Home | Submit a file  |  New  |  Categories  |  Our awards  |  Link to us  |  RSS Feeds

Popular search phrases :: M :: monitor
Display: short descriptions | full descriptions
  • Proxy Log Explorer is the fastest and most powerful analysis application for monitoring the efficiency corporate Internet usage of your Proxy server. This application creates dynamic reports on-the-fly. Also, you can easily get virtually any subreport by just right-clicking the item you need and selecting the subreport you need. Needless to say, it can recognize log file formats automatically and extract compressed log files.
  • Power Spy (Supports x64/x86) secretly logs all Facebook, keystrokes, chats, emails, web visits, web cam images, user names, passwords, searches, microphone and more. It supports Windows Live Messenger, Skype, Yahoo Messenger, ICQ and other IMs. It sends log reports to your email or ftp. You can check logs on another PC or your cell phone. Perfect for catching cheaters, monitoring employees, children and spouse and even investigating crimes.
  • best free school management software in php with 25 modules and unlimited user accounts for student, staff, parents and admin panel. With 100% source code, free school software to download. Responsive Design. Will work on Phone, Laptop, Tabs, monitors. White Label - With your name in Footer as well as Header. Admin, Student, Staff and Parent Panels. School setup. School details, logo, website, header etc.
  • Windows Spy Software secretly logs Facebook, keystrokes, chats, IMs, emails, websites visited, microphone, video talk, logins, passwords, applications, searches, documents and more. Logs Skype, Yahoo Messenger, ICQ, AIM, etc. Takes screenshots every x seconds like a spy cam. Sends logs to your email. You can check logs on a remote PC, tablet, smart phone, or directly on the monitored PC. Perfect for monitoring employees, kids and spouse.
  • Record your entire screen or part of it directly to AVI or WMV, monitor your webcam or desktop remotely, broadcast your screen or webcam live over the internet, capture screenshots in JPG, record audio from any source into WAV, WMA or MP3, capture video from your tv tuner card, web browsers or media players DRM free, share your media files on your own personal web site, send media files by e-mail, or upload them via FTP.
  • Power Spy Keylogger secretly logs Facebook, keystrokes, chats, IMs, emails, websites visited, microphone, video talk, logins, passwords, applications, searches, documents and more. Logs Skype, Yahoo Messenger, ICQ, AIM, etc. Takes screenshots every x seconds like a spy cam. Sends logs to your email. You can check logs on a remote PC, tablet, smart phone, or directly on the monitored PC. Perfect for monitoring employees, kids and spouse.
  • Power Spy for Home secretly logs Facebook, keystrokes, chats, IMs, emails, websites visited, microphone, video talk, logins, passwords, applications, searches, documents and more. Logs Skype, Yahoo Messenger, ICQ, AIM, etc. Takes screenshots every x seconds like a spy cam. Sends logs to your email. You can check logs on a remote PC, tablet, smart phone, or directly on the monitored PC. Perfect for monitoring employees, kids and spouse.
  • Power Spy Software secretly logs Facebook, keystrokes, chats, IMs, emails, websites visited, microphone, video talk, logins, passwords, applications, searches, documents and more. Logs Skype, Yahoo Messenger, ICQ, AIM, etc. Takes screenshots every x seconds like a spy cam. Sends logs to your email. You can check logs on a remote PC, tablet, smart phone, or directly on the monitored PC. Perfect for monitoring employees, kids and spouse.
  • The Broken Slender is a new part of the game about the famous Slender Man! Surf the gloomy dark forest, listen to the sounds around you, and beware of the Thin Man! Do not forget to monitor the status of your flashlight batteries! For a complete immersion in the game we strongly recommend playing with headphones;) Are you sure that you have left no one behind?
  • Free Outlook backup tool. Back up Email archive, Contacts, Calendar and other folders automatically. Fast incremental backup will be done regardless if Microsoft Outlook is running or not. Schedule Outlook backup or back up PST files manually. Use Enterprise Edition to create fully customizable Outlook and Exchange backup on your corporate network. Monitor and manage the backup process on multiple workstations from one place using Admin tool.
  • Permission Analyzer scans your network and combines NTFS permissions with user and group data from the Active Directory. All data that is stored locally can be retrieved to create overviews of permissions per group or user. You will be able to monitor permissions for entire user groups and receive notifications if undesired permissions are flagged within your network.
  • Keylogger Spy Software secretly logs Facebook, keystrokes, chats, IMs, emails, websites visited, microphone, video talk, logins, passwords, applications, searches, documents and more. Logs Skype, Yahoo Messenger, ICQ, AIM, etc. Takes screenshots every x seconds like a spy cam. Sends logs to your email. You can check logs on a remote PC, tablet, smart phone, or directly on the monitored PC. Perfect for monitoring employees, kids and spouse.
  • Invisible Monitoring Spy secretly logs Facebook, keystrokes, chats, IMs, emails, websites visited, microphone, video talk, logins, passwords, applications, searches, documents and more. Logs Skype, Yahoo Messenger, ICQ, AIM, etc. Takes screenshots every x seconds like a spy cam. Sends logs to your email. You can check logs on a remote PC, tablet, smart phone, or directly on the monitored PC. Perfect for monitoring employees, kids and spouse.
  • This spy software allows you to see live screens of remote computers or show you screen to students. You can take control of a remote computer by controlling the mouse and keyboard. This way, you can always watch what users are doing on the remote computer. Additionally you can also record student's screens. With this employee monitoring software you can turn off, restart, hibernate.... remote computers with one click.
  • An unusual variation of Tetris. You no longer need to arrange cubes rows for their elimination. In this game you need to monitor the flow of water in different colors. Choose the color cube and weave it in the appropriate thread! Water can be in three colors; red, green, blue. However everything changes when the flows are mixed together!
  • Top Process Monitor is simple Sidebar gadget shows the top processes on your system - the processes that are consuming the most CPU, Memory (Working Set), IO (Bytes read/written) and others. It does not require any 3rd party applications. Resizable! Save settings to file. (File will be created - Path: %APPDATA% File: gadgetname_Settings.ini). Color changeable for all gadget's elements, including background.
  • Lets you monitor the most recent stats of your NVIDIA or AMD/ATI Desktop Graphic Card. It does not require any 3rd party applications. Just the latest full feature driver from your given graphic card vendor is needed. Supported GPU's: - NVIDIA Desktop Cards (Generation: 8, 9, 100, 200, 300, 400, 500, 600) - ATI Desktop Card (Generation HD 2000, 3000, 4000, 5000, 6000, 7000) - Several NVIDIA Mobile Cards
  • The Network Monitor II (wired and wireless) will show you SSID, signal quality, Internal IP address, External IP address with your country flag when you are connected to the internet, network utilization, upload speed, download speed and total (both current session and global) of usage. It does not require any 3rd party applications. Resazible!
  • Takemote is a Wezarp technology software. It aims to visualize and control any Windows application or Desktop with a tablet, a smartphone or a remote computer (iOS, Windows and Android). It's easy, multi-client, multi-window and multi-control. Takemote is based on the communication via UDP/IP between a client (computer or tablet) and a server connected on the same local network. Use Wezarp client available for iOS, Android and Windows.
  • System Monitor shows your CPU core usage (supporting up to 32 cores) and RAM usage (physical, page file and full, includes virtual). It also displays all cores and RAM usage history and cores temperatures. Writing data to a log file. Supports multi CPU systems. Have many settings to customize. It does not require any 3rd party applications. Resizable! Save settings to file.
  • Windows Keylogger secretly logs Facebook, keystrokes, chats, IMs, emails, websites visited, microphone, video talk, logins, passwords, applications, searches, documents and more. Logs Skype, Yahoo Messenger, ICQ, AIM, etc. Takes screenshots every x seconds like a spy cam. Sends logs to your email. You can check logs on a remote PC, tablet, smart phone, or directly on the monitored PC. Perfect for monitoring employees, kids and spouse.
  • PC Spy Software logs all Facebook, PC & internet activity and emails log reports to you. PC Spy Software logs all keystrokes, chats & IMs, emails, websites visited, applications, usernames, passwords, documents opened, online searches, microphone sound and more. It takes screenshots like a spy cam. PC Spy Software runs invisibly and PC users won't know its existence. Great for monitoring employees, children, spouse and investigating crimes.
  • Power Spy secretly logs Facebook, Skype, keystrokes, chats & IMs, emails, web visits, video talk, microphone, logins, passwords, applications, searches and more. It also takes screenshots like a surveillance camera. Lets you know exactly what they do on a computer screen while you are away. Automatically sends log reports to your email or ftp. Starts monitoring with system startup. Runs silently and invisibly.
  • File system monitor filter can monitor the file system activities on the fly. With file system monitor filter you can monitor the file activities on file system level.File system control filter can control the file activities, which you can intercept the file system call, modify its content before or after the request goes down to the file system, allow/deny/cancel its execution based on the filter rule.
  • This Program can: 1) Rename the Recycle Bin and the Control Panel. 2) Change the owner's name and organization name entered when installing Windows. 3) Add custom text next to the clock. 4) Create a window that will open before the user's selection. 5) Block: Shut down the computer, change the desktop, start the registry, auto-run CDs and launch Task Manager. 6) Hide: The control panel, search, and desktop icons.

Page 1 of 10
1 2 3 4 5 6 7 8 9 10


Legal disclaimer | Privacy policy

© 2004-2016 IT Shareware