Screenlogger is smart and clever program recording PC-user activities, the main software function is screen-shots (snapshots) logging when You set time-periods to create sreenshots and delete them, the kind of Keylogger logging most actual things: logs clipboard, search engine queries, social networks, messengers: Skype, ICQ, AIM, etc., files, applications activities, visited web-sites, remembering logins and passwords, useful information security soft for parental or employees control monitoring purposes Screenlogger main characteristics: Logging each keystroke, Screenshots' logging by set periods, Screenlogger friendly software interface, Clipboard data logging, Logging of search engines' queries, sites, social networks, messengers, files, Screenlogger LogFile search system, Logs calendar, Logs archive searching, Screenshots logging by set periods, Snapshots auto-deletion setting, Screen-shots quick preview and auto-enlarge by 1 click in LogFile, Works in OS Windows XP, NT, 2000, 2003, ...
If you have some photos taken on your trip or some amazing pictures collected online, why not create a slideshow to make them more attractive? MediaProSoft Free Slideshow Maker helps you create amazing photo slideshow videos for watching and backing up on computer, sending to your friends & families by email, burn them to gift CD/DVD, build a web gallery on your website or upload the slideshows to embed them to MySpace, Blogger, Friendster, etc.
A tool to optimize your online activity (and not only) and ensure a safe and reliable Windows experience is pretty much requisite. Cerberus Security Guard is a program devoted to security challenges whose purpose is to keep your computer safe from attacks of Trojan horses, keyloggers, multiple interceptors, and other kinds of system hacks, including various types of spyware.
Today in the engineered world many users have major problems with the multitude of passwords. With the software abylon LOGON SSO Pro, the user only authenticate once at the windows logon and have additionally an automatic access to password protected applications. The program boasts with high flexibility, centralized administration and enhanced protection against keyloggers and phishing attacks.
"Win" means for MS Windows, "Cln" is the short form of cleanup. WinCln .NET program is used to cleanup the useless files in a PC. It aims to protect your privacy by removing the sensitive data like system logs, visited website, e-mail content and more.
Clean up fast : No install is needed, no time is wasted on file searching.
Free of charge no advertising, no splash screen.
Easy to use : User friendly interface, most functions can be accessed with 2 keystrokes or 3 mouse clicks.
Easy to learn : Shortcut keys are identical with MS Windows.
Web Update utility is included that allows you to quickly find software updates.
Dump files: logs for system event, setup log, etc
You can select the dump files that you like to delete.
Choose the items and confirm with the permanently erase or move to recycle bin button.
It will prompt you to switch to another mode or not when finished cleanup or no item found.
For company, beware of removing critical syste ...
Kid Key Logger Pro is a powerful, fully featured, keylogger, specifically designed for parents to record their children activity, while they let them play on their computers. Kid Key Logger Pro can log keystrokes, mouse and windows events ans also capture screenshots of your desktop. Log files can be written to disk, emailed or uploaded on a server. The key logger can be remote-controlled from another PC or from an Android device.
Sysax Multi Server is a Secure FTP Server and SSH2 Secure Shell Server combined into a single product. It simultaneously supports remote access and file transfer using FTP, FTPS, SFTP, Telnet, and Secure Shell. It also supports web based file transfer using HTTP and HTTPS.
Sysax Multi Server can be administered using the control panel from the local computer or remotely through a browser based web adiministration interface. Users can be authenticated using local windows system accounts, active directory, or Sysax Server specific accounts.
Sysax Multi Server enables the execution of server scripts based on the triggers generated by user actions. For example, a script can be executed whenever a user has successfully logged in or has downloaded a file. The script can be used to send email notifications, perform additional file transfers and local file processing, or even run other programs.
Many advanced features such as download and upload resuming and file integrity verification using CRC, MD5, and SH ...
This software allows you to record all user activities by capturing keystrokes and Internet navigation. With Free Keylogger you will always know what's happening on your computer. You will be able to unveil all secret information including emails, chats, IM sessions, text documents. Plus you can catch all visited websites. The reports are stored into encrypted files, and you can view them anytime with the handy integrated Viewer.
Helps you log in to your favorite websites easily and manage passwords and user names. Personal data can be stored to fill empty fields instantly for registering with new websites quickly or just logging in. Saves individual passwords and usernames for each site. Great for saving your favorites sites, entering contests, applying for jobs, more. Comes with optional voice prompts to give you the name of the site you are moving to or reads fields as you fill them . Page saving added. Buy any one program from our home page and get one program of equal or lesser value free!
With Free Keylogger 2014 you have a chance to uncover the truth. Record all user activities, including keystrokes, clipboard changes; monitor Web navigation and capture screen; record both sides of IM chats. This programs operates invisibly, allowing you to stay away from computer. It records every key typed on keyboard along with other activities, into special reports, every day. You can view recorded information later, using an special Viewer.
Ultra fast SMTP/POP3 server program. Send mail using any mail client complaint with SMTP protocol. Configure this server to be your corporate mail server. Accept mail on behalf of users, until users will retrieve it using POP3. Security features to protect the server from DDoS attacks and block SPAM and spammers. SMTP/POP3 servers work as NT services and without logged in users. Use multiple SMTP gateways if you cannot deliver your email directly
Recover your Google Talk password used in Gtalk previously for which ?Remember Password? option was selected. Tool lists out all the stored password of Gtalk with corresponding email ids. It helps in getting password back which has been forgotten. Generally user creates Gtalk account, inputs user email id and password and ticks the box of remember password which helps in logging-in Gtalk next time Window restart automatically. After a long period of auto-login, users may forget this password which only displays as asterisks characters only. It becomes difficult to identify and guess actual password used to login Gtalk account because no clues available there. Our Google account Gtalk password recovery tool helps in getting back this password easily. Tool is compatible to work on all Windows operating systems including Windows XP, Vista, 7 and Windows 8 operating system. V2 Softlogic also provides password recovery and deletion tool for Acrobat PDF documents and MS Access Database password. Program is complete ...
All In One Keylogger implements the state-of-art technology, and guarantees you full control over your computer. Have you ever thought what site your children are surfing when you are not at home? Who the 'girlfriend' your wife is chatting with all the time really is? What your employees are doing when you are not at home? Now you can monitor chats,e-mails,keystrokes typed,desktop activities, microphone...It can even send you logs by email/FTP.
PCMate Free Keylogger is a free keylogger that records all keyboard actions, the exact words typed, the applications used & even the websites visited. With this easy-to-use surveillance tool, it is better to track activities of other people using your keyboard without your permission in your absence. Furthermore, it runs completely invisible and the continuous log report helps find out what other users do on your computer.
Page 2 of 10
1 2 3 4 5 6 7 8 9 10