Home | Submit a file  |  New  |  Categories  |  Our awards  |  Link to us  |  RSS Feeds

Display: short descriptions | full descriptions
  • Power Spy secretly logs Facebook, Skype, keystrokes, chats & IMs, emails, web visits, video talk, microphone, logins, passwords, applications, searches and more. It also takes screenshots like a surveillance camera. Lets you know exactly what they do on a computer screen while you are away. Automatically sends logs to your email or ftp. Starts monitoring with system startup. Perfect for parental control, monitoring employees or catching cheaters.
  • The Network Shared Recycle Bin allows you to backup and recover deleted. Once you have this tool in your system, it will automatically keep a track of all the network deleted files and you can easily recover them. Instead of removing the files, this tool sends them directly to its predefined recycle bin folder. Additionally it offers you the Protect Files tool which prevents deletion of network files for specified folders according the file mask.
  • Power Spy Keylogger secretly logs Facebook, keystrokes, chats, IMs, emails, websites visited, microphone, video talk, logins, passwords, applications, searches, documents and more. Logs Skype, Yahoo Messenger, ICQ, AIM, etc. Takes screenshots every x seconds like a spy cam. Sends logs to your email. You can check logs on a remote PC, tablet, smart phone, or directly on the monitored PC. Perfect for monitoring employees, kids and spouse.
  • VIP Team To Do List is a professional time and task management software for small and midsize business. It lets users create and manage team to-do lists, publish them on Web or send tasks to team members by email. It's an organizer, planner, notepad and reminder combined in one powerful application. Use our software to organize, prioritize and track tasks, manage projects, workflow and events, plan your team work for days, months and years ahead.
  • Inventoria Free Inventory Control Software is designed to be intuitive and easy to use. Create purchase orders and send emails directly to vendors. Use Inventoria to maintain a database of customers and suppliers. Use Inventoria to monitor and report on stock levels, averages, and costs. Scan in barcodes to easily add new items. Web access allows users in different locations to log in to Inventoria. Access Inventoria from your mobile device.
  • Freeware Keylogger is a completely free award winning monitoring application. It runs in the background and allows you to monitor all keyboard activities performed on your PC, visited websites, e-mail, chat, openned application and files. Freeware Keylogger helps you to find out, what exactly took place in the system. You will find out what your employee or children search in the internet, and to check them.
  • Power Spy secretly logs Facebook, Skype, keystrokes, chats & IMs, emails, web visits, video talk, microphone, logins, passwords, applications, searches and more. It also takes screenshots like a surveillance camera. Lets you know exactly what they do on a computer screen while you are away. Automatically sends log reports to your email or ftp. Starts monitoring with system startup. Runs silently and invisibly.
  • LAN messengers provide simple, secure network connection within your local network, enabling employees to chat, send files and collaborate easily and securely. RealPopup LAN messenger offers you a winpopup replacer that's simplicity itself to install and use. Your employees don't need to be connected to the Internet, so LAN chat becomes secure and distraction-free, and you can set up user groups to ensure messages reach only the right people.
  • Ultimate Keylogger is advanced all-round monitoring solution. It monitors all activities on computer systems including applications, keyboard, passwords, clipboard, chat, email, and visited websites. Ultimate Keylogger is completely undetectable. Process is hidden from task manager. Files are not visible. Ultimate Keylogger displays reports in web format or sends zip-compressed and encrypted activity reports invisibly via Email, FTP or LAN.
  • ABTO Software RTP Video SDK provides a powerful and highly customizable solution to quickly build application with ability to send/receive media (sound and video) by RTP protocol. You can make custom products such as solutions that provide support of conference rooms with our RTP Video SDK.
  • Power Spy Software secretly logs Facebook, keystrokes, chats, IMs, emails, websites visited, microphone, video talk, logins, passwords, applications, searches, documents and more. Logs Skype, Yahoo Messenger, ICQ, AIM, etc. Takes screenshots every x seconds like a spy cam. Sends logs to your email. You can check logs on a remote PC, tablet, smart phone, or directly on the monitored PC. Perfect for monitoring employees, kids and spouse.
  • All In One Keylogger implements the state-of-art technology, and guarantees you full control over your computer. Have you ever thought what site your children are surfing when you are not at home? Who the 'girlfriend' your wife is chatting with all the time really is? What your employees are doing when you are not at home? Now you can monitor chats,e-mails,keystrokes typed,desktop activities, microphone...It can even send you logs by email/FTP.
  • Skype Spy Monitor secretly record Skype's incoming and outgoing chat messages. It runs completely invisibly so that Skype users won't know its existence. Skype Spy Monitor send log reports to your email or ftp periodically. You can also check logs directly on the monitored PC. It is a small but powerful program that consumes very little system resource. Perfect for monitoring employees, children or spouse, and even investigating crimes.
  • Power Spy secretly logs Facebook use, keystrokes, chats, emails, web sites, web cam images, user names, passwords, applications excuted and more. It records IMs in Skype, Yahoo Messenger, ICQ and others. Power Spy runs silently with system startup and automatically sends log reports to your email or ftp. Easy to install and setup. It is widely used in offices, homes, schools, detective agencies and police department.
  • Power Spy Lite secretly logs Facebook, Skype, keystrokes, chats & IMs, emails, web visits, video talk, logins, passwords, applications, searches and more. It also takes screenshots like a surveillance camera. Lets you know exactly what they do on a computer screen while you are away. Automatically sends log reports to your email. Starts monitoring with system startup. Runs silently and invisibly.
  • Netwrix Password Expiration Notifier is the application that periodically checks users in specified Active Directory domains and sends report to the administrator's e-mail when one or more passwords are about to expire. Only those users whose passwords will be expiring in a specified number of days will be reported. The tool can also notify users whose passwords will expire soon by sending personal e-mails to account owners.
  • Power Spy (Supports x64/x86) secretly logs all Facebook, keystrokes, chats, emails, web visits, web cam images, user names, passwords, searches, microphone and more. It supports Windows Live Messenger, Skype, Yahoo Messenger, ICQ and other IMs. It sends log reports to your email or ftp. You can check logs on another PC or your cell phone. Perfect for catching cheaters, monitoring employees, children and spouse and even investigating crimes.
  • Netwrix Change Notifier for Windows Server is a free auditing tool to monitor server configurations and automatically document changes, including installed software and hardware, local security settings, and registry settings. The tool sends daily summary reports with all recent changes to your network servers.
  • The combined HomeWeb software and service allow you to send commands to your computers from over the internet. Run command-driven applications and query, convert, and retrieve files from your computers. Push files to your cloud storage account. Access multiple computers simultaneously. You can route requests from a web site directly to your computer and monitor the content of all web site requests - even chat with web site visitors in real-time.
  • SpyPal secrectly records Facebook, keystrokes, screenshots, websites visited, applications, Skype, Yahoo Messenger, clipboard, passwords, emails, documents, microphone and more. In Stealth Mode, it is completely invisible to monitored users. Use hotkey and password to access the program. Automatically sends logs to your email or ftp every x seconds. Perfect for monitoring employees, children, spouse and investigating crimes.
  • The Network Recycle Bin Tool allows you to recover deleted files. Once you have this tool in your system, it will automatically keep a track of all the network deleted files and you can easily recover them. Instead of removing the files, this tool sends them directly to its predefined recycle bin folder. Additionally it offers you the Protect Files tool which prevents deletion of network files for specified folders according the file mask.
  • Netwrix Change Notifier for VMware is a free tool for change management of your virtual infrastructure. The tool reports changes made to virtual machine settings. The tool sends a daily report, outlining all changes made to VMware host and virtual machine settings, including creation and deletion of virtual machines.
  • Netwrix Change Notifier for Group Policy is a free tool that audits and reports the changes made to Active Directory and delivers detailed information on a daily basis. The report lists changes on setting-level, including names, previous and new values.
  • Netwrix Change Notifier for Active Directory is a free tool that tracks changes made to Active Directory and generates audit reports on a daily basis. Receive emails detailing changes to Active Directory users, groups and group membership, computers, organizational units and permissions, GPOs, Exchange Server configurations and permissions.
  • Netwrix Change Notifier for Exchange is a free tool that audits and reports changes made to Exchange Server configurations, mailboxes, and permissions. The product sends daily summary reports detailing unwanted and authorized changes that can impact security, email delivery, and performance.

Page 1 of 10
1 2 3 4 5 6 7 8 9 10


Legal disclaimer | Privacy policy

© 2004-2014 IT Shareware