Home | Submit a file  |  New  |  Categories  |  Our awards  |  Link to us  |  RSS Feeds

Utilities :: Security & Encryption
Sort by: date | product title | rating | downloads | popularity
Display: short descriptions | full descriptions
  • Power Spy For Office secrectly logs all keystrokes, web sites, emails, chats & IMs: MSN Messenger, Windows Live Messenger, ICQ, AOL Messenger, AIM, Yahoo! Messenger, Windows Messenger and Skype. Takes screen snapshots at every X seconds like a surveillance camera. Displays exact activities, like MySpace, Facebook, PC games, online searches & shopping, file transfers and webmails. You can receive reports remotely via emails or ftp.
  • An easy secure file shredder & history eraser privacy tool. Powerful shredding algorithms wipe & delete files, folders, recycle bin, free space, IE browsing history, cookies, cache, index.dat files, run history, file tips, & more. With an easy drag & drop interface, comprehensive help, per-item progress bars, quick installer/uninstaller, built-in check for updates, command line options, & fast multi-threaded design, this is your ideal shredder!
  • Protect your privacy and your identity with automatic wiping of sensitive information. Remote wiping, untrusted SIM deletion, wiping on SMS - enjoy SecuWipe allround protection. This can be your last but most efficient shield when the device gets into intruder's hands.
  • Advance keylogger software is internet and system monitoring tool that records external user activities on your system. Hidden PC monitoring utility secretly captures entire online and offline activities in your absence. System surveillance program save each single keystroke, clipboard content, file operation etc in a password protected log file either in text or html format. Application records all the activities like typed email, website URL, username, password, typed document etc. Keyboard keystrokes tracking tool also monitors all the application install and run on your system and takes screenshot of your desktop screen after every define interval. Application provides wizard style graphical user interface so that user can easily access this tool also includes a help manual which describes each steps to use this program. Surveillance software works invisibly as a background process and will not appear on the desktop or in control panel, program files. Keystroke monitoring tool sends recorded log file at p ...
  • Xlinksoft Picture Encryption is a professional picture encryption software which can encrypt all picture formats like BMP, JPG, JPEG, GIF, PNG and ICO file, TIF file, etc. Perfect picture encryption function provides for you. It can encrypt and decrypt pictures within minimum time. It's an easy-to-use picture encryption software. Changing the background color of interface is available. And setting the output path is also up to you.
  • Data Wiper removes completely all deleted confidential files folders from your hard drive and USB drives. Generally when a user delete a file from hard disk, deleted data can be recovered by data recovery software's. Data wiping tool easley wipe data and no data recovery software will recover your data after wiping. Data erasure utility supports both FAT and NTFS file system and runs under all major windows operating systems including Windows XP, Win 2000, Windows 98, Win ME and Vista. It can wipe system files like clipboard contents, administrator s temporary files, recent folder, system registry traces, recycle bin, recent documents. It removes data permanently from hard drive that can never be recovered by any data recovery tools. Data wiping utility is able to permanently remove files and folders from hard drives, USB Removable Storage media, memory cards, compact flash cards, SD cards, and other flash drives. Data wiper software features - Erasing and destroying all the deleted files wipes all ...
  • How to block USB drive activities! Protect your USB port software is an easy and handy way to disable illegal access of removable drives. Pen drive blocker utility is fully reliable in lock out use of any removable media over a centralized network of computers or individual systems. USB anti data theft software ensures you to get relief from several unauthorized use of pen drives. LAN USB drive blocker utility supports all kinds of the newest removable media available in market such as flash drive, pen drive, thumb drive, multimedia card, memory stick, iPod, MP3 Player, digital camera etc. Tool is capable to stay track online and offline activities (i.e. network connection is broken) of USB drive and provides powerful way to prevent access on any network. USB ports protection program is also able to notify network administrators via beep sounds if any unauthorized access using removable media is taking place. USB drive anti theft data software can maintain a log file which includes all information which helps ...
  • Time wastage by employees in chatting, shopping, playing online games and visiting social networking sites is such an activity that directly affects the performance of any organization. To control it, desktop monitoring tool is the best possible solution, as it enables administrator, manager or any high authority to view and record employee desktop activities. Software enables the user to remotely register and install agent on computers that need to be monitored. Once selected computers are registered, all activities that are happening on their desktops can be monitored. These activities can also be recorded and saved as AVI files by scheduling online recording. Desktop monitoring tool also helps to keep a check on employee desktop activities by providing the feature of offline recording. This recoding option enables the user to record employee desktop activities in his or her absence. Moreover, you can perform monitoring on dual-screens at a single workstation. Computers that are registered with Desktop Moni ...
  • Invisible keylogger application software designed to track typed keywords of your laptop keyboard. Hidden keylogger utility is safe, easy to use and system surveillance tool that captures Windows screenshots at regular time interval. Invisible keylogger software provides option to generate log file in TXT or HTML formats for future use. Hidden keylogger application program is totally hidden from your computer?s task manager, system installation files, add/remove program and computer desktop. Invisible keylogger utility is professional system monitoring tool that provides user friendly graphical interface so that any non technical user can easily operate the software. Hidden keylogger application program provides real time monitoring of your computer system and records entire PC activities in hidden files formats. Invisible keylogger tool provides option to send log files at specified email address. Hidden keylogger application program is password protected application that helps to restrict unauthorized user ...
  • Download free AWinware PDF encryption tool to password protect batch PDF files in a single click. PDF locker software is fast and affordable desktop utility to apply PDF open password (User password) and owner password. Lock your PDF files instantly. User can set various restrictions on document while protecting document like disable PDF print button, disallow PDF content text copying, form filling, page extraction etc. Software applies encryption of 40 bit and 128 bit RC4 level. Tool does not require any plug-ins to be installed on the system. Software encrypts bulk PDF documents using PDF encryption software. User can also set only owner password for encrypting the document. Thus Adobe Acrobat Reader will not prompt for entering the password while opening the documents. Features: # Software supports both 40 bit and 128 bit RC4 encryption level security. # Tool instantly locks batch PDF documents. # Software can set both user password and owner password. # Tool provides inbuilt user help manual for enc ...
  • Set PDF open password on bulk PDF files, password protect batch PDF documents. Download free PDF locker software to instantly lock multiple PDF documents. Encrypt PDF using 40 bit and 128 bit RC4 encryption level. Disallow PDF text copying, document printing, form filling, page extraction, document assembly, content copying for accessibility.
  • Employee Monitoring Pro secretly logs your employees' PC & internet usage during theirwork hours. It lets you exactly what they type on PC keyboard, web sites they visit, who they talk to online and the content of their conversation. Employee Monitoring Pro even takes screen snapshots periodically like a surveillance camera aiming at their computers. You can either receive log reports remotely from or check logs directly on their PCs.
  • This password protection software protects access to selected websites on your PC. You do not have to have webmater type access to the web server. All you have to do is to select an access password and type in URLs or domain name that you would like to protect. This software can password protect access to ANY website on your computer. When installed on the PC, IEProtect checks if a URL that is about to be visited is on the protected list. If yes, it displays a password prompt, if not it seemlesly continues browsing. As an additional security measure the software has its own access password and uninstall password protection features. Two operation modes allow IEProtect to work for all users of the computer, or currently logged on user only.
  • Computer Spy Software monitors others' PC usage when you're away. It secretly logs all keystokes, online chats, instant messages, emails, web sites visited, applications run and more. It is a great tool to monitor activities about MSN Messenger, Yahoo! Messenger, ICQ, Skype, AIM, MySpace, Facebook, etc. Computer Spy Software takes screenshots like a spy camera. You can receive reports remotely via emails.
  • Power PC Keylogger spy software can secretly record all keystrokes typed on your computer. It runs completely invisiblely. You can check log reports by simply receiving emails or opening a web page. Power PC Keylogger is perfect for catching cheaters, monitoring employees, children or spouse, acquiring others' passwords and even investigating crimes. Use hotkey to unhide it from Stealth Mode and protect the program access by password.
  • MSN Messenger Spy secretly records all MSN Messenger, Windows Live Messenger and Windows Messenger's incoming and outgoing chat text messages. MSN Messenger Spy runs in a complete invisible mode. You can check all recorded messages by simply receiving emails or opening a web page. MSN Messenger Spy is perfect for catching cheaters, monitoring employees, children or spouse msn chats, and even investigating crimes.
  • Family Password Manager is a brilliant new password management program from Family Software Solutions. Never forget a password ever again, our secure program keeps all of your passwords in one handy location. Program updates are free of charge for the life of the program.
  • Advance key logger application software developed to captures all keystrokes activities of your laptop including clipboard content, sound files, screenshots, voice chat conversation, internet cookies, browsed web pages, send or composed emails and active or inactive Windows applications. Invisible key logger program captures Windows screenshots at regular time interval. Advance keylogger operation is easy, safe to use and professional program that monitors overall activities of your computer to any user including system and internet activities. Invisible keylogger utility provides option to deliver log files to specified email address or upload using FTP settings. Advance keylogger tool is password protected application that helps in restricting unauthorized users to modify log files or change any software/system settings. Advance keylogger application totally hidden from start menu, task manager, add/remove program and system installation files. Invisible keylogger operation provides option to generate log f ...
  • Data eraser software permanently deletes temporary files folders remove internet history address bar URL records from hard disk removable media. Data wiping utility wipes files and unused disk space using various disk-erasing algorithms that cannot be recovered by any recovery software. Data Wiper Software does not require any technical skills to operate it. Hard Disk Data Wiper can erases deleted files and disk drives, unused disk space so your data can never be accessed or recovered. It can remove all deleted confidential files. Data wiper software keeps privacy of confidential private data files and recovers unused disk space easily. Data wiper software permanently wiping tools Features ? Secure Data Wiper support all type of removable media including Pen drive, Memory card and other USB supported flash drives. ? Data Cleaner Software delete and wipe most recently used application of Microsoft word, Power point, Excel, Access data records and other. ? Data wiper tool completely wipes entire unused d ...
  • If you are facing errors while accessing Notes .NSF files due to local security applied, then NSF local security removal helps you in removing the security and hence provides access to the file. Errors ?You are not authorized to perform that action? and ?You are not authorized to access that database? prevents you from opening the NSF file. Administrator applies various access rules for preventing unauthorized usage of .NSF file. But with Notes local security removal tool this restriction is overcome and you can access the file easily, in times of urgency or when admin is not available to provide you with access rights. This software also gives provision of re-applying the security once you are done with nsf file work. Using the software, user just needs to select the NSF file for removing security and then click on the ?Remove security from selected database? button. Unlimited .NSF files can be freed from local security with the help of Local Security Removal software. Software supports all version ...
  • Is somebody else using your PC? Worried about what your kids, students or employees are doing on their computers? You have a right to... and with DeskWatcher you can do something about it. DeskWatcher is more than just a tool to spy on your computer users. It's a complete PC surveillance software package, designed to be easy to use and deliver useful results. Monitor all keystrokes, websites visited, programs run and take automatic screenshots.
  • Key Logger KeyStroke Recording Software allows you find out what other users do on your computer in their absence. Key logger invisibly records keystrokes, emails conversations, chat records, website visited, password, voice chat conversations, Clipboard activities, Accessed application and captures screenshot of every user activity performed on the computer in encrypted log files and send the details at specified email id or FTP. Software works in the hidden mode and invisible on Windows operating system including Window VISTA, Window XP, Window 2000, Win NT, Win98 etc. It provides detailed report of any user activities performed on your computer system in encrypted log file in your absence. Key Logger will not appear on the Desktop, Add/Remove Programs and Control panel. Parents, Company Owners, Administrators will be able to see exactly what kids; employees have been doing online and offline. Use Hotkey combination or run command to unhide the software when running in hidden mode. Key Logger Software Fea ...
  • The ASL Crypto Manager encryption software is intended for fast encrypting of any user's files. For this purpose, RC4, a high-speed on-the-fly algorithm of encrypting, is used in the program. The program allows you to encrypt any file and to pass it safely to another person, using common methods (portable data medium, e-mail message, local area network, etc.) Prior to the encrypting of any file, a key word is set up.
  • If you search for a software which can control the amount of time which your child spends in front of a computer screen, if you wish to make a work of your child maximally safe and be assured that your child doesn't sit at a computer all day long, this software is for you.

Page 24 of 30
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30


Legal disclaimer | Privacy policy

© 2004-2017 IT Shareware