Security
Filters
Categories
Top downloads
- Opera Mini for Java ...
- Windows Installer Cl...
- Trojan Remover 6.9.6...
- PlayStation Portable...
- Windows 7 Service Pa...
- yuzu 1.9 (1507)
- UC Browser for Java ...
- Avast Virus Definiti...
- AutoCorect 4.1.5
- LG Mobile Support To...
- Unlocker 1.9.2
- CmosPwd 5.0
- Warcraft III: The Fr...
- Freegate Professiona...
- Total Commander 11.03
Recommended downloads
LUPC: Set time limits and monitors child 5.08 | east-tec Eraser 12.9.5 | Password Generator (Server) 1.1.0.3 | ||
LUPC monitors and limits user time on your computers. Once you have set up all the users accessing the PC(s) in your home, you can then set maximum daily or weekly time limits for each person. LUPC limits the used time on internet, programs or... | Protect your sensitive data and privacy, and securely erase all evidence of your Internet and PC activity. Go beyond any system optimization or cleanup tool, improve your PC performance, and keep it clean and secure! Continuously improved since 1998. | Create strong passwords easily from ANY character set. Hebrew, Chinese , Japanese, Cyrillic or Greek! Perfect for family or home use. Never lose a hastily scribbled password again! Store securely in 3DES encrypted .acct files. | ||
Download here | Download here Buy full version | Download here Buy full version |
Security
Sort by:
Subcategories:
- Access Control (232)
- Encrypting Tools (243)
- Keylogger Monitoring (106)
- Other Utilities (184)
- Password Managers (138)
Absolute LoJack Premium
Absolute LoJack Premium is a computing device trace and recovery tool. The software can geo-locate the last known location of a stolen device, lock it remotely, delete the sensitive contents from the system, and protect users.
Absolute LoJack Premium is a computing device trace and recovery tool. The software can geo-locate the last known location of a stolen device, lock it remotely, delete the sensitive contents from the system, and protect users.
Shareware,
Updated 28 March 2015, Reviewed 30 March 2015
Downloads
229
229
Last week
1
1
CRYPTISA 5.4
Encrypt your most sensitive data to make the files impossible to open without your permission. (CRYPTISA is the most advanced and secured encryption in the world)
Encrypt your most sensitive data to make the files impossible to open without your permission. (CRYPTISA is the most advanced and secured encryption in the world)
Shareware,
Updated 13 March 2015
Downloads
197
197
Last week
1
1
Cryper 2015.2.1.1
With Cryper you can encrypt single files or even complete directories. An easy workflow with a maximum of security, that what Cryper offers.
With Cryper you can encrypt single files or even complete directories. An easy workflow with a maximum of security, that what Cryper offers.
Shareware,
Updated 10 August 2017
Downloads
193
193
Last week
1
1
Clock Guard 10.0.0
Software program that prevents tampering with (changing) the computer clock
Software program that prevents tampering with (changing) the computer clock
Shareware,
Updated 5 September 2016
Downloads
822
822
Last week
2
2
NoteGuardian 15.3.0
NoteGuardian securely stores and organizes your sensitive information in an encrypted database. NoteGuardian is ideal for managing passwords, logins, financial account numbers, social security numbers, and similar sensitive information.
NoteGuardian securely stores and organizes your sensitive information in an encrypted database. NoteGuardian is ideal for managing passwords, logins, financial account numbers, social security numbers, and similar sensitive information.
Shareware,
Updated 5 September 2016
Downloads
425
425
Last week
2
2
Hide windows Wizard 9.7
Hide Wizard is a privacy protection tool that hide windows,hide processes,hide tray icons,lock and hide folders,you can use it to protect your privacy easily.
Hide Wizard is a privacy protection tool that hide windows,hide processes,hide tray icons,lock and hide folders,you can use it to protect your privacy easily.
Shareware,
Updated 25 September 2020
Downloads
1,330
1,330
Last week
1
1
Detective Dominator 4.7.4
A stealth facebook chat keylogger that will capture keystrokes and record computer activity. Record facebook chat and monitor facebook activity by selecting the option to capture screenshots. Rewind and watch recorded computer activity like a DVD.
A stealth facebook chat keylogger that will capture keystrokes and record computer activity. Record facebook chat and monitor facebook activity by selecting the option to capture screenshots. Rewind and watch recorded computer activity like a DVD.
Shareware,
Updated 30 April 2021
Downloads
447
447
Last week
1
1
Supreme Text Scrambler 1.26
Supreme Text Scrambler is text encryption software that allows you to encrypt text with ease. Featuring a simple text editor, you can enter the text that you want to scramble or you can simply open an existing text file. Simple text encryption app.
Supreme Text Scrambler is text encryption software that allows you to encrypt text with ease. Featuring a simple text editor, you can enter the text that you want to scramble or you can simply open an existing text file. Simple text encryption app.
Demo,
Updated 29 April 2021
Downloads
444
444
Last week
1
1
CryptoNG (32-bit) 15.1.5
CryptoNG - encrypt and decrypt files of any type on any media using the AES-256 bit key length algorithm in Galois/counter chaining mode (GCM).
CryptoNG - encrypt and decrypt files of any type on any media using the AES-256 bit key length algorithm in Galois/counter chaining mode (GCM).
Shareware,
Updated 20 November 2015
Downloads
29
29
Last week
1
1
CryptoNG (64-bit) 15.1.5
CryptoNG - encrypt and decrypt files of any type on any media using the AES-256 bit key length algorithm in Galois/counter chaining mode (GCM).
CryptoNG - encrypt and decrypt files of any type on any media using the AES-256 bit key length algorithm in Galois/counter chaining mode (GCM).
Shareware,
Updated 20 November 2015
Downloads
47
47
Last week
1
1
WebCruiser - Web Vulnerability Scanner 3.0.0
WebCruiser - Web Vulnerability Scanner, is not only a Web Security Scanning Tool, but also an automatic SQL Injection Tool, an XPath Injection Tool, and a Cross Site Scripting Tool!
WebCruiser - Web Vulnerability Scanner, is not only a Web Security Scanning Tool, but also an automatic SQL Injection Tool, an XPath Injection Tool, and a Cross Site Scripting Tool!
Shareware,
Updated 14 January 2015
Downloads
3,045
3,045
Last week
1
1
Easy Encryptor 3.0
Easy Encryptor using a set of encryption algorithms can more effectively protect the information security.
Easy Encryptor using a set of encryption algorithms can more effectively protect the information security.
Shareware,
Updated 14 February 2023
Downloads
255
255
Last week
1
1
Tracks Eraser Pro 9
Tracks Eraser is designed to protect you by cleaning all the tracks of Internet activities on your computer. Tracks Eraser allows you to erase cache, cookies, index.dat, playlist,rencent files form your browser and over 100 applications/program s.
Tracks Eraser is designed to protect you by cleaning all the tracks of Internet activities on your computer. Tracks Eraser allows you to erase cache, cookies, index.dat, playlist,rencent files form your browser and over 100 applications/program s.
Shareware,
Updated 23 October 2021
Downloads
2,032
2,032
Last week
1
1
Stop Software Installation Tool 5.1.1.12
The Stop Software Installation Tool allows you to prevent users of your computer from installing unwanted software with password protection. You can specify rules according files masks to block software installers execution.
The Stop Software Installation Tool allows you to prevent users of your computer from installing unwanted software with password protection. You can specify rules according files masks to block software installers execution.
Shareware,
Updated 19 September 2017
Downloads
1,003
1,003
Last week
1
1
Video Surveillance Monitor 3
Video Surveillance Monitor streams video from the webcam directly to your video surveillance system, alarms you when there are abrupt motion events. Video Surveillance Monitor supports both home surveillance and outdoor video surveillance.
Video Surveillance Monitor streams video from the webcam directly to your video surveillance system, alarms you when there are abrupt motion events. Video Surveillance Monitor supports both home surveillance and outdoor video surveillance.
Shareware,
Updated 17 March 2021
Downloads
544
544
Last week
1
1
VaySoft Video to EXE Converter 6.27
VaySoft Video to EXE Converter is an application that help you convert video file to professional strongly protected self-running EXE files. Please visit www.vaysoft.com for details!
VaySoft Video to EXE Converter is an application that help you convert video file to professional strongly protected self-running EXE files. Please visit www.vaysoft.com for details!
Shareware,
Updated 31 October 2014
Downloads
141
141
Last week
1
1
Ez OFF 5.5.7
Award winning Parental control software to auto shutdown, reboot, lock your PC (or your children PC) on scheduled time and automatically keep PC locked as long as scheduled. Password protected, has System Time protection. Great software for Parents.
Award winning Parental control software to auto shutdown, reboot, lock your PC (or your children PC) on scheduled time and automatically keep PC locked as long as scheduled. Password protected, has System Time protection. Great software for Parents.
Shareware,
Updated 16 October 2014
Downloads
340
340
Last week
1
1
PREDATOR 3.1.0.201
With PREDATOR, you can lock and unlock your PC by simply removing or inserting a USB flash drive. You can use any USB stick, the program will generate a security code and place it on the device to identify it as the key.
With PREDATOR, you can lock and unlock your PC by simply removing or inserting a USB flash drive. You can use any USB stick, the program will generate a security code and place it on the device to identify it as the key.
Shareware,
Updated 17 October 2014
Downloads
1,011
1,011
Last week
3
3
Gidiware_Dexktop_Security 1.5
This is a computer based security software that helps computer administrators and Guidance to help keep their computers safe from users and also prevent users or children from performing activities that are not permitted by the administrator.
This is a computer based security software that helps computer administrators and Guidance to help keep their computers safe from users and also prevent users or children from performing activities that are not permitted by the administrator.
Shareware,
Updated 5 September 2016
Downloads
227
227
Last week
1
1
Webcam Zone Trigger 3.302
Traditional software simply alerts you when motion is detected within the camera's view. Zone Trigger lets you decide what will happen when motion is detected in an unlimited number of "Hot Spots" located anywhere within the camera's range.
Traditional software simply alerts you when motion is detected within the camera's view. Zone Trigger lets you decide what will happen when motion is detected in an unlimited number of "Hot Spots" located anywhere within the camera's range.
Shareware,
Updated 11 October 2014
Downloads
644
644
Last week
1
1
Reach-a-Mail Password Recovery 1.1.250.2014
Reach-a-Mail Password Recovery - the program to recover Reach-a-Mail email passwords.
Reach-a-Mail Password Recovery - the program to recover Reach-a-Mail email passwords.
Shareware,
Updated 8 February 2016
Downloads
334
334
Last week
1
1
My MSN Password Recovery 2.8.320.2014
My MSN Password Recovery - the program to recover MSN Messenger passwords. The program supports all versions of the MSN Messenger.
My MSN Password Recovery - the program to recover MSN Messenger passwords. The program supports all versions of the MSN Messenger.
Shareware,
Updated 8 February 2016
Downloads
717
717
Last week
1
1
FTP Password Recovery Server 1.5.220.2014
FTP Password Recovery Server - recover lost or forgotten passwords for any FTP client.
FTP Password Recovery Server - recover lost or forgotten passwords for any FTP client.
Shareware,
Updated 8 February 2016
Downloads
256
256
Last week
1
1
Null Logics The Bat! Password Recovery 1.5.450.2014
Null Logics TheBat! Password Recovery - the program to recover TheBat! email passwords.
Null Logics TheBat! Password Recovery - the program to recover TheBat! email passwords.
Shareware,
Updated 8 February 2016
Downloads
366
366
Last week
1
1
ThreatSentry - Web Application Firewall 4.3.4.0
Privacyware’s award-winning IIS Web Application Firewall and Host Intrusion Prevention solution, ThreatSentry, stops a wide range of web application threats and helps IT departments certify compliance with PCI DSS.
Privacyware’s award-winning IIS Web Application Firewall and Host Intrusion Prevention solution, ThreatSentry, stops a wide range of web application threats and helps IT departments certify compliance with PCI DSS.
Commercial,
Updated 19 August 2014
Downloads
660
660
Last week
1
1
KeyProwler 7.0.8
KeyProwler is an easy to setup and use PC monitoring application for Windows that allows you to remotely monitor any PC. Take screenshots, log keys, spy on clipboard and running processes, and more! KeyProwler runs completely hidden!
KeyProwler is an easy to setup and use PC monitoring application for Windows that allows you to remotely monitor any PC. Take screenshots, log keys, spy on clipboard and running processes, and more! KeyProwler runs completely hidden!
Demo,
Updated 23 November 2021
Downloads
345
345
Last week
1
1
Folder Crypt 3.6.7020
Password encryption for Windows file and folders with standard algorithms (AES, DES,ARC4...) With Folder Crypt you can password protect your folders and secure your data by applying a true, low level encoding. Strong ciphers up to 2048 bits.
Password encryption for Windows file and folders with standard algorithms (AES, DES,ARC4...) With Folder Crypt you can password protect your folders and secure your data by applying a true, low level encoding. Strong ciphers up to 2048 bits.
Shareware,
Updated 17 August 2014
Downloads
837
837
Last week
1
1
checksum 1.5
An easy-to-use, no-nonsense SHA1, BLAKE2 & MD5 data verification app, capable of creating & verifying checksums for files and folders, even whole drives, with a click. It's robust, lightning fast, intuitive, and highly customizable.
An easy-to-use, no-nonsense SHA1, BLAKE2 & MD5 data verification app, capable of creating & verifying checksums for files and folders, even whole drives, with a click. It's robust, lightning fast, intuitive, and highly customizable.
Shareware,
Updated 6 September 2014
Downloads
538
538
Last week
1
1
Recycle Bin Wiper 4.32
The Recycle Bin Wiper allows you to delete your files with 12 passes of overwriting, making the deleted files completely unrecoverable and really gone for good. The full version is also affordable enough for nearly everyone.
The Recycle Bin Wiper allows you to delete your files with 12 passes of overwriting, making the deleted files completely unrecoverable and really gone for good. The full version is also affordable enough for nearly everyone.
Shareware,
Updated 31 July 2014, Reviewed 20 January 2014
Downloads
427
427
Last week
1
1
SecuStar 2014o
Password management with synchronization. SecuStar administrates your passwords safely and clearly. Furthermore SecuStar can synchronize between several PCs, so you have access to your passwords from all the devices you are working with.
Password management with synchronization. SecuStar administrates your passwords safely and clearly. Furthermore SecuStar can synchronize between several PCs, so you have access to your passwords from all the devices you are working with.
Shareware,
Updated 15 July 2014
Downloads
681
681
Last week
1
1