Screenlogger is smart and clever program recording PC-user activities, the main software function is screen-shots (snapshots) logging when You set time-periods to create sreenshots and delete them, the kind of Keylogger logging most actual things: logs clipboard, search engine queries, social networks, messengers: Skype, ICQ, AIM, etc., files, applications activities, visited web-sites, remembering logins and passwords, useful information security soft for parental or employees control monitoring purposes Screenlogger main characteristics: Logging each keystroke, Screenshots' logging by set periods, Screenlogger friendly software interface, Clipboard data logging, Logging of search engines' queries, sites, social networks, messengers, files, Screenlogger LogFile search system, Logs calendar, Logs archive searching, Screenshots logging by set periods, Snapshots auto-deletion setting, Screen-shots quick preview and auto-enlarge by 1 click in LogFile, Works in OS Windows XP, NT, 2000, 2003, ...
MultiscopeLite is a simple to use software based video calibration and monitoring tool perfect for the broadcast industry, engineering test, video system developers and post production facilities. The tool offers calibrated video measurement scopes such as a vectorscope, a waveform monitor, an RGB parade and histogram scopes in addition to a high resolution HD video monitor. The tool works with many consumer and professional video capture cards.
Sysax FTP Automation is a secure file transfer automation and synchronization program with support for FTP, SFTP and FTPS. Both simple and complicated file transfer sequences can be easily automated. It has many useful features such as transfer status monitoring, email notification, file (de)compression, OpenPGP Encryption and Decryption, task scheduling, FTP scripting, public key authentication, client side SSL certificates and detailed log files.
Sysax FTP Automation is much more than a direct drop-in replacement for the Windows console ftp program. The program has its own scheduler that runs as a native NT service. An integrated script development and debugging environment provides the ability to step through each line of any file transfer script. The program also has a script generation wizard that generates complete scripts that can be furthur fine tuned and debugged.
Many advanced features such as controlled synchronization between local and remote folders, PGP encryption and decryption, and file ...
Do you want to know how your employees are using their internet? Just try RecoveryFIX Employee Activity Monitor, a sophisticated tool for internet activity monitoring. The software is easy to install and requires no specific skill set to operate. With this tool, you can easily get details of website visited, and date and time of visiting. You also can have the screenshots and logs of all the activities.
SPYERA is an application that you install on a mobile phone. After installation, SPYERA secretly records events that happen on the phone and delivers this information to a web account, where you can view these reports 24x7 from any Internet enabled computer or mobile phone. SPYERA PHONE version also allows you to listen live calls, listen surroundings of the target mobile, and to know the location of the device.
Get free, real-time alerts if one of your IPs or domains is found in a hacker forum, a blacklist, or the AlienVault Open Threat Exchange (OTX) database, indicating a potential breach. The OTX database is the industry's only open and collaborative threat intelligence system, providing the most comprehensive IP reputation data available. Monitoring changes to your IPs and domains' reputation provides an early warning sign of a potential breach.
LogMeister is a powerful solution to centrally monitor and analyze virtually any log your systems and applications can generate including Event Logs, text logs and RSS. It will alert you to critical events throughout your network, facilitate central archiving of log data and assist with analysis and meeting audit requirements. As LogMeister is a centralized monitoring solution there is no need to install agents on monitored PC's and servers.
Sly Keylogger is the first free keylogging software which is able to monitor almost any activity on computer, when you are away. Just put it on computer, configure, and you will know what websites were visited and what applications were used. You will be able to read online conversations, and to see screen shots. Sly Keylogger is very powerful program for covert monitoring of user activities. Download it now, and you will find out the truth.
Any Employee Monitoring is designed for admin of enterprise to monitor and control all computers found in your company. It can be used to not only records computer activities, including screenshots, emails, IM chats, visited websites, programs launched, used files, print and traffic, but also control and restrain your computers activities. It is an easy to install and use program produced for no matter what size of teams.
Find any rogue laptops on your corporate network, and do something about it. Who Is On My Wifi will show you every computer on your network, notify you about the new computers. Is someone using my wireless? Are employee's plugging in home laptops on the corporate lan? Find out now with Who Is On My Wifi. It is an ideal internal security network monitoring system for your small to medium sized business.
Kernel Computer Activity monitor is the software to trust when it is important to track all computer activities of employees. It captures snapshot of the target computer screen at specific intervals. One can specify maximum size of snapshots and also if snapshot should be of the active window. Every key that is pressed by user gets recorded. Administrator can check what all keys were typed after analyzing the keystrokes.
Kernel Computer Activity Monitor records every internet activity ranging from browsers used, pages visited, visit time or user name. The tool enabled admin to look at the history of accessed application. Details such as name, launched time, executable path and launched by information are recorded about the application. The admin can save clipboard activities as well that can let you know everything that was copy-pasted including text and images.
Kernel Computer Activity Monitor reports every email activity that is accessed without using SSL connection. The reports include date and time ...
Page 7 of 10
1 2 3 4 5 6 7 8 9 10