Home | Submit a file  |  New  |  Categories  |  Our awards  |  Link to us  |  RSS Feeds

Popular search phrases :: M :: monitoring
Display: short descriptions | full descriptions
  • Invisible PC Keylogger secrectly records all Facebook use, keystrokes typed, Skype, Windows Live Messenger and Yahoo Messenger chats, websites visited, emails read, microphone sound, documents opened, windows opened, clipboard data, passwords typed and applications executed. It sends logs to a specified email like every 60 minutes. It is completely invisible to the monitored users. Great tool for catching cheaters, monitoring kids and employees.
  • PC Spy Keylogger secretly logs Facebook, keystrokes, chats, IMs, emails, websites visited, microphone, video talk, logins, passwords, applications, searches, documents and more. Logs Skype, Yahoo Messenger, MSN, ICQ, AIM, etc. Takes screenshots every x seconds like a spy cam. Sends logs to your email. You can check logs on a remote PC, tablet, smart phone, or directly on the monitored PC. Perfect for monitoring employees, kids and spouse.
  • AA Mail Server, from www.aamailsoft.com, is mail server software with dedicated database based on Windows mail server. It's a webmail server with full featured mail service. At the same time, this mail server software is easy to setup and configure, can help you create a mail system easily and run in minutes. Especially for small and medium-sized companies (1~20000 accounts) to build their own mail server on the LAN and Internet. AA Mail Server mainly including following functions: 1. Easy to use Windows Mail Server software for Windows XP/2000/2003/Vista/Windows7. 2. Provides full featured email service, supports SMTP/SMTP Auth/POP3/SSL POP3 Remote etc. 3. Supports 1~20000 accounts with each 8G+ mailbox capacity, suitable for small to medium business. 4. Provides a unique feature of ISP Mailbox Mapping Mode to help you save cost significantly. For those companies that already have ISP mail service and will not give up it. AA Mail Server can automatically retrieve mails from and send emails via I ...
  • Axence NetTools is a FREE set of very handy and useful network administration tools: NetWatch - network monitoring with alerting, real-time & historical charts; WinTools lists exhaustive system information from Windows computers; port scanner; network scanner; NetStat lists local inbound & outbound connections; TCP/IP workshop for low level service testing; ping; fast traceroute; DNS lookup; bandwidth test tool; SNMP browser and more.
  • Axence nVision gives you everything you need to manage your network in an efficient and effective manner. The application consists of 5 modules (centrally managed): proactive network monitoring and visualization; hardware and software inventory (license audit); intelligent user monitoring (blocking websites); data leak protection (port blocking), helpdesk (remote access, trouble ticket database, chat) - all with a wide range of alerts & reports.
  • LanAgent is a smart tool to monitor all actions of a remote computer user. The program records various kinds of data, which will be sent to you on your first request: keystrokes; connections established; websites visited; programs, files or directories opened; clipboard contents and so on. A detailed report on a specified time period is always available to you, yet the program is absolutely invisible to this remote user.
  • In the modern work place, managers effectively use network pc monitoring to ensure employee productivity and to keep an eye on undesirable system activities. Kernel Computer Activity Monitor is an advanced tool designed for this purpose. It is invisible to the PC users, as it does not appear in the Task Manager, Process List, Desktop, and Add/Remove Programs. It is a useful tool for organizations as well as individuals - investigators can use it to spy system happenings, and parents can use it to monitor the activities of children. It invisibly takes screenshots, records key strokes, monitors internet and email activities, gives information about Application accesses, saves clipboard activities, tracks passwords and notifies of print activities. Using this tool is an easy thing because of its user-friendly interface. You can configure this application to monitor and record the activities, so that your physical presence is not necessary at the time of monitoring. In addition, there is an option to receive reco ...
  • The ActivityZilla simplifies user activity monitoring - now you can monitor all your kid's PC activity directly from your web browser! Do you want to see what your kids are doing on the computer when you are away? Now this is possible by just using your web browser on a PC or a smartphone. Internet can be a dangerous place for your kids. It is your responsibility to monitor what your kids are doing on a PC.
  • SpyPal Free Keylogger secrectly records Facebook, keystrokes, screenshots, websites visited, applications, clipboard, passwords, emails, documents and more. In Invisible Mode, it is completely hidden to monitored users. Use hotkey and password to access the program. Automatically sends logs to your email every x seconds. Perfect for monitoring employees and parental control.
  • iMyth Security Systems is a tool designed to help you deal with a large number of threats and intrusion issues that can target drives and devices connected via USB. It provides general protection in the form of system and USB shields, allows you to immunize your devices as well as completely block USB ports. A well structured interface iMyth Security Systems displays a user-friendly interface which is separated according to the main functions it provides. You get quick access to protection features, system tools, USB configuration, device immunization and scanning, drive monitoring and even activity logs. The application is well structured and should pose no problem to anyone when it comes to using and configuring. Lock USB ports and encrypt files Since malware takes all shapes and can be transported to your computer using a large number of containers, iMyth Security Systems allows you to avoid any risks and completely block the use of a USB port. It allows you to disable any kind of commu ...
  • PC Monitoring Keylogger secretly logs Facebook, keystrokes, chats, IMs, emails, websites visited, microphone, video talk, logins, passwords, applications, searches, documents and more. Logs Skype, Yahoo Messenger, MSN, ICQ, AIM, etc. Takes screenshots every x seconds like a spy cam. Sends logs to your email. You can check logs on a remote PC, tablet, smart phone, or directly on the monitored PC. Perfect for monitoring employees, kids and spouse.
  • Invisible Spy Keylogger secretly logs Facebook, keystrokes, chats, IMs, emails, websites visited, microphone, video talk, logins, passwords, applications, searches, documents and more. Logs Skype, Yahoo Messenger, MSN, ICQ, AIM, etc. Takes screenshots every x seconds like a spy cam. Sends logs to your email. You can check logs on a remote PC, tablet, smart phone, or directly on the monitored PC. Perfect for monitoring employees, kids and spouse.
  • Remote Spy Keylogger secretly logs Facebook, keystrokes, chats, IMs, emails, websites visited, microphone, video talk, logins, passwords, applications, searches, documents and more. Logs Skype, Yahoo Messenger, MSN, ICQ, AIM, etc. Takes screenshots every x seconds like a spy cam. Sends logs to your email. You can check logs on a remote PC, tablet, smart phone, or directly on the monitored PC. Perfect for monitoring employees, kids and spouse.
  • Home PC Keylogger secretly logs Facebook, keystrokes, chats, IMs, emails, websites visited, microphone, video talk, logins, passwords, applications, searches, documents and more. Logs Skype, Yahoo Messenger, MSN, ICQ, AIM, etc. Takes screenshots every x seconds like a spy cam. Sends logs to your email. You can check logs on a remote PC, tablet, smart phone, or directly on the monitored PC. Perfect for monitoring employees, kids and spouse.
  • Screenlogger is smart and clever program recording PC-user activities, the main software function is screen-shots (snapshots) logging when You set time-periods to create sreenshots and delete them, the kind of Keylogger logging most actual things: logs clipboard, search engine queries, social networks, messengers: Skype, ICQ, AIM, etc., files, applications activities, visited web-sites, remembering logins and passwords, useful information security soft for parental or employees control monitoring purposes Screenlogger main characteristics: Logging each keystroke, Screenshots' logging by set periods, Screenlogger friendly software interface, Clipboard data logging, Logging of search engines' queries, sites, social networks, messengers, files, Screenlogger LogFile search system, Logs calendar, Logs archive searching, Screenshots logging by set periods, Snapshots auto-deletion setting, Screen-shots quick preview and auto-enlarge by 1 click in LogFile, Works in OS Windows XP, NT, 2000, 2003, ...
  • MultiscopeLite is a simple to use software based video calibration and monitoring tool perfect for the broadcast industry, engineering test, video system developers and post production facilities. The tool offers calibrated video measurement scopes such as a vectorscope, a waveform monitor, an RGB parade and histogram scopes in addition to a high resolution HD video monitor. The tool works with many consumer and professional video capture cards.
  • Sysax FTP Automation is a secure file transfer automation and synchronization program with support for FTP, SFTP and FTPS. Both simple and complicated file transfer sequences can be easily automated. It has many useful features such as transfer status monitoring, email notification, file (de)compression, OpenPGP Encryption and Decryption, task scheduling, FTP scripting, public key authentication, client side SSL certificates and detailed log files. Sysax FTP Automation is much more than a direct drop-in replacement for the Windows console ftp program. The program has its own scheduler that runs as a native NT service. An integrated script development and debugging environment provides the ability to step through each line of any file transfer script. The program also has a script generation wizard that generates complete scripts that can be furthur fine tuned and debugged. Many advanced features such as controlled synchronization between local and remote folders, PGP encryption and decryption, and file ...
  • Do you want to know how your employees are using their internet? Just try RecoveryFIX Employee Activity Monitor, a sophisticated tool for internet activity monitoring. The software is easy to install and requires no specific skill set to operate. With this tool, you can easily get details of website visited, and date and time of visiting. You also can have the screenshots and logs of all the activities.
  • SPYERA is an application that you install on a mobile phone. After installation, SPYERA secretly records events that happen on the phone and delivers this information to a web account, where you can view these reports 24x7 from any Internet enabled computer or mobile phone. SPYERA PHONE version also allows you to listen live calls, listen surroundings of the target mobile, and to know the location of the device.
  • Get free, real-time alerts if one of your IPs or domains is found in a hacker forum, a blacklist, or the AlienVault Open Threat Exchange (OTX) database, indicating a potential breach. The OTX database is the industry's only open and collaborative threat intelligence system, providing the most comprehensive IP reputation data available. Monitoring changes to your IPs and domains' reputation provides an early warning sign of a potential breach.
  • LogMeister is a powerful solution to centrally monitor and analyze virtually any log your systems and applications can generate including Event Logs, text logs and RSS. It will alert you to critical events throughout your network, facilitate central archiving of log data and assist with analysis and meeting audit requirements. As LogMeister is a centralized monitoring solution there is no need to install agents on monitored PC's and servers.
  • Sly Keylogger is the first free keylogging software which is able to monitor almost any activity on computer, when you are away. Just put it on computer, configure, and you will know what websites were visited and what applications were used. You will be able to read online conversations, and to see screen shots. Sly Keylogger is very powerful program for covert monitoring of user activities. Download it now, and you will find out the truth.
  • Any Employee Monitoring is designed for admin of enterprise to monitor and control all computers found in your company. It can be used to not only records computer activities, including screenshots, emails, IM chats, visited websites, programs launched, used files, print and traffic, but also control and restrain your computers activities. It is an easy to install and use program produced for no matter what size of teams.
  • Find any rogue laptops on your corporate network, and do something about it. Who Is On My Wifi will show you every computer on your network, notify you about the new computers. Is someone using my wireless? Are employee's plugging in home laptops on the corporate lan? Find out now with Who Is On My Wifi. It is an ideal internal security network monitoring system for your small to medium sized business.
  • Kernel Computer Activity monitor is the software to trust when it is important to track all computer activities of employees. It captures snapshot of the target computer screen at specific intervals. One can specify maximum size of snapshots and also if snapshot should be of the active window. Every key that is pressed by user gets recorded. Administrator can check what all keys were typed after analyzing the keystrokes. Kernel Computer Activity Monitor records every internet activity ranging from browsers used, pages visited, visit time or user name. The tool enabled admin to look at the history of accessed application. Details such as name, launched time, executable path and launched by information are recorded about the application. The admin can save clipboard activities as well that can let you know everything that was copy-pasted including text and images. Kernel Computer Activity Monitor reports every email activity that is accessed without using SSL connection. The reports include date and time ...

Page 7 of 10
1 2 3 4 5 6 7 8 9 10


Legal disclaimer | Privacy policy

© 2004-2016 IT Shareware