Home | Submit a file  |  New  |  Categories  |  Our awards  |  Link to us  |  RSS Feeds

Display: short descriptions | full descriptions
  • SpyPal secrectly records Facebook, keystrokes, screenshots, websites visited, applications, Skype, Yahoo Messenger, clipboard, passwords, emails, documents, microphone and more. In Stealth Mode, it is completely invisible to monitored users. Use hotkey and password to access the program. Automatically sends logs to your email or ftp every x seconds. Perfect for monitoring employees, children, spouse and investigating crimes.
  • Web Log Explorer is an interactive, desktop-based log analyzer for Windows. This analyzer create "multilevel" and cross-linked reports. It allows you to dig as deep into your log files as you need to. Explore your site, proxy or other logs without any limits! Web Log Explorer supports more than 30 log file formats and can recognize log file formats automatically, extract compressed log files, process multiple log files.
  • Power Spy Lite secretly logs Facebook, Skype, keystrokes, chats & IMs, emails, web visits, video talk, logins, passwords, applications, searches and more. It also takes screenshots like a surveillance camera. Lets you know exactly what they do on a computer screen while you are away. Automatically sends log reports to your email. Starts monitoring with system startup. Runs silently and invisibly.
  • Power Spy secretly logs Facebook, Skype, keystrokes, chats & IMs, emails, web visits, video talk, microphone, logins, passwords, applications, searches and more. It also takes screenshots like a surveillance camera. Lets you know exactly what they do on a computer screen while you are away. Automatically sends logs to your email or ftp. Starts monitoring with system startup. Perfect for parental control, monitoring employees or catching cheaters.
  • Power Spy (Supports x64/x86) secretly logs all Facebook, keystrokes, chats, emails, web visits, web cam images, user names, passwords, searches, microphone and more. It supports Windows Live Messenger, Skype, Yahoo Messenger, ICQ and other IMs. It sends log reports to your email or ftp. You can check logs on another PC or your cell phone. Perfect for catching cheaters, monitoring employees, children and spouse and even investigating crimes.
  • Netwrix Event Log Archiver is a free tool to automatically consolidate, archive, and report on Windows event logs across the network. The tool collects and consolidates event logs from multiple servers and archives them in a central location. The archives are stored in the original EVT format and can be viewed using the standard Event Viewer or imported into a SQL database for reporting.
  • Power Spy software secrectly logs Facebook use, keystrokes, website visits, emails, chats and IMs: Skype, Yahoo Messenger and more. Takes screen snapshots at every X seconds like a surveillance camera. Displays exact activities, like Facebook, PC games, online searches & shopping, file transfers and webmails. You can receive reports remotely via emails or ftp. Perfect for monitoring kids, spouse and employees.
  • Web Log Explorer is an interactive free, desktop-based log analyzer for Windows. This analyzer create "multilevel" and cross-linked reports. It allows you to dig as deep into your log files as you need to. Explore your site, proxy or other logs without any limits! Web Log Explorer supports more than 30 log file formats and can recognize log file formats automatically, extract compressed log files, process multiple log files.
  • Power Spy Keylogger secretly logs Facebook, keystrokes, chats, IMs, emails, websites visited, microphone, video talk, logins, passwords, applications, searches, documents and more. Logs Skype, Yahoo Messenger, ICQ, AIM, etc. Takes screenshots every x seconds like a spy cam. Sends logs to your email. You can check logs on a remote PC, tablet, smart phone, or directly on the monitored PC. Perfect for monitoring employees, kids and spouse.
  • A1 Keylogger spy software secretly logs all their chats & IMs, emails, Facebook use, keystrokes (including user names & passwrods), video talk via web cam, YouTube videos watched, web pages opened, online searches, applications executed, documents opened, clipboard text and more. Send log reports to your email like per 60 minutes. It runs in a complete Stealth Mode. Administrator of the software can unhide and manage it easily with hotkey.
  • HealthUse is a reliable program that enables you to restrict the computer access for children or other users. The software can lock the computer if one of the specified users logs in during the unauthorised time. The administrator can unlock the computer at any time, since it is the only one account with no limitations. For example, you can build a child account, set Monday to Friday use no more than 1 hour all day, rest for 5 minutes every 20 minutes, only use between 19:00 to 21:00; set Sunday and Saturday use no more than 2 hours all day, rest 2 minutes every 15 minutes and so on. If you are the office worker, you can create a new account for yourself, set every 10 minutes rest for 2 minutes. When rest time arrives, HealthyUse will lock the computer screen, force user to rest (administrator account can unlock computer screen at any time).
  • Power Spy secretly logs Facebook, Skype, keystrokes, chats & IMs, emails, web visits, video talk, microphone, logins, passwords, applications, searches and more. It also takes screenshots like a surveillance camera. Lets you know exactly what they do on a computer screen while you are away. Automatically sends log reports to your email or ftp. Starts monitoring with system startup. Runs silently and invisibly.
  • Skype Spy Monitor Pro secretly records Skype incoming and outgoing IMs, calls and video chats. It logs all Windows users on a PC. It runs completely invisibly so that Skype users won't know its existence. It sends logs to an email or ftp like every 60 minutes. It is a great tool for monitoring your kids, spouse, employees, competitors and friends on Skype while you are away. You are able to know exactly what they are talking about online.
  • Power Spy Software secretly logs Facebook, keystrokes, chats, IMs, emails, websites visited, microphone, video talk, logins, passwords, applications, searches, documents and more. Logs Skype, Yahoo Messenger, ICQ, AIM, etc. Takes screenshots every x seconds like a spy cam. Sends logs to your email. You can check logs on a remote PC, tablet, smart phone, or directly on the monitored PC. Perfect for monitoring employees, kids and spouse.
  • Yahoo Messenger Spy Monitor secretly records all Yahoo Messenger incoming and outgoing instant messages. It sends logs to your custom email or ftp. You can check all records by simply receiving emails or opening a web page. Use hotkey to unhide it from the Stealth Mode and protect program access by password. Perfect for catching cheaters, monitoring employees, children or spouse, and even investigating crimes.
  • Real PC Spy software is a smart PC surveillance software that lets you know exactly what people do on a PC. It secretly records all PC and internet activity, including typed keystrokes (keylogger), chats & IMs, emails, websites visited, microphone, Facebook use, games played, online shopping and searches, video talk, videos watched, documents opened, clipboard text and more. It sends logs to your email or ftp like every 30 minutes.
  • Blogspreading is a small free utility, which automatically appends a link to the latest post in your blog to your e-mail signature. This will easily catch the recipients' interest and convert them to readers of your blog. All e-mail clients allow automatic adding of a signature to outgoing message. The signature is stored in an external text file. Blogspreading processes this file in such a way that it always contains a link to the latest post.
  • Unicorn network analyzer is an Ethernet network analyzer (aka. packet sniffer or protocol analyzer) for network monitoring and troubleshooting purposes. It performs real-time packet capturing, 24/7 network monitoring, advanced protocol analyzing, in-depth packet decoding, and automatic expert diagnosing. Unicorn network analyzer offers a summary-to-detail, intuitive, easy-to-use graphical interface that network engineers can use to rapidly analyze and troubleshoot enterprise networks, Officers of a company can use to monitor user activity on network. it can also be used for debugging protocol implementations by aficionados that want to learn more about how network protocols work. Key Features 1. Real-Time packet capture and analyze 2. Rapidly troubleshoot enterprise networks 3. A variety of alarms notice 4. A variety of logs
  • Power Spy secretly logs Facebook use, keystrokes, chats, emails, web sites, web cam images, user names, passwords, applications excuted and more. It records IMs in Skype, Yahoo Messenger, ICQ and others. Power Spy runs silently with system startup and automatically sends log reports to your email or ftp. Easy to install and setup. It is widely used in offices, homes, schools, detective agencies and police department.
  • Skype Spy Monitor secretly record Skype's incoming and outgoing chat messages. It runs completely invisibly so that Skype users won't know its existence. Skype Spy Monitor send log reports to your email or ftp periodically. You can also check logs directly on the monitored PC. It is a small but powerful program that consumes very little system resource. Perfect for monitoring employees, children or spouse, and even investigating crimes.
  • SpyKing PC Spy secretly logs all Facebook use, keystrokes, chats & IMs, emails, web sites, user names, passwords, web cam images, apps, microphone, clipboard and more. It supports Skype, Yahoo Messenger and others. It also takes screenshots like a surveillance camera. You can receive reports remotely via email or ftp as often as you wish. Open these reports on another PC or on your cell phone browser.
  • Logstatic is an easy-to-use, yet powerful Log Analyzer. Designed for a convenient Amazon S3/CloudFront and Rackspace CloudFiles (Akamai CDN) service analytics and monitoring, it offers an automatic log fetching and analysis straight from your Amazon and Rackspace accounts.
  • Keylogger Spy Monitor spy software can secretly record all keystrokes typed on your computer. It runs completely invisiblely. You can check logging reports by simply receiving emails or opening a web page. Perfect for catching cheaters, m onitoring employees, children or spouse, acquiring others' passwords and even investigating crimes. Use hotkey to unhide it from Stealth Mode and protect the program access by password.
  • Spytech SpyAgent is powerful spy software that allows you to monitor EVERYTHING users do on your computer - in total STEALTH. SpyAgent provides essential computer monitoring features, as well as website and application content filtering, chat client blocking, lockdown scheduling, and remote delivery of logs via email. SpyAgent's advanced, easy to use feature-set is unmatched, and provides the ultimate all-in-one computer monitoring solution.
  • PhotoGUN - No more time consuming, repetitive work! Simply drag and drop a picture, a hundred or thousands of photos, to the drop-window and select operations you want to apply to them. You can perform the following operations: - Resize photos to make them more suitable for emails, blogs, websites, social networks, your personal use or for your business; - Adjust brightness, contrast and saturation to enhance the light and color balance; - Add professional touches to your photos and apply -Vignetting-, a creative effect, to draw attention to the center of the frame; - Add watermark to prevent unauthorized use and/or copyright text or company logo with a customizable transparency level and other parameters. You can also use this operation to merge your photos; - Crop to cut away unneeded image parts; - Rotate to change the image angle; - Mirror to flip the image vertically and horizontally; - Blur to hide some of the details of your photos (different levels of blurring available); - Add Borders for a decorativ ...

Page 1 of 10
1 2 3 4 5 6 7 8 9 10


Legal disclaimer | Privacy policy

© 2004-2014 IT Shareware