Home | Submit a file  |  New  |  Categories  |  Our awards  |  Link to us  |  RSS Feeds

Utilities :: Security & Encryption
Sort by: date | product title | rating | downloads | popularity
Display: short descriptions | full descriptions
  • Super USB Secure is the encryption software specifically developed for USB drives(USB flash disk, removable hard disk, memory card and memory stick) by YIYOU Software, which is the pure green software with only one executable file, and no writing to registry or writing any files to the system. With its easy to use, high security, fast encryption, Super USB Secure is the super partner of USB drives.
  • MSN Spy Monitor secretly logs all MSN Messenger / Windows Live Messenger's incoming and outgoing chat text messages. Takes screen snapshots of MSN Messenger video chats every X seconds. It runs in a complete invisible mode. You can check all recorded messages by simply receiving emails or opening a web page. Perfect for catching cheaters, monitoring employees, children or spouse, and even investigating crimes.
  • Encrypt and convert word to exe with password protected, Support doc, docx, docm, The encrypted document can prevent from editing and copying. You can set whether or not allow your users to print document. You can also set multiple encryption modes. Easily distribute your files and protect it, only you can create open password for your users.
  • Spy all version ICQ IM chatting records. Spy stealthily so that the user won't know such monitoring exists. Possible usages: Spy employees, children and spouse chatting on ICQ. View logging records from the program or send a report to a pre-determined email address. Use your hotkey to activate it from complete stealth mode and protect program access by password. Uninstall it easily from the program interface.
  • SpyPal Invisible Spy secrectly records keystrokes, screenshots, websites visited, windows opened, applications, MSN, ICQ, AIM, Yahoo! IM, Skype, clipboard, passwords, emails, documents and more. In Stealth Mode, it is completely invisible to computer users. Use hotkey and password to access the program. Auto send logs to a preset email or ftp at set interval. Usages: monitors employees, children, spouse and investigate crimes.
  • Aldenate Secure Disk enables you to create password-protected containers that can be mounted as virtual disk and used to store your sensitive documents. While mounted, the containers can be used like any other drive to manage your files. You can quickly lock the containers with the click of a button or by pressing a hot key and the drives will no longer be visible. Aldenate Secure Disk uses AES encryption to store your files securely.
  • FREE SafeHouse Explorer provides total privacy and protection for your sensitive files and folders using passwords and strong 256-bit encryption. This software is amazingly simple to use and features a familiar Windows Explorer-like look and feel. Protecting files is as simple as dragging and dropping them into SafeHouse Explorer. Create any number of private storage vaults on any media including external drives, USB memory sticks and CD/DVDs.
  • Win Spy Software is a Complete Stealth Monitoring Software that can both monitor your Local PC and Remote PC. WinSpy Software also includes Remote Install. WinSpy Software will capture anything the user sees or types on the keyboard. Win-spy will also capture WebCam shots and record surrounding sounds. Now Works behind Firewalls and Routers. New: Powerful Anti Spy
  • Wipe Expert is an award winning privacy protection tool that helps remove all traces of online and offline activity. Did you know that a consequence of internet browsing is the recording of many confidential data on your computer: visited pages, credit card info, passwords? Anyone with access to your computer may use these data against you. We use secure algorithms: U.S. DOD 5220.22-M, Peter Gutmann, VSITR, NAVSO to protect your privacy!
  • SpyKing PC Spy secretly logs all Facebook use, keystrokes, chats & IMs, emails, web sites, user names, passwords, web cam images, apps, clipboard and more. It supports Skype, Windows Live Messenger, Yahoo Messenger and others. It also takes screenshots like a surveillance camera. You can receive reports remotely via email or ftp as often as you wish. Open these reports on another PC or on your cell phone browser.
  • With Private Folders you will find out how easy is to protect your private files. Private Folder protects your data in a natural way - it simply hides your files and folders. And your data will be hidden until you decide to reveal them. All you need to protect your data is to add your secret folders to the list. When you need to access your protected data, simply press a hotkey and type your password your files will become visible immediately!
  • Hide or Encrypt any folder on your PC. With Stealth Folder, folders and files can't be deleted, viewed, modified, or run. Stealth Folder Operates in Stealth mode, special hotkey is required to pull it up. Stealth Folder is not visible in Start, Toolbar, Taskbar, Add/Remove Programs or CTL ALT DEL.
  • Power Spy Keylogger spy software can secretly record all keystrokes typed on your computer. It runs completely invisiblely. You can check log reports by simply receiving emails or opening a web page. Power Spy Keylogger is perfect for catching cheaters, monitoring employees, children or spouse, acquiring others' passwords and even investigating crimes. Use hotkey to unhide it from Stealth Mode and protect the program access by password.
  • Security Tracker is a powerful and flexible employee monitoring software for the control of the staff working hours usage in a network or on a terminal servers. There are many of the software to solve a similar problem. Part from them - simply spyware programs intended first of all for capturing of user`s keystrokes, passwords and various messages.
  • Bsecsoft Data Locker is professional file encryption and folder lock software which offers you best way of encrypting and password protecting files and folders. It can safely protect any file and folder on your PC from being seen, read or modified. The Data Locker is easy to use, just like a safety box, and support to drag and drop the folders or files you want to hide or protect.
  • Cheater-Catcher is a professional product that makes it easy to catch the cheaters. With Cheater-Catcher you can find out who your spouse is instant messaging, what he or she is writing in e-mails, and which websites he or she is visiting. Cheater-Catcher is the easiest and most cost effective way to put an end to the nightmare of suspicion and doubt caused by the infidelity of a cheating spouse or of a sexually active teen.
  • Invisible messenger spy software that logs all incoming and outgoing AIM text chat messages. View log records from the program or send a report to a preset email / ftp. You can check all recorded incoming and outgoing messages by simply receiving emails or opening a web page. Use hotkey to unhide it from Stealth Mode and protect program access by password.
  • Do you have a PDF file which cannot be printed, copied or modified? Your PDF file has had password security and other restrictions added. PDF protection tool can be used to crack protected Adobe Acrobat PDF files, which have “user” or “owner” password set, preventing the file from editing, printing, extracting content, selecting text and graphics or adding/changing annotations and form fields. Decryption of PDF is being done on a single click in batch mode. In just a second, you will have a PDF file with no restrictions on your local system. Now, you can edit, print, copy, form fill and many more with your PDF files and decrypted PDF can be opened in any PDF viewer (e.g. Adobe Acrobat Reader) without any restrictions. The standard security provided by PDF consists of two different methods and two different passwords. PDF document may be protected by password for opening ('user' password) and the document modification security like content copying, printing, editing, image extracting, form fi ...
  • The program has been created as common program for security cross platforms functioning simultaneously with wireless and wired IP webcams, Television-cards, capture boards, power-line, and USB cameras. It has web interface with the equal form and functionality on the local and apart workstations. Users watch MPEG coded video and have complete management of the software through network that security station can be run with no monitor, keyboard, and mouse attached. Program`s modular configuration extensively boosts reliability because all components work as independent programs. If one part stops working, other components continue working. For instance if the `record` part stops working, `watchdog` starts again it right away that viewers don`t notice anything because they are watching video using a `playback` module. The software does `cyclic` recording that the `hard drive full` situation never appears. The recording can be non-stop or it can be initiated by activity, human face recognition, or by timeta ...
  • Website Spy Monitor spy software can secretly record all websites visited. It runs in a complete invisible mode. You can check all recorded messages by simply receiving emails or opening a web page. You can also show all records in the software directly, export these messages to HTML files in a directory for later analysis. It is useful for you to know what your employees or kids are care and talking about with others.
  • Almighty Lotus Notes DB Security Removal Software can ordinarily to remove lotus notes db security & successfully open NSF file. Sometime you trying to open NSF file which is protected by Lotus Notes users and you get some error messages like - "you are not authorized to access that database" & "You are not authorized to perform that operation " and you want to get access so, try PDS NSF Security Remover tool and conveniently break NSF security.
  • SpyPal Yahoo! Messenger Spy software can secretly Secretly record all Yahoo! Messenger's incoming and outgoing chat text messages. It runs in a complete invisible mode. You can check all recorded messages by simply receiving emails or opening a web page. Perfect for catching cheaters, monitoring employees, children or spouse, and even investigating crimes.
  • Automatically delete browser history at specified intervals while you work. This software works with Microsoft Internet Explorer and/or Mozilla Firefox. Deletion can be set to occur every 30 seconds, 1 minute, 5 minutes, 30 minutes, 1 hour, etc. This application sits in the system tray, at the bottom right corner of the screen.
  • Active Keylogger Home Pro - This is the best choice for you if you think that others are using your computer when you are not home or away from your working place. After you install Active Keylogger Home Pro on your computer, it will allow you to make program settings for tracking activities on your computer.If you enable "Run Active Keylogger Home Pro in Stealth Mode" then the program will run by full stealth for others, no one will even think t

Page 22 of 30
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30


Legal disclaimer | Privacy policy

© 2004-2017 IT Shareware