken) of USB drive and provides powerful way to prevent access on any network. USB ports protection program is also able to notify network administrators via beep sounds if any unauthorized access using removable media is taking place. USB drive anti theft data software can maintain a log file which includes all information which helps ...
  • Time wastage by employees in chatting, shopping, playing online games and visiting social networking sites is such an activity that directly affects the performance of any organization. To control it, desktop monitoring tool is the best possible solution, as it enables administrator, manager or any high authority to view and record employee desktop activities. Software enables the user to remotely register and install agent on computers that need to be monitored. Once selected computers are registered, all activities that are happening on their desktops can be monitored. These activities can also be recorded and saved as AVI files by scheduling online recording. Desktop monitoring tool also helps to keep a check on employee desktop activities by providing the feature of offline recording. This recoding option enables the user to record employee desktop activities in his or her absence. Moreover, you can perform monitoring on dual-screens at a single workstation. Computers that are registered with Desktop Moni ...
  • Invisible keylogger application software designed to track typed keywords of your laptop keyboard. Hidden keylogger utility is safe, easy to use and system surveillance tool that captures Windows screenshots at regular time interval. Invisible keylogger software provides option to generate log file in TXT or HTML formats for future use. Hidden keylogger application program is totally hidden from your computer?s task manager, system installation files, add/remove program and computer desktop. Invisible keylogger utility is professional system monitoring tool that provides user friendly graphical interface so that any non technical user can easily operate the software. Hidden keylogger application program provides real time monitoring of your computer system and records entire PC activities in hidden files formats. Invisible keylogger tool provides option to send log files at specified email address. Hidden keylogger application program is password protected application that helps to restrict unauthorized user ...
  • Download free AWinware PDF encryption tool to password protect batch PDF files in a single click. PDF locker software is fast and affordable desktop utility to apply PDF open password (User password) and owner password. Lock your PDF files instantly. User can set various restrictions on document while protecting document like disable PDF print button, disallow PDF content text copying, form filling, page extraction etc. Software applies encryption of 40 bit and 128 bit RC4 level. Tool does not require any plug-ins to be installed on the system. Software encrypts bulk PDF documents using PDF encryption software. User can also set only owner password for encrypting the document. Thus Adobe Acrobat Reader will not prompt for entering the password while opening the documents. Features: # Software supports both 40 bit and 128 bit RC4 encryption level security. # Tool instantly locks batch PDF documents. # Software can set both user password and owner password. # Tool provides inbuilt user help manual for enc ...
  • Set PDF open password on bulk PDF files, password protect batch PDF documents. Download free PDF locker software to instantly lock multiple PDF documents. Encrypt PDF using 40 bit and 128 bit RC4 encryption level. Disallow PDF text copying, document printing, form filling, page extraction, document assembly, content copying for accessibility.
  • Employee Monitoring Pro secretly logs your employees' PC & internet usage during theirwork hours. It lets you exactly what they type on PC keyboard, web sites they visit, who they talk to online and the content of their conversation. Employee Monitoring Pro even takes screen snapshots periodically like a surveillance camera aiming at their computers. You can either receive log reports remotely from or check logs directly on their PCs.
  • This password protection software protects access to selected websites on your PC. You do not have to have webmater type access to the web server. All you have to do is to select an access password and type in URLs or domain name that you would like to protect. This software can password protect access to ANY website on your computer. When installed on the PC, IEProtect checks if a URL that is about to be visited is on the protected list. If yes, it displays a password prompt, if not it seemlesly continues browsing. As an additional security measure the software has its own access password and uninstall password protection features. Two operation modes allow IEProtect to work for all users of the computer, or currently logged on user only.
  • Computer Spy Software monitors others' PC usage when you're away. It secretly logs all keystokes, online chats, instant messages, emails, web sites visited, applications run and more. It is a great tool to monitor activities about MSN Messenger, Yahoo! Messenger, ICQ, Skype, AIM, MySpace, Facebook, etc. Computer Spy Software takes screenshots like a spy camera. You can receive reports remotely via emails.
  • Power PC Keylogger spy software can secretly record all keystrokes typed on your computer. It runs completely invisiblely. You can check log reports by simply receiving emails or opening a web page. Power PC Keylogger is perfect for catching cheaters, monitoring employees, children or spouse, acquiring others' passwords and even investigating crimes. Use hotkey to unhide it from Stealth Mode and protect the program access by password.
  • MSN Messenger Spy secretly records all MSN Messenger, Windows Live Messenger and Windows Messenger's incoming and outgoing chat text messages. MSN Messenger Spy runs in a complete invisible mode. You can check all recorded messages by simply receiving emails or opening a web page. MSN Messenger Spy is perfect for catching cheaters, monitoring employees, children or spouse msn chats, and even investigating crimes.
  • Family Password Manager is a brilliant new password management program from Family Software Solutions. Never forget a password ever again, our secure program keeps all of your passwords in one handy location. Program updates are free of charge for the life of the program.
  • Advance key logger application software developed to captures all keystrokes activities of your laptop including clipboard content, sound files, screenshots, voice chat conversation, internet cookies, browsed web pages, send or composed emails and active or inactive Windows applications. Invisible key logger program captures Windows screenshots at regular time interval. Advance keylogger operation is easy, safe to use and professional program that monitors overall activities of your computer to any user including system and internet activities. Invisible keylogger utility provides option to deliver log files to specified email address or upload using FTP settings. Advance keylogger tool is password protected application that helps in restricting unauthorized users to modify log files or change any software/system settings. Advance keylogger application totally hidden from start menu, task manager, add/remove program and system installation files. Invisible keylogger operation provides option to generate log f ...
  • Data eraser software permanently deletes temporary files folders remove internet history address bar URL records from hard disk removable media. Data wiping utility wipes files and unused disk space using various disk-erasing algorithms that cannot be recovered by any recovery software. Data Wiper Software does not require any technical skills to operate it. Hard Disk Data Wiper can erases deleted files and disk drives, unused disk space so your data can never be accessed or recovered. It can remove all deleted confidential files. Data wiper software keeps privacy of confidential private data files and recovers unused disk space easily. Data wiper software permanently wiping tools Features ? Secure Data Wiper support all type of removable media including Pen drive, Memory card and other USB supported flash drives. ? Data Cleaner Software delete and wipe most recently used application of Microsoft word, Power point, Excel, Access data records and other. ? Data wiper tool completely wipes entire unused d ...
  • If you are facing errors while accessing Notes .NSF files due to local security applied, then NSF local security removal helps you in removing the security and hence provides access to the file. Errors ?You are not authorized to perform that action? and ?You are not authorized to access that database? prevents you from opening the NSF file. Administrator applies various access rules for preventing unauthorized usage of .NSF file. But with Notes local security removal tool this restriction is overcome and you can access the file easily, in times of urgency or when admin is not available to provide you with access rights. This software also gives provision of re-applying the security once you are done with nsf file work. Using the software, user just needs to select the NSF file for removing security and then click on the ?Remove security from selected database? button. Unlimited .NSF files can be freed from local security with the help of Local Security Removal software. Software supports all version ...
  • Is somebody else using your PC? Worried about what your kids, students or employees are doing on their computers? You have a right to... and with DeskWatcher you can do something about it. DeskWatcher is more than just a tool to spy on your computer users. It's a complete PC surveillance software package, designed to be easy to use and deliver useful results. Monitor all keystrokes, websites visited, programs run and take automatic screenshots.
  • Key Logger KeyStroke Recording Software allows you find out what other users do on your computer in their absence. Key logger invisibly records keystrokes, emails conversations, chat records, website visited, password, voice chat conversations, Clipboard activities, Accessed application and captures screenshot of every user activity performed on the computer in encrypted log files and send the details at specified email id or FTP. Software works in the hidden mode and invisible on Windows operating system including Window VISTA, Window XP, Window 2000, Win NT, Win98 etc. It provides detailed report of any user activities performed on your computer system in encrypted log file in your absence. Key Logger will not appear on the Desktop, Add/Remove Programs and Control panel. Parents, Company Owners, Administrators will be able to see exactly what kids; employees have been doing online and offline. Use Hotkey combination or run command to unhide the software when running in hidden mode. Key Logger Software Fea ...
  • HSLAB Access Control is a advanced and flexible software for the control of the employees working hours usage in a network or on a terminal servers. There are many of the software to solve a similar problems. Part from them - simply spyware programs intended first of all for capturing of userís passwords, keystrokes and various messages.
  • The ASL Crypto Manager encryption software is intended for fast encrypting of any user's files. For this purpose, RC4, a high-speed on-the-fly algorithm of encrypting, is used in the program. The program allows you to encrypt any file and to pass it safely to another person, using common methods (portable data medium, e-mail message, local area network, etc.) Prior to the encrypting of any file, a key word is set up.
  • If you search for a software which can control the amount of time which your child spends in front of a computer screen, if you wish to make a work of your child maximally safe and be assured that your child doesn't sit at a computer all day long, this software is for you.
  • Max File Shredder is privacy protection software that protects your privacy by completely shredding the files you specify, beyond recovery. It destroys files and folders, frees hard drive space and shreds your recycle bin contents instead of only deleting them. We use 7 pass destruction scheme as per DOD std 7 for shredding the data. This assures the users that the shredded dat is irrecoverable. Prime Features of Max File Shredder: 1.File Shredder permanently erases deleted data from hard disk using 7 pass destruction scheme as per DOD Std.7 and makes it impossible for any File Recovery tool to recover this data. 2. The Privacy Guard option Erases/Deletes the Internet Explorer and Windows History. Clears/ Shred Recycle Bin 3. Scans selected drive and shred free space to make drive secure 4. Scheduler option to enable users to set up timed deletions of certain folder contents or Recycle Bin for those who prefer a more automated process 5. Works on FAT 32 as well as NTFS drive
  • Anti Toolbar is the best solution to protect your PC from any unwilling toolbar installation or automatic changes of your homepage, browser hijackers, tracking cookies and any changes of your homepage.
  • Access Control is a advanced and flexible system for the logging of the staff working hours usage in a network or on a terminal servers. There are many of the programs to solve a similar problems. Part from them - simply spyware programs intended first of all for capturing of userís passwords, keystrokes and various messages.
  • Access Control is a powerful and flexible system for the control of the employees working time usage in a corporate networn or on a terminal server. There are many of the programs to solve a similar problems. Part from them - simply spyware programs intended first of all for capturing of userís keystrokes, passwords and various messages.

Page 24 of 30
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30


Legal disclaimer | Privacy policy

© 2004-2017 IT Shareware