Home | Submit a file  |  New  |  Categories  |  Our awards  |  Link to us  |  RSS Feeds

Popular search phrases :: M :: monitor
Display: short descriptions | full descriptions
  • Free Outlook backup tool. Back up Email archive, Contacts, Calendar and other folders automatically. Fast incremental backup will be done regardless if Microsoft Outlook is running or not. Schedule Outlook backup or back up PST files manually. Use Enterprise Edition to create fully customizable Outlook and Exchange backup on your corporate network. Monitor and manage the backup process on multiple workstations from one place using Admin tool.
  • Permission Analyzer scans your network and combines NTFS permissions with user and group data from the Active Directory. All data that is stored locally can be retrieved to create overviews of permissions per group or user. You will be able to monitor permissions for entire user groups and receive notifications if undesired permissions are flagged within your network.
  • Keylogger Spy Software secretly logs Facebook, keystrokes, chats, IMs, emails, websites visited, microphone, video talk, logins, passwords, applications, searches, documents and more. Logs Skype, Yahoo Messenger, ICQ, AIM, etc. Takes screenshots every x seconds like a spy cam. Sends logs to your email. You can check logs on a remote PC, tablet, smart phone, or directly on the monitored PC. Perfect for monitoring employees, kids and spouse.
  • Invisible Monitoring Spy secretly logs Facebook, keystrokes, chats, IMs, emails, websites visited, microphone, video talk, logins, passwords, applications, searches, documents and more. Logs Skype, Yahoo Messenger, ICQ, AIM, etc. Takes screenshots every x seconds like a spy cam. Sends logs to your email. You can check logs on a remote PC, tablet, smart phone, or directly on the monitored PC. Perfect for monitoring employees, kids and spouse.
  • This spy software allows you to see live screens of remote computers or show you screen to students. You can take control of a remote computer by controlling the mouse and keyboard. This way, you can always watch what users are doing on the remote computer. Additionally you can also record student's screens. With this employee monitoring software you can turn off, restart, hibernate.... remote computers with one click.
  • An unusual variation of Tetris. You no longer need to arrange cubes rows for their elimination. In this game you need to monitor the flow of water in different colors. Choose the color cube and weave it in the appropriate thread! Water can be in three colors; red, green, blue. However everything changes when the flows are mixed together!
  • Top Process Monitor is simple Sidebar gadget shows the top processes on your system - the processes that are consuming the most CPU, Memory (Working Set), IO (Bytes read/written) and others. It does not require any 3rd party applications. Resizable! Save settings to file. (File will be created - Path: %APPDATA% File: gadgetname_Settings.ini). Color changeable for all gadget's elements, including background.
  • Lets you monitor the most recent stats of your NVIDIA or AMD/ATI Desktop Graphic Card. It does not require any 3rd party applications. Just the latest full feature driver from your given graphic card vendor is needed. Supported GPU's: - NVIDIA Desktop Cards (Generation: 8, 9, 100, 200, 300, 400, 500, 600) - ATI Desktop Card (Generation HD 2000, 3000, 4000, 5000, 6000, 7000) - Several NVIDIA Mobile Cards
  • The Network Monitor II (wired and wireless) will show you SSID, signal quality, Internal IP address, External IP address with your country flag when you are connected to the internet, network utilization, upload speed, download speed and total (both current session and global) of usage. It does not require any 3rd party applications. Resazible!
  • Takemote is a Wezarp technology software. It aims to visualize and control any Windows application or Desktop with a tablet, a smartphone or a remote computer (iOS, Windows and Android). It's easy, multi-client, multi-window and multi-control. Takemote is based on the communication via UDP/IP between a client (computer or tablet) and a server connected on the same local network. Use Wezarp client available for iOS, Android and Windows.
  • System Monitor shows your CPU core usage (supporting up to 32 cores) and RAM usage (physical, page file and full, includes virtual). It also displays all cores and RAM usage history and cores temperatures. Writing data to a log file. Supports multi CPU systems. Have many settings to customize. It does not require any 3rd party applications. Resizable! Save settings to file.
  • Windows Keylogger secretly logs Facebook, keystrokes, chats, IMs, emails, websites visited, microphone, video talk, logins, passwords, applications, searches, documents and more. Logs Skype, Yahoo Messenger, ICQ, AIM, etc. Takes screenshots every x seconds like a spy cam. Sends logs to your email. You can check logs on a remote PC, tablet, smart phone, or directly on the monitored PC. Perfect for monitoring employees, kids and spouse.
  • PC Spy Software logs all Facebook, PC & internet activity and emails log reports to you. PC Spy Software logs all keystrokes, chats & IMs, emails, websites visited, applications, usernames, passwords, documents opened, online searches, microphone sound and more. It takes screenshots like a spy cam. PC Spy Software runs invisibly and PC users won't know its existence. Great for monitoring employees, children, spouse and investigating crimes.
  • Power Spy secretly logs Facebook, Skype, keystrokes, chats & IMs, emails, web visits, video talk, microphone, logins, passwords, applications, searches and more. It also takes screenshots like a surveillance camera. Lets you know exactly what they do on a computer screen while you are away. Automatically sends log reports to your email or ftp. Starts monitoring with system startup. Runs silently and invisibly.
  • File system monitor filter can monitor the file system activities on the fly. With file system monitor filter you can monitor the file activities on file system level.File system control filter can control the file activities, which you can intercept the file system call, modify its content before or after the request goes down to the file system, allow/deny/cancel its execution based on the filter rule.
  • This Program can: 1) Rename the Recycle Bin and the Control Panel. 2) Change the owner's name and organization name entered when installing Windows. 3) Add custom text next to the clock. 4) Create a window that will open before the user's selection. 5) Block: Shut down the computer, change the desktop, start the registry, auto-run CDs and launch Task Manager. 6) Hide: The control panel, search, and desktop icons.
  • Active@ Hard Disk Monitor is a disk utility that monitors the status of your hard drives and scan for bad sectors. It is based on the Self-Monitoring Analysis and Reporting Technology. This utility monitors HDD SMART parameters like Temperature, Head Flying Height and Spin-Up Time to notify a user if critical conditions occur. Disk Monitor also displays hard disk drive geometry, time of usage and the overall status of the disk's health.
  • Allows visual monitoring of computers connected to your network. Observe what your employees are doing in real time! Supports messaging of multimple users on the network. Application works through LAN, WLAN or VPN.
  • Audit file access and change in Windows in Real-Time.Monitor the file activities on file system level, capture file open, create, overwrite, read, write, query file information, set file information, query security information, set security information, file rename, file delete, directory browsing and file close I/O requests.You can create the file access log, you will know who, when, what files were accessed.
  • FirePlotter is a real-time firewall connection or session table monitor. It provides the ability to track usage of bandwidth and traffic for Cisco PIX ASA and FortiNet FortiGate firewalls. Installed and operational in less than a minute. FirePlotter provides tabular listings and summary of sessions by Service (HTTP, FTP etc), Destination IP, Source IP and more along with graphical bandwidth usage.
  • Computer Monitoring Spy secretly logs Facebook, keystrokes, chats, IMs, emails, websites visited, microphone, video talk, logins, passwords, applications, searches, documents and more. Logs Skype, Yahoo Messenger, ICQ, AIM, etc. Takes screenshots every x seconds like a spy cam. Sends logs to your email. You can check logs on a remote PC, tablet, smart phone, or directly on the monitored PC. Perfect for monitoring employees, kids and spouse.
  • PhotoFunia frames - desktop widget. Photo effects on the desktop. Now, picture frames a higher resolution. Put a photo of a loved one on the computer screen. Now you do not need a wooden frame around the monitor. Now you have a picture of a loved one in the photo frame on the desktop. Select a photo frame category PhotoFunia. Adjust the zoom widget. Add text. You can drag your widget anywhere on the desktop.
  • Spy Patrol is a user-friendly spy software that runs hidden in the background. Spy Patrol records in stealth mode all th keystrokes typed, passwords, websites visited, chats etc. and takes screen shots of the active windows. Spy Patrol records all the user passwords (including the system logon password!). Spy Patrol captures the emails sent and received, and the messenger conversations are recorded as well! See more at www.spy-patrol.com
  • Power Spy software secrectly logs Facebook use, keystrokes, website visits, emails, chats and IMs: Skype, Yahoo Messenger and more. Takes screen snapshots at every X seconds like a surveillance camera. Displays exact activities, like Facebook, PC games, online searches & shopping, file transfers and webmails. You can receive reports remotely via emails or ftp. Perfect for monitoring kids, spouse and employees.
  • Digital video monitoring. Allows you to observe by WEB-Camera. You can save by motion detector then view it, convert to AVI file. Very useful when you are out of home and want to see for your childs.

Page 1 of 10
1 2 3 4 5 6 7 8 9 10


Legal disclaimer | Privacy policy

© 2004-2016 IT Shareware