Portfolio Performance Monitoring 1.0
The Portfolio Performance Monitoring model enables the ongoing monitoring and periodic valuation of a portfolio of financial investments. The model allows the entering of investment transactions during a reporting period to calculate performance. Furthermore, incremental investment transactions undertaken during a period are fully accounted for in the period's performance calculations.
See also: analysis, weighted, money, transactions, return, performance, market, shares, bonds, stocks, wealth, personal, assets, investments, financial, management, valuation, monitoring, portfolio, Excel, business
3click Budget - Your personal Finance Manager. The easy way to track your money. Detailed reports and graphics illustrate where your money flows. This allows you to increase your savings. Unlimited budgets, accounts and categories. Exchange data with third party programs.
See also: shareware, software, bookkeeping, monitoring, savings, funds, category, money, cash, manage, organize, income, expenses, accounting, personal, finance, budget
Personal PC Spy 2.0.2
Personal PC Spy is the most powerful stealth keylogger software. Personal PC Spy runs silently at the lowest level of windows capturing every keystroke typed including usernames and windows log-on passwords. Personal PC Spy can also capture active window text, text typed in all popular instant messengers including AOL, YAHOO, ICQ, MSN AND AIM.
See also: invisible keylogger, active keylogger, free, free keylogger, best keylogger, spyware, monitoring, record all keystrokes, personal pc spy
SterJo Portable Firewall PRO 1.3
SterJo Portable Firewall PRO is device designed to prevent outsiders from accessing your network even if it is run from a USB drive. The unit serves as the single entry point to your network and evaluate all TCP connections requests as they are received comparing them with each rule in the policy.
See also: firewall, security, monitoring, personal firewall, portable firewall, protect, access, block, internet, privacy, hacker, trojan, policy, log, intruder
ActyMac DutyWatch 1.8.8
ActyMac DutyWatch is an Employee Monitoring Software for Mac OS X. All application and keyboard activity recorded so you will know everything your employees are posting, opening and use. You will have a quick top-level view of everything they have been doing over the past day, week, month or several months. DutyWatch automatically takes hundreds of snapshots every hour, so that you can see everything employees do on the computer.
See also: employee monitoring, employee monitoring mac, mac os x, os x employy monitoring, personal monitoring, privacity, application monitoring
Portfolio Performance Monitoring 2.1
The Portfolio Performance Monitoring template enables the ongoing monitoring and periodic valuation of a portfolio of financial investments. The model allows the entering of investment transactions during a reporting period to calculate performance. Furthermore, incremental investment transactions undertaken during a period are fully accounted for in the period's performance calculations.
See also: Excel, portfolio, monitoring, valuation, management, financial, investments, assets, personal, wealth, stocks, bonds, shares, market, performance, return, transactions, money, weighted, analysis, business
SterJo Portable Firewall Free 3.0
SterJo Portable Firewall Free is device designed to prevent outsiders from accessing your network even if it is run from a USB drive. The unit serves as the single entry point to your network and evaluate all TCP connections requests as they are received comparing them with each rule in the policy.
See also: firewall, personal firewall, portable firewall, monitoring, protect, access, block, internet, privacy, hacker, trojan, policy, log, intruder
Webroot Spy Sweeper 4.5
Spy Sweeper 4.5 takes another leap ahead of the competition. As the leading anti-spyware available, it detects and completely removes the nastiest spyware out there like Elite Keylogger, LOP & Trojan Backdoor-Haxdoor. Webroot pioneered always-on protection and arms Spy Sweeper with 16 Smart Shields. Spy Sweeper remains simple to use and reliable. Backed by FREE expert customer support. We recommend this MUST-HAVE software. FREE DOWNLOAD.
See also: System Monitoring, System Monitor, Adware Cookies, Adware, Trojan Horses, Trojans, adware removal, adware remover, spyware remover, spyware removal, remove spyware, antispyware, Spies, Spy, Spyware, Keylogger, Online Privacy, Identity Theft Protection, Ad Aware, Spybot
With SentryPC you can now restrict and monitor your computer allowing access to what you want when you want for all users!
Specify the hours, the days, and total usage time for virtually every aspect of your computer including specific programs, websites, and basic computer and Internet usage!
Use it as a parental control tool for your children, for your business, computer access, or virtually anywhere you wish to control computer use.
See also: Time Management, Parental Control, Access Control, Monitoring, Filtering, Usage Restriction
OverSpy captures all online conversations, web sites visited, passwords, all emails sent and received, all keystrokes typed, all computer operations and opened documents, and takes screenshots every few minutes. Total surveillance!
See also: surveillance, computer monitoring, spy software, spy, monitoring
IPCheck Server Monitor 184.108.40.2065
IPCheck Server Monitor 5 offers reliable network and website monitoring using Paessler's IPCheck? Technology, easy installation, support for WinNT/2000/XP/2003 and a web based user interface. Sensor types including PING, PORT, HTTP, HTTPS, Advanced HTTP, HTTP Transaction, DNS, SMTP, POP3, SNMP and custom sensors are supported for in depth monitoring. Notifications can be triggered by uptimes, downtimes or slow responses.
See also: SMS, ICQ, pager, dns, ftp, pop3, smtp, https, monitoring, ipcheck, down, snmp, up, http, port, tool, ping, monitor, uptime, downtime, server
Keylogger King Pro 3.3
Keylogger King Pro can be used to monitor how your employees use their work-time and to log all textual data typed by them. This program logs all applications running, all user's keystrokes and grabs screenshots. The program works in a stealth mode. It is not visible in the Windows Task Manager. The program also monitors the Windows Clipboard and addresses of pages opened in a Web browser. Log files can be automatically sent to an e-mail address.
See also: logon, logging, logger, littlesister, Little Sister, law enforcement, keytrapper, keytrap, keystroke, keyspy, keylogwn, keylogger, keylog, keycopy, keyboard, key, government agency, grabber, gathering, internet, investigator, investigative, investigation, investigate, intrusion, interceptor, interception, intercept, intercept, intelligence, inspection, investigator, inspection, internet monitoring, intelligence gathering, industrial espionage, husband, hooking, hook, hardware keystroke recorder, hardware keylogger, hacking, hacker, hack, home security, foreign intelligence, freeware, espionage, equipment, eavsdrop, eavesdropping, eavesdropper, employee monitoring, e-mail monitoring, e-mail, email, economic espionage, desktop monitoring, data interception, desktop, computer, corporate information security policies, computer monitoring, competitor intelligence, competitive intelligence, child monitoring, cheating spouse, control, catch, capture, bugging, bug, bigbrother, Big Brother, business intelligence, background investigation, audio, access control background check, attack, accountability, access, activity monitor, key stroke, keystroke, recording, monitoring, key monitor, recorder, spy on user, keyspy, keyboard capture, keyboard monitoring, keystroke monitoring, key monitor, keystroke recording, keylogwn, keylog, key capture, keystroke capture, keystroke logging, keystroke recorder, keystroke recorder, keycopy, keyboard monitoring, keyboard monitor, keylogger stealth, keyboard logger, invisible keylogger 97, invisible keylogger, keytrap, password, passwords, password grabber, keystroke logger, password recorder, keystroke recorder, hardware keystroke recorder, Hardware KeyLogger, key logger, keylogger, spy software, military agency, monitor, monitoring, nonviral malware, nonvirus malicious programs, password, patrol, parental control, personnel security program, police, private investigator, product, program, p.i., PC, pwd, recorder, recording, surf, software, spy kids, screen capture, snapshot, snooper, snooping, snoopware, spies, spy, spy gadget, spy gear, spy on user, spysoft, spytool, spyware, surveillance, tracking, traffic, trap, trapper, trapware, Trojan, trojan, tool, utilities, video, virus, web, wife, workplace surveillance etc.
PC Activity Monitor Net (PC Acme Net) 6.4.1
PC Activity Monitor (PC Acme) is an ultimate invisible and undetectable easy-to-use monitoring and surveillance tool for both networked and personal PCs. It is professional software that captures all users activity on the PC. It is a powerful management tool for users and companies, which want to increase their productivity and profitability. This is the most remarkable security product for a computer you have seen.
See also: trojan, keylogger, key loger, spy, espionage, detective, surveillance, investigation, parental control, access control, intelligence, monitoring, security, hack, hacking, cheating spouse, internet
XR PerfMon Tools 3.0
XR PerfMon Tools remotely monitors MS Windows computers using WMI technology, providing valuable information for system administrators to optimize the efficiency and setup of servers and workstations. XR PerfMon Tools can get from a computer more than 1 million different variables, including hardware and running software information. An OPC server is available in other license options and it provides open connectivity to the industrial world.
See also: Workstation Monitoring, Server Monitoring, OPC, WMI, PerfMon, XRatel, Computer Performance Monitoring, RPM
Network Eagle Monitor 4.3
Network Eagle is a powerful network monitor. Create categorized task lists on a "set and forget" basis. Network Eagle can ping server, monitor TCP port, check HTTP URL (with HTTP auth.), test FTP link, check disk space usage, execute external command check, check databases via ODBC, monitor MS SQL server via native interface and more. Write your own script checks using JS and VBS. A variety of useful wizards are available.
See also: network monitoring software
Net Spy Pro 2.5
Net Spy Pro is the ultimate combination network monitoring and administration software tool suite. Net Spy Pro monitors activity on your network such as keystrokes typed, web sites visited and more. The same interface also remotely controls vital client PC functions such as viewing a PCs current desktop, sending a message to a PC, application launching, screenshot viewing and more.
See also: remote, administration, network admin, net admin, net vizor, netvizor, lan, monitor, monitoring, spy, network, net spy, netspy, control, windows
AIM Sniffer 1.3
AIM Sniffer is a handy network utility to capture and log AIM (AOL Instant Messenger) chat from computers within the same LAN. It supports not only messaging through AIM server but also direct connection messaging. All intercepted messages are well organized by AIM user with buddies and shown instantly on the main window. It provides rich-features report system to export captured AIM conversations as HTML files for later analyzing and reference.
See also: AOL, Messenger, report, monitoring, conversations, AIM, sniffer, Instant
e-Surveiller spy software 1.6.4
e-Surveiller is a powerful user-activity monitoring, logging and surveillance suite. With it, you can record all keystrokes, Web site visits, windows, chats, etc. of computer users on standalone computers, on a local area network and on remote computers across the Internet. You view the screens of monitored users on a LAN or across the Internet in real-time! User-activity logs are also periodically uploaded or emailed to you for analysis + MORE!
See also: surveillance, snoopware, spyware, watch, key logger, chat monitor, chat logger, PC Spy, Internet Monitor, Activity Recorder, Surveillance, Spy Cam, Logger, Investigator, Internet Investigator, monitoring, inspector, computer security, network monitor
Net Monitor for Employees Professional 2.6.1
The Net Monitor for Employees Professional allows you to see live screens of remote computers. This way, you can always watch what users are doing on the remote computer. Additionally, you have the ability to take control of a remote computer by controlling the mouse and keyboard; this is especially useful when you need to assist the person who uses the remote computer. If you are an administrator, you can easily administer remote computers.
See also: internet monitoring software, e-learning, elearning, software, remote, education, network, monitor, remote, netmon
Advanced Stealth Email Redirector 6.5.1
Advanced SER enables you to collect copies of all the outgoing emails from the particular PC. This program monitors outgoing traffic of the target PC's email client and intercepts all the messages sent from it. Intercepted emails are forwarded to a pre-specified email address. Advanced Stealth Email Redirector (Advanced SER) does not intercept emails sent from web-based email services like www.yahoo.com, www.hotmail.com etc.
See also: security, monitoring, intelligence, access control, parental control, investigation, surveillance, detective, espionage, spy, hack, hacking, cheating spouse, internet