Home | Submit a file  |  New  |  Categories  |  Our awards  |  Link to us  |  RSS Feeds

Popular search phrases :: M :: monitoring
Display: short descriptions | full descriptions
  • Do you want to know how your employees are using their internet? Just try RecoveryFIX Employee Activity Monitor, a sophisticated tool for internet activity monitoring. The software is easy to install and requires no specific skill set to operate. With this tool, you can easily get details of website visited, and date and time of visiting. You also can have the screenshots and logs of all the activities.
  • SPYERA is an application that you install on a mobile phone. After installation, SPYERA secretly records events that happen on the phone and delivers this information to a web account, where you can view these reports 24x7 from any Internet enabled computer or mobile phone. SPYERA PHONE version also allows you to listen live calls, listen surroundings of the target mobile, and to know the location of the device.
  • Get free, real-time alerts if one of your IPs or domains is found in a hacker forum, a blacklist, or the AlienVault Open Threat Exchange (OTX) database, indicating a potential breach. The OTX database is the industry's only open and collaborative threat intelligence system, providing the most comprehensive IP reputation data available. Monitoring changes to your IPs and domains' reputation provides an early warning sign of a potential breach.
  • LogMeister is a powerful solution to centrally monitor and analyze virtually any log your systems and applications can generate including Event Logs, text logs and RSS. It will alert you to critical events throughout your network, facilitate central archiving of log data and assist with analysis and meeting audit requirements. As LogMeister is a centralized monitoring solution there is no need to install agents on monitored PC's and servers.
  • Sly Keylogger is the first free keylogging software which is able to monitor almost any activity on computer, when you are away. Just put it on computer, configure, and you will know what websites were visited and what applications were used. You will be able to read online conversations, and to see screen shots. Sly Keylogger is very powerful program for covert monitoring of user activities. Download it now, and you will find out the truth.
  • Any Employee Monitoring is designed for admin of enterprise to monitor and control all computers found in your company. It can be used to not only records computer activities, including screenshots, emails, IM chats, visited websites, programs launched, used files, print and traffic, but also control and restrain your computers activities. It is an easy to install and use program produced for no matter what size of teams.
  • Find any rogue laptops on your corporate network, and do something about it. Who Is On My Wifi will show you every computer on your network, notify you about the new computers. Is someone using my wireless? Are employee's plugging in home laptops on the corporate lan? Find out now with Who Is On My Wifi. It is an ideal internal security network monitoring system for your small to medium sized business.
  • Kernel Computer Activity monitor is the software to trust when it is important to track all computer activities of employees. It captures snapshot of the target computer screen at specific intervals. One can specify maximum size of snapshots and also if snapshot should be of the active window. Every key that is pressed by user gets recorded. Administrator can check what all keys were typed after analyzing the keystrokes. Kernel Computer Activity Monitor records every internet activity ranging from browsers used, pages visited, visit time or user name. The tool enabled admin to look at the history of accessed application. Details such as name, launched time, executable path and launched by information are recorded about the application. The admin can save clipboard activities as well that can let you know everything that was copy-pasted including text and images. Kernel Computer Activity Monitor reports every email activity that is accessed without using SSL connection. The reports include date and time ...
  • A useful, effective and reliable application that monitors computer usage, user activity, programs or websites Terminal Camera is a comprehensive and practical software utility that provides you with a simple means of monitoring computer usage and user activity. With the help of Terminal Camera you have the possibility to track each opened application, playback all user activity within each section. It also provides you with an embedded video player so you can preview the selected action. Terminal Camera also can used for Terminal Services, RDP, RemoteApp, Citrix, XenApp etc.
  • Nsauditor Network Security Auditor is the best network security scanner that allows to audit and monitor network computers for possible vulnerabilities, checks your network for all potential methods that a hacker might use to attack it. Nsauditor is a complete networking utilities package that includes more than 45 network tools for network auditing, scanning, monitoring and more.
  • Services are critical system components. Running in the background, they are widely used in the operating system to control hardware, monitor applications and support all system level functions. RemoteServiceMonitor controls the status of your network services and allows to start or stop remotely. You must have administrative privileges on the network computer.
  • 1 Free Keylogger offers full invisible remote control of user activity on PC: keystroke logger, makes screenshots, web camera snapshots, website visits, online searches, social networks - Facebook, myspace, google+, vkontakte, capture login/password for web sites, apps activity, IM/chat etc. 1 Free Keylogger allows remote monitoring in three ways: sending logs via email or FTP and online logs view via secure web account on 1freekeylogger.com.
  • Any Keylogger Free, as one of hot monitor software in the world, is widely applied to parental control, employee monitoring and private detective service. The keylogger not only record entire activities, including online chat details, clipboard contents and other activities performed on your PC but also block websites and applications, limit PC time for your kids, so that you can easily know what is happening on computers in your absence.
  • LiteManager Free is the perfect tool for anyone searching for free remote desktop software. Its extensive range of features make it useful in many situations. For example, employers can use it for monitoring staff, providing distance training and for offering technical support. This free remote access software includes support for text, audio and video chat as well as a file manager, registry editor, inventory and device manager and more.
  • Free SNMP is mib browser and SNMP monitoring and management software. The software provides basic support for Simple Network Management Protocol (SNMP), allowing users to perform such tasks as viewing and browsing MIBs, performing Walk operation. The tool is designed with a user-friendly interface and is easy to use.
  • DnsEye is monitoring network traffic by capturing Domain Name System DNS packets in network and displays the host names resolve information. The program allows to monitor requested URLs in network, to open it in browser and save captured DNS name list in the file. The tool is designed with a user-friendly interface and is easy to use.
  • BlueAuditor is a easy-to-use program for detecting, scanning and monitoring Bluetooth devices in a wireless network. It can discover and track any Bluetooth device and display key information about each device being detected as well as the services device provided. BlueAuditor will enable network administrators to effectively audit their wireless networks against security vulnerabilities associated with the use of Bluetooth devices.
  • The Excel Invoice template is a simple to use and complete customer invoicing and inventory management system. The Excel invoice template stores invoices, products and customers and performs advanced invoice sales reporting and inventory monitoring. The structure of the invoice system allows the insertion, update and quick access to saved products, customers, and historical customer invoices. Product and customer lists can be imported from and exported back to text lists enabling integration with existing inventory and customer reporting management systems. The Excel invoice template provides a control panel to establish predefined content for the invoice template and facilitate efficient customer invoice management. Products, customers and orders can be quickly and easily accessed, added, modified and removed. Previously saved invoices can be located using a filter screen by customer, product and date and loaded into the invoice template for viewing or modification. Checks are made when saving customer, pro ...
  • Print manager to control and audit printing costs in your organization. O&K Print Watch helps managers learn about the true cost of printing by monitoring all print jobs regardless of whether they are submitted onto a local or networked printer. Supporting multiple printing devices and differential printing pricing combined with per-user quotas and audit of all print jobs makes it possible to cut down printing costs and save on printing.
  • Ultimate Keylogger is advanced all-round monitoring solution. It monitors all activities on computer systems including applications, keyboard, passwords, clipboard, chat, email, and visited websites. Ultimate Keylogger is completely undetectable. Process is hidden from task manager. Files are not visible. Ultimate Keylogger displays reports in web format or sends zip-compressed and encrypted activity reports invisibly via Email, FTP or LAN.
  • MetaLAN is an agentless systems management, remote administration, software audit / software license tracking and hardware inventory tool. Remote control, monitor, plan hardware and software upgrades using the included reports and health monitoring. Get to the bottom of technical issues faster than ever. Save time and get more done in the time you have. All this without needing to visit or install anything on the client computers!
  • "How to convert Webcam into Security Camera? How do I make a CCTV With a Webcam?, how to make your webcam a cctv camera?, How to use IP Camera as a Security Camera? Can I convert my Webcam or IP Cam into CCTV Camera? Can I use my Webcam or IP Cam for security purpose? The answer for all those question lies here ? "Watchman" software is the optimum solution which helps you utilize your Web Camera and IP Camera (Wired and/or Wireless) for setting up a security system. It makes your web camera and IP Camera to be used as CCTV camera and helps you watch out for any lapses in the compliance of the systems that you have set in your premises. It offers multiple advanced features such as Audio & Video Recording, Advanced Audio & Video Recording Player, Motion Detection with SMS Alerts & Call Alerts, Broadcast without Static IP, Operating the Software through Mobile from any corner of the World and many more. Its cost is low and very reasonable ...
  • Win Spy Software Pro is a Complete Stealth Monitoring Software that can both monitor your Local PC and Remote PC or any Android (cell Phone or Tablet) device. WinSpy Software will capture anything the user sees or types on the keyboard. Win-spy will also capture WebCam shots and record surrounding sounds. Now Works behind Firewalls and Routers. New: Powerful Anti Spy. v14 includes - Sim Card Undelete and Android (cell Phone or Tablet) monitoring
  • Typing monitoring tool which runs in the background, gathering typing statistics such as WPM or CPM. It monitors normal work, rather than explicitly requiring the user to type a testing text.
  • This is a network device status monitoring program. The functionality is based on periodic polling of devices and services with 40+ monitoring checks and protocol supported. It can check devices via the ICMP, TCP, SNMP, HTTP, WMI, ARP, DNS protocols and display results on the screen or notify you with SMS, email, screen message, or sound. Monitor SQL databases, files, folders, free space on disks, CPUs, VB and JS scripts, services, and processes.

Page 7 of 10
1 2 3 4 5 6 7 8 9 10

Legal disclaimer | Privacy policy

© 2004-2015 IT Shareware