Security
Filters
Categories
Top downloads
- SmartSniff 2.30
- Kindle for PC 2.6.70964
- Universal Virus Snif...
- Opera Mini for Java ...
- Windows Installer Cl...
- Trojan Remover 6.9.6...
- Avast Virus Definiti...
- Windows 7 Service Pa...
- PlayStation Portable...
- Total Commander 11.03
- Microsoft Zune 4.8.2...
- Unlocker 1.9.2
- UC Browser for Java ...
- yuzu 1.9 (1507)
- Cain & Abel 4.9.56
Recommended downloads
Internet Disk Cleaner 3.1 | GiliSoft File Lock Pro 13.3.9 | LanAgent Standard 6.4 | ||
With a simple click, Internet Disk Cleaner safely clean up all Internet tracks, past computer activities and improved pc performance.It also supports test mode, cookies manager, scheduled cleanups, secure deletion and boss key. | This is a power file encryption software program that can quickly and safely lock and hide files, folder,and drives,and it can use 256-bit AES encryption to protect your files located on HDD drive or any portable media such as USB drive. | Monitor all computers in the local network with LanAgent. Sites visited, programs opened, clipboard contents, screenshots - all this data will be secretly recorded and sent to your computer at any time. Your employees are always in your focus! | ||
Download here Buy full version | Download here Buy full version | Download here Buy full version |
Security
Sort by:
Subcategories:
- Access Control (281)
- Encrypting Tools (364)
- Keylogger Monitoring (113)
- Other Utilities (306)
- Password Managers (217)
Internet Secure Tunneling 2.0.0.244
Internet Secure Tunneling can forward otherwise insecure TCP traffic through encrypted SSH Secure Shell tunnel. You can secure for example DATABASE, POP3, SMTP and HTTP connections that would otherwise be insecure.
Internet Secure Tunneling can forward otherwise insecure TCP traffic through encrypted SSH Secure Shell tunnel. You can secure for example DATABASE, POP3, SMTP and HTTP connections that would otherwise be insecure.
Shareware,
Updated 11 April 2024
Downloads
396
396
Last week
3
3
MDW Password Recovery 3.0
MDWRecovery recovers users and admin passwords from MDW files.
MDWRecovery recovers users and admin passwords from MDW files.
Shareware,
Updated 14 November 2017
Downloads
1,432
1,432
Last week
3
3
Cryptocx v6 6.2.9
Cryptocx is an Open PGP and AES compatible encryption component dll designed for use in any modern development environment. Cryptocx encrypts and decrypts data using standards compliant algorithms to make sure that your data is completely secured.
Cryptocx is an Open PGP and AES compatible encryption component dll designed for use in any modern development environment. Cryptocx encrypts and decrypts data using standards compliant algorithms to make sure that your data is completely secured.
Demo,
Updated 1 July 2018
Downloads
318
318
Last week
3
3
Mince 1.0.3
This is an easy to use and very reliable text encryption tool. Right click a text file, select 'Mince-Encrypt', type a password and your file will be secure from unwanted prying eyes. Double-click to decrypt.
This is an easy to use and very reliable text encryption tool. Right click a text file, select 'Mince-Encrypt', type a password and your file will be secure from unwanted prying eyes. Double-click to decrypt.
Freeware,
Updated 6 February 2019
Downloads
315
315
Last week
3
3
NCrypt TX 2.3
NCrypt TX is a text based cryptographic tool with Steganography capabilities. Supports DES, Rijndael-AES, SHA, and MD5 algorithms. Convert your e-mail or other messages into a sequence of encrypted hexadecimal or Base64 characters.
NCrypt TX is a text based cryptographic tool with Steganography capabilities. Supports DES, Rijndael-AES, SHA, and MD5 algorithms. Convert your e-mail or other messages into a sequence of encrypted hexadecimal or Base64 characters.
Shareware,
Updated 17 August 2014
Downloads
563
563
Last week
3
3
IPTunnelManager 1.5
The program IPTunnelManager is used for IP tunneling with the options for compressing and encrypting traffic.
The program IPTunnelManager is used for IP tunneling with the options for compressing and encrypting traffic.
Shareware,
Updated 15 January 2015
Downloads
360
360
Last week
3
3
HTML Password Encryption 4.20.02
HTML password protect, encrypt HTML files with 448 bit keys. Protect web page or entire website with a password. Hide html source code. Image protection-protect images.
HTML password protect, encrypt HTML files with 448 bit keys. Protect web page or entire website with a password. Hide html source code. Image protection-protect images.
Demo,
Updated 4 November 2024
Downloads
237
237
Last week
3
3
Data Stash 1.5
Hide your files easily and discreetly! Data Stash is a clever little steganographic security tool that allows you to hide sensitive data files within other files with password protection. The receptacle file remains FULLY functional!
Hide your files easily and discreetly! Data Stash is a clever little steganographic security tool that allows you to hide sensitive data files within other files with password protection. The receptacle file remains FULLY functional!
Shareware,
Updated 13 March 2016
Downloads
462
462
Last week
3
3
PC Data Manager Keylogger 5.0.1.5
Advance keyboard surveillance program allows user to view every input keystroke or only printing keystrokes as per system owner requirements. Advanced PC data manager utility works in hidden mode and useful in business as well as parental monitoring.
Advance keyboard surveillance program allows user to view every input keystroke or only printing keystrokes as per system owner requirements. Advanced PC data manager utility works in hidden mode and useful in business as well as parental monitoring.
Shareware,
Updated 18 November 2010
Downloads
206
206
Last week
3
3
MYSQL to MSSQL Database Conversion Software 5.0.1
MySQL to MSSQL database conversion utility program migrate MySQL databases to Microsoft SQL server. Database converter support all major MySQL data types and attributes and works with all major versions.
MySQL to MSSQL database conversion utility program migrate MySQL databases to Microsoft SQL server. Database converter support all major MySQL data types and attributes and works with all major versions.
Shareware,
Updated 12 March 2014
Downloads
276
276
Last week
3
3
MySQL to MS Access Database Converter Utility 5.0.1
MySQL to Access database converter software converts MySQL database records into MS Access database records. Database converter allows you to convert single table records or complete database records.
MySQL to Access database converter software converts MySQL database records into MS Access database records. Database converter allows you to convert single table records or complete database records.
Shareware,
Updated 12 March 2014
Downloads
187
187
Last week
3
3
Convert MS SQL Database to MS Access Database Program 5.0.1
MSSQL to Access Database Converter is a powerful tool which converts MS SQL server database records into Ms Access database formats. MS SQL Conversion Program easily convert large MSSQL database which contains thousands of records.
MSSQL to Access Database Converter is a powerful tool which converts MS SQL server database records into Ms Access database formats. MS SQL Conversion Program easily convert large MSSQL database which contains thousands of records.
Shareware,
Updated 12 March 2014
Downloads
1,095
1,095
Last week
3
3
Advance Keystrokes Recording Tool 3.0.1.5
Key press recorder software generate log file of all keystroke used for login, password, chat conversation, file operation, print activity etc. Advance Keylogger application capture windows screenshot and record entire performed keyboard activities.
Key press recorder software generate log file of all keystroke used for login, password, chat conversation, file operation, print activity etc. Advance Keylogger application capture windows screenshot and record entire performed keyboard activities.
Shareware,
Updated 19 April 2013
Downloads
179
179
Last week
3
3
Mobile Inspection Software 2.0.1.5
Mobile phone examiner tool enables to get extract mobile name, number, SIM detail, battery status, signal quality, contacts, SMS, configuration and cell phone memory status. Mobile phone inspector tool is available with Microsoft VC++ source code.
Mobile phone examiner tool enables to get extract mobile name, number, SIM detail, battery status, signal quality, contacts, SMS, configuration and cell phone memory status. Mobile phone inspector tool is available with Microsoft VC++ source code.
Shareware,
Updated 6 September 2010
Downloads
418
418
Last week
3
3
Mugshot 3.2
Mugshot is a home-security application that uses a webcam to detect motion in your home. If a burglar is detected, a snapshot is taken and e-mailed to you. So, should the thief steal your PC you'll still have a picture of them!
Mugshot is a home-security application that uses a webcam to detect motion in your home. If a burglar is detected, a snapshot is taken and e-mailed to you. So, should the thief steal your PC you'll still have a picture of them!
Shareware,
Updated 7 September 2012
Downloads
124
124
Last week
3
3
Private Tracker Pro 1.0
Private Tracker Pro tracks the user's current location and logs the locations that the user has visited into a hidden log file. Best of all, Private Tracker Pro runs in a discrete manner, and the users are not aware that they are tracked.
Private Tracker Pro tracks the user's current location and logs the locations that the user has visited into a hidden log file. Best of all, Private Tracker Pro runs in a discrete manner, and the users are not aware that they are tracked.
Shareware,
Updated 16 July 2020
Downloads
1,262
1,262
Last week
3
3
PC Activity Monitor (PC Acme) 6.5.1
PC Activity Monitor (PC Acme) is an ultimate invisible and undetectable easy-to-use monitoring and surveillance tool for both networked and personal PCs. It is professional software that captures all users activity on the PC.
PC Activity Monitor (PC Acme) is an ultimate invisible and undetectable easy-to-use monitoring and surveillance tool for both networked and personal PCs. It is professional software that captures all users activity on the PC.
Shareware,
Updated 18 September 2008
Downloads
522
522
Last week
3
3
EyeLine Video Surveillance Software 2.06
EyeLine Video Surveillance Software puts the power of security in your hands. This powerful system provides peace of mind whether you are using EyeLine for your home or business.
EyeLine Video Surveillance Software puts the power of security in your hands. This powerful system provides peace of mind whether you are using EyeLine for your home or business.
Shareware,
Updated 10 November 2021
Downloads
2,006
2,006
Last week
3
3
Stealth Chat Monitor 1.8
Stealth Chat Monitor is an invisible, easy to use surveillance application, designed to monitor and record all chat conversations that took place on a computer.
Stealth Chat Monitor is an invisible, easy to use surveillance application, designed to monitor and record all chat conversations that took place on a computer.
Shareware,
Updated 26 August 2014
Downloads
663
663
Last week
3
3
redpill Spy 5
redpill Spy is a discreet covert surveillance application. You can see screenshots of what the user have been doing, view a list of websites and a log of everything the user have typed. You can also secretly record conversations near your computer.
redpill Spy is a discreet covert surveillance application. You can see screenshots of what the user have been doing, view a list of websites and a log of everything the user have typed. You can also secretly record conversations near your computer.
Shareware,
Updated 2 March 2013
Downloads
867
867
Last week
3
3
GSA AV Guard 3.3.8
The GSA A/V Guard is a program designed to monitor a place by video or audio. It can be used to monitor your small child over audio to have a universal long distance baby phone. Furthermore you can monitor your office room by video.
The GSA A/V Guard is a program designed to monitor a place by video or audio. It can be used to monitor your small child over audio to have a universal long distance baby phone. Furthermore you can monitor your office room by video.
Shareware,
Updated 20 November 2024
Downloads
3,669
3,669
Last week
3
updated 3
Personal Inspector 6.20
Monitor all computer activity and Internet use at the office or at home. Automatically track visited web-sites addresses, record all keystrokes and passwords, save clipboard contents, take screenshots of the desktop and working application windows.
Monitor all computer activity and Internet use at the office or at home. Automatically track visited web-sites addresses, record all keystrokes and passwords, save clipboard contents, take screenshots of the desktop and working application windows.
Shareware,
Updated 26 May 2018
Downloads
560
560
Last week
3
3
PCAA 3.6.0.2023.0
The program complex 'Accounting of Admissions' is intended for the organization of the automated work with the electronic database containing information on admissions on the protected objects.
The program complex 'Accounting of Admissions' is intended for the organization of the automated work with the electronic database containing information on admissions on the protected objects.
Freeware,
Updated 2 April 2023
Downloads
300
300
Last week
3
3
WinLock Professional 9.1.7
WinLock Professional is a powerful security solution that lets you restrict access to various computer resources.
WinLock Professional is a powerful security solution that lets you restrict access to various computer resources.
Shareware,
Updated 17 March 2024
Downloads
3,723
3,723
Last week
3
3
Dekart Logon for Lotus Notes 1.02
Protect access to Lotus Notes with smart cards, USB disks and biometrics. Dekart Logon for Lotus Notes performs high level user authentication, ensuring that only authorized users can access Lotus Notes data and resources.
Protect access to Lotus Notes with smart cards, USB disks and biometrics. Dekart Logon for Lotus Notes performs high level user authentication, ensuring that only authorized users can access Lotus Notes data and resources.
Shareware,
Updated 19 July 2018
Downloads
365
365
Last week
3
3
DrawBridge 2007
Pre-emptive browser & eCommerce security software that reduces web & email based threats, and justifies confidence in online shopping and internet banking. DrawBridge checks browser security whenever Windows is booted and announces unsafe settings.
Pre-emptive browser & eCommerce security software that reduces web & email based threats, and justifies confidence in online shopping and internet banking. DrawBridge checks browser security whenever Windows is booted and announces unsafe settings.
Shareware,
Updated 27 January 2014
Downloads
52
52
Last week
3
3
Advanced Desktop Shield 10.02
Advanced Desktop Shield - protect public access PCs, stop users from changing desktop wallpaper and screen saver, deleting, creating and renaming desktop icons, changing display settings and so on. Backup, restore and manage desktop layout
Advanced Desktop Shield - protect public access PCs, stop users from changing desktop wallpaper and screen saver, deleting, creating and renaming desktop icons, changing display settings and so on. Backup, restore and manage desktop layout
Shareware,
Updated 16 March 2022
Downloads
1,580
1,580
Last week
3
3
MacHider 1.6.7
MacHider is an innovative application for Mac intended to hide confidential information from third parties or other unwanted eyes. Its intuitive interface and effectiveness make it the best solution for anyone who needs to have his data hidden.
MacHider is an innovative application for Mac intended to hide confidential information from third parties or other unwanted eyes. Its intuitive interface and effectiveness make it the best solution for anyone who needs to have his data hidden.
Shareware,
Updated 11 February 2014
Downloads
303
303
Last week
3
3
PhoneWallet 3.0
PhoneWallet keeps safe your data on mobile phone such as passwords, logins, credit cards numbers. You can have your sensible data always with you, secured with password and strong encryption algorithms. Application locks when idle for more security
PhoneWallet keeps safe your data on mobile phone such as passwords, logins, credit cards numbers. You can have your sensible data always with you, secured with password and strong encryption algorithms. Application locks when idle for more security
Shareware,
Updated 27 June 2017
Downloads
437
437
Last week
3
3
TheLaptopLock 0.9.4
If a computer is lost the hardware can be replaced, but the data is priceless. The LaptopLock allows you to remain in control of your data. Encrypt or delete files if the computer is lost, or execute custom instructions.
If a computer is lost the hardware can be replaced, but the data is priceless. The LaptopLock allows you to remain in control of your data. Encrypt or delete files if the computer is lost, or execute custom instructions.
Freeware,
Updated 2 November 2022
Downloads
290
290
Last week
3
3