ActMon Computer Monitoring Software 5.20
Records all computer activities, including keyboard, chat, email, and visited websites. Useful in exercising parental and professional control over resources. It can even log passwords typed during Windows 2000/XP login. A unique file protection makes ActMon files truly invisible, even to so called spyware "cleaner" tools. For maximum security all data is stored in 256-bit AES encrypted files. Network (LAN) and email support with PRO Edition.
See also: invisible, stealth, keyboard, spy, record, spyware, surveillance, browser, password, Control, Parental, file, keylogger, MSN, AIM, AOL, ICQ, chat, network, log, activity, desktop surveillance, software, security, monitoring, internet, computer, background, email, SMTP
invisible key logger 4.5
Invisible Send email reports. Ftp log reports.
Support unicode and multibyte-character set (MBCS) encoding, thus it can log all languages! Including European, Asia languages etc. It can spy all keyboard events and view it conveniently. It also has ability of invisibly monitor, password protect etc. This quickly updating spyware tool is suited for the investigative or spector needs of law enforcement, government, business, private individuals.
See also: mini, utility, record, log, event, Keyboard, freeware, monitoring, log, key, spy, spyware, family key logger spector, key logger, keyloggers, software
Quick Keylogger 2.1
Quick Keylogger - Perfect Invisible Family Keystroke Logger for PC surveillance! Quick Keylogger is extremely compact, still being award-winning tool. With Quick Keylogger you can easily record all keystrokes, the time they were made and the application where they were entered. It works in the absolutely stealth mode and is completely undetectable spyware: you will not see it in processes list, registry, Add/Remove Programs utility, anywhere.
See also: monitoring software, key logger, parental control software, family keylogger, free keylogger, keylogger, quick keylogger, handy keylogger, elite keylogger
Paessler Netflow Tester 1.0
Paessler Netflow Tester dumps the data of all Netflow packets that a computer receives from a Cisco router. This can be useful when debugging bandwidth monitoring configurations based on Cisco's Netflow protocol. First the Netflow protocol must be enabled and configured on the router. Then the router must be given the IP address of the computer running Netflow tester so that the UDP data packets with Netflow data are sent to that computer.
See also: monitoring, monitor, network, graph, traffic, prtg, volume, ip, usage, bandwidth, mrtg, firewall, router, cisco, netflow, packet sniffing, packet sniffer, netflow, Cisco, SNMP, free, freeware
PrivacyKeyboard for Microsoft Windows 2000/XP is the first product of its kind in the world that can provide every computer with strong protection against ALL types of keylogging programs (keyloggers) and keylogging hardware devices (hardware keyloggers), both known and unknown, currently in use or presently being developed worldwide.
See also: hack, snoopware, spyware, keystroke, key logger, antikeylogger, privacykeyboard, anti-keylogger, keyboard, privacy, hacking, monitoring, spy, anti-monitoring
ClickWork is a no-nonsense, very-easy-to-use Time Tracker. For the professional pc-user. Multi-user. Supports usergroups. Reporting on various levels. Statistical reports. Graphs. Full featured trial version without time limit. Powerful licensing scheme.
ESSENCE: Create activity buttons. Then click any button and ClickWork will start tracking the time spent on that activity. Simply click once more on the activity button to stop the tracking.
See also: time management, project management, activity tracking, time tracking, activity tracker, time tracker, time monitoring, worktime, timelog
Candid Check 1.22
This latest addition to the teaching resources arsenal provides instructors with full control of computer laboratories, libraries and virtual classrooms. Candid Check displays up to 25 workstations on a single screen. All workstations are displayed simultaneously, and the content is updated in real time without user involvement.
See also: monitoring education students computer control classroom
Internet Deadbolt 6.0
?The Internet Deadbolt is more than security software. It allows network administrators, and upper management to get control of their corporate networks by restricting employees downloading of software that may have viruses or worms,? said Anthony Johnson, president of ICC Software. ?It has been on the market since 2002. It?s currently in use in banks and financial institutions to help increase security. ?
See also: PC, software, administering, monitoring employees, monitoring, network, network monitoring, access control software, monitoring software, network security, Internet Deadbolt, internet, control, download, activity recorder, password, secure, protect
TimelyWeb helps you track updates of web pages and ftp resources. When the change is detected, you can be notified in a number of ways including e-mail, SMS or instant messenger message. TimelyWeb can check keywords or exclude parts of web pages (like counters or time). It can also highlight all changes in web pages. Both static and dynamically generated resources can be monitored. If the resource is protected, TimelyWeb will login automatically.
See also: online tools, web site changes monitor, web site change, web site monitor, mindit, mind-it, download, save, timely, remember, alternative, observe, monitoring, monitor, notification, notify, track, detection, detect, changes, change, update, cgi, ftp, https, http, contents, content, page, site, web, webmaster resources, remotely hosted, webmaster, free tools, hosting, abf
ProxyInspector for WinGate 2.7g
ProxyInspector for WinGate is a cost-effective solution for companies that use WinGate proxy to connect their corporate LANs to Internet. This tool analyzes the proxy server log files and produces comprehensive reports on bandwidth consumption by each individual or workgroup, sites visited, users' activity distribution by hours and days of the week, attempts to access blocked sites etc. Use this utility to fight cyberslacking and save your money.
See also: ReportServer, site, report, audit, log, traffic, monitoring, Internet, WinGate
TrackSite Free 5.2.10
TrackSite is real-time, private, invisible, automated, advanced visitor tracking and traffic analytics system for websites. Features: up-to-last-second reporting, invisible tracking, advanced analytics with 40 (12 free) reports, automated installation & usage, cross-platform, reliability of statistics, multi-host tracking, data security, compact database, easy provider switching and more.
See also: counter, views, hits, homepages, engines, keywords, search, webstatistics, reporting, intelligence, tracking, monitoring, analysis, analytics, statistical, trends, clickstream, patterns, visitors, stats, web, real-time, traffic, websites, referrers, log
Keylogger Pro 1.7
KeyloggerPro is an advanced, low level stealth keystroke monitoring application that will secretly record and backup all keystrokes typed (both system keys and regular keys) on your PC. KeyloggerPro offers a wide array of features and options to ensure that it runs exactly to your liking. Additionally, KeyloggerPro allows you to remotely view keystroke logs via e-mail or through www.viewmylogs.com.
See also: internet spy, activity logging, keystroke monitoring, keylogger pro, spy software, key logger, keylogger, pc spy, record keystrokes
Share alarm is a tool that allows you to see parameters of the workstation which tries to establish a connection with your computer.The remote workstation, user, path, OS, permissions of the accessed folder, connection time will available via this tool .The tool is designed with a user-friendly interface and is easy to use.The program have firewall system that allows to block any unwanted connection to your shared resources.
See also: enterprise security, computer security, event log, intrusion detection, port scanner, network security, network utils, port scan, hacking, network monitoring, net tools, network software, network tool, information security, internet scanner, security software, freeware, shareware
Atomic Watch 1.01
Website Downtime = Lost Revenue
Watch your website to ensure you minimize downtime and maximize uptime. If your website is down, search engines may remove your site, partners may remove links to your site, visitors will have a negative opinion of your site and you will loose sales.
AWatch sits quietly in the background of your computer, watching your important websites, order forms and other online resources.
See also: web monitor, AWatch, webpage monitoring software, web site monitoring, network monitor, monitor, monitoring, server monitoring software, web site tool, web page tool, web site management, website monitor, website monitoring software, net monitor, ema
Personal Inspector 4.60
Personal Inspector is an easy-to-use employee monitoring/parental control tool that monitors all computer activity and Internet use. It can automatically track visited web-sites addresses, record all keystrokes and passwords, save clipboard contents and take screenshots of the desktop and working application windows. All collected data is stored in a secret directory on the local computer and can be accessed anytime from this machine or via LAN.
See also: keylogger employe monitoring activity pc monitor keystroke recorder
This remote spy program will allow you to secretly see what others do on your remote PC. There's no need for physical access to the remote PC, because this software stealthily installs through email attachment. Only SniperSpy records actual screenshots and real text logs of activities like full chat conversations, websites visited, applications executed, keystrokes typed, windows clicked and more. All activity is uploaded to your private account.
See also: spy, remote spy software, software spy, remote, sniper, surveillance, monitoring, recorder, monitor, realtime, stealth, activities, internet, chat, invisible
PC Activity Monitor Lite (PC Acme Lite) 7.4.1
PC Activity Monitor Lite (PC Acme Lite) is an ultimate invisible and undetectable easy-to-use monitoring and surveillance tool for personal PCs. It is professional software that captures all users activity on the PC. It is a powerful management tool for users and companies, which want to increase their productivity and profitability. This is the most remarkable security product for a computer you have seen.
See also: security, monitoring, intelligence, access control, parental control, investigation, surveillance, detective, espionage, spy, key loger, keylogger, trojan, hack, hacking, cheating spouse, internet
Visual Hindsight Video Joiner 1.2
Video Joiner is an easy to use multimedia joiner that allows you to join many different video, graphic and audio files to one output video or audio file. Video Joiner can also extract frames from video files, or just convert graphic files to other graphic formats and can recompress input files before including them into a collated file.
See also: remote surveillance systems, remote surveillance system, streaming video server software, ip camera software, internet surveillance software, network camera software, video surveillance software, ptz camera, home monitoring, surveillance software
Classroom Spy Professional 1.1.4
The Classroom Spy allows you to see live screens of remote computers. This way, you can always watch what users are doing on the remote computer. Additionally, you can take control of a remote computer by controlling the mouse and keyboard; this is especially useful when you need to assist the person who uses the remote computer. If you are an administrator, you can easily administer remote computers. You can also share your screen to students.
See also: internet monitoring software, e-learning, software, elearning, remote, education, network, remote, monitor, netmon
IwantSoft Total Spy 2.1
Total Spy - the all-in-one spy program that
- intercepts everything that is typed on keyboard;
- monitors visited URLs;
- scans Windows clipboard for changes;
- makes invisible screenshots every xx minutes;
- writes this all to hidden folder on a hard drive;
...and this program is absolutely invisible for everyone except you. You will only have to press the unhide key combination to show the keylogger.
See also: keylogger, keystroke recorder, spyware, screen scanner, desktop monitoring, clipboard viewer, all-in-one key logger, spy program, sniffer, key recorder, spy