Home | Submit a file  |  New  |  Categories  |  Our awards  |  Link to us  |  RSS Feeds

Display: short descriptions | full descriptions
  • Facebook Spy Monitor is a Facebook related activity monitoring and parental control software. It secretly records PC users' Facebook private profile, emails, chats & IMs, photos, interests, contatcts and events by taking screen snapshots periodically. It also records popular Facebook instant messenging clients and Facebook related web sites and searches. See exactly what users were doing just like watching a surveillance video playback.
  • Agent-Spy.com offers Computer and Internet Monitoring Solutions for Home, Small Business and Corporate Needs, Parental Control and Remote Based Administration. Agent Spy software includes several integrated recording modules that monitor: chat conversations, e-mails sent and received, Internet usage, keystroke logger, passwords, Facebook, Twitter, Google Plus+ etc. Agent Spy Software can be installed on remote computers! More: www.agent-spy.com
  • SpyKing PC Spy secretly logs all Facebook use, keystrokes, chats & IMs, emails, web sites, user names, passwords, web cam images, apps, microphone, clipboard and more. It supports Skype, Yahoo Messenger and others. It also takes screenshots like a surveillance camera. You can receive reports remotely via email or ftp as often as you wish. Open these reports on another PC or on your cell phone browser.
  • Keylogger Spy Monitor spy software can secretly record all keystrokes typed on your computer. It runs completely invisiblely. You can check logging reports by simply receiving emails or opening a web page. Perfect for catching cheaters, m onitoring employees, children or spouse, acquiring others' passwords and even investigating crimes. Use hotkey to unhide it from Stealth Mode and protect the program access by password.
  • COVERT Pro - an innovative solution to ensure total privacy while working at the computer. Protecting against spyware programs by masking action of computer user. Its essence is to create a secure platform in which any user can run their applications, while remaining invisible to the spies. COVERT Pro blocks reading the keyboard input and monitor screen and allows you to see all system drivers, active processes and system services.
  • Spytech SpyAgent is powerful spy software that allows you to monitor EVERYTHING users do on your computer - in total STEALTH. SpyAgent provides essential computer monitoring features, as well as website and application content filtering, chat client blocking, lockdown scheduling, and remote delivery of logs via email. SpyAgent's advanced, easy to use feature-set is unmatched, and provides the ultimate all-in-one computer monitoring solution.
  • Skype Spy Monitor secretly record Skype's incoming and outgoing chat messages. It runs completely invisibly so that Skype users won't know its existence. Skype Spy Monitor send log reports to your email or ftp periodically. You can also check logs directly on the monitored PC. It is a small but powerful program that consumes very little system resource. Perfect for monitoring employees, children or spouse, and even investigating crimes.
  • Looking for a backlink checker that brings you real value? Get SEO SpyGlass - your one-way ticket to Google's top! See where your top competitors have got their backlinks from, get prompted the SEO value of each linking site (learn its IP, age, PR, social media popularity, etc.), follow their footsteps and catapult your site to the top of the SERPs! (NEW: SEO SpyGlass now lets you compare multiple backlink profiles side-by-side).
  • Protector Plus 2015 (32-Bit) for Windows Desktop supports Windows 7, Windows XP, Vista, 2000, Me and 98, 95 platforms. This product provides 100% protection against viruses, trojans, worms, backdoors, spyware, adware, exploits, password stealers, hack tools, rootkits and other malware. Protector Plus 2015 (32-Bit) is packed with many useful features like email scanning, InstaUpdate, Submit Sample, Heuristic scanning, memory scanning, de-activation of viruses in memory, quarantine, user defined scan tasks, compressed files scanning and many more. The email scan feature scans all the emails received before they enter the Inbox and ensures that all the emails and attachments are virus free. On detecting an infected email the virus will be removed. The real-time scan feature will scan all the files accessed and automatically removes any virus found. The InstaUpdate feature of Protector Plus 2015 (32-Bit) will automatically download the virus database updates from the developer's web site free of cost. Su ...
  • Altova MissionKit 2015 Professional Edition is a software development suite of industrial-strength XML, SQL, and UML tools for information architects and application developers. Altova MissionKit includes Altova XMLSpy, MapForce, StyleVision, UModel, and other market-leading products for building today's real-world software solutions.
  • Spyrix Keylogger is a Powerful Invisible Software for remote monitoring of user activity:keystrokes logger, screenshots, passwords, facebook, Skype, web, chats, emails, IMs. Collected data can be viewed via remote secure web-account and also be automatically sent to email, dropbox, google drive, FTP, Local Network. Spyrix Keylogger is very easy to configure and use.
  • Altova MissionKit 2015 Enterprise Edition is a software development suite of industrial-strength XML, SQL, and UML tools for information architects and application developers. Altova MissionKit includes Altova XMLSpy, MapForce, StyleVision, UModel, and other market-leading products for building today's real-world software solutions.
  • Altova XMLSpy 2015 Professional Edition is the industry-leading XML development environment, providing intuitive views and powerful XML utilities to model, edit, transform, and debug XML-related technologies. Powered by RaptorXML, it offers the world's most popular XML editor and graphical XML Schema designer, file converters, debuggers, support for XSLT, XPath, XQuery, JSON, all major databases, Visual Studio or Eclipse integration, and more.
  • SpyShelter Free is a free version of SpyShelter Premium. It is an effective and easy-to-use security application that helps you to protect your system against known and unknown custom compiled malware such as keystroke loggers. SpyShelter constantly monitors all vulnerable areas in your operating system to ensure that your personal data is being protected from information-stealing malware. SpyShelter free is compatible with 32 bit systems only.
  • Altova XMLSpy 2015 Enterprise is the industry's best-selling XML development environment for modeling, editing, transforming and debugging XML technologies. Powered by RaptorXML, it offers the world's leading XML editor and graphical schema designer, code gen, converters, debuggers, profilers, database integration, chart creation, support for XSLT, XPath, XQuery, WSDL, SOAP, XBRL, JSON and Open XML (OOXML), plus Visual Studio and Eclipse plugins.
  • SpyShelter Premium is an effective and easy-to-use security application that helps you to protect your system against known and unknown custom compiled malware such as keystroke loggers. SpyShelter constantly monitors all vulnerable areas in your operating system to ensure that your personal data is being protected from information-stealing malware. Now with keystroke encryption!
  • The main summary of all data carriers connected to the computer (to FDD, HDD, FlashDrive, CD/DVD/Blu-Ray, network, virtual, RAM disks, etc.). Data of the fields "S/N" (in a DEC format) and "Label" can be used for a filtration of the processed disks in utilities of AutoKFD, FDFSpy, FDFRun, etc.
  • Automatic copying of the files chosen on a mask from the data carriers connected to the computer (fixed hard drives, etc.) in the chosen folder on a removable data carrier. In certain cases it can be used as means of automatic backup of data
  • SpyShelter Firewall is an effective and easy-to-use security application that helps you to protect your system against known and unknown custom compiled malware such as keystroke loggers. SpyShelter Firewall constantly monitors all vulnerable areas in your operating system to ensure that your personal data is being protected from information-stealing malware.
  • Automatic copyings of the files chosen on a mask from the removable data carriers connected to the computer (a flash disks, removable hard drives, etc.) in the chosen folder on a local disk. In certain cases it can be used as means of automatic backup of data
  • Spyrix Employee Monitoring - cloud-based platform for tracking your employee computer activities. Spyrix allows remote (via web account) control of employees activity in the Internet including chats, messengers , Skype, social networks Facebook, LinkedIn, Twitter, search engines Google, Yahoo, Bing, apps activity, include games. Spyrix will also make screenshots of active windows, snapshots and video from webcamera, records from microphone.
  • Detect and Remove Spyware, Adware and Remove Malware, Trojans, Dialers, Worms, KeyLoggers, HiJackers, Parasites, Rootkits, Rogue Security Products and many other types of threats. Light on System Resources and designed not to slow down your computer like many other anti-spyware products. Designed not to conflict with your existing anti-malware or anti-virus solution! Repair broken Internet Connections, Desktops, Registry Editing and more with our unique Repair System!
  • Antivirus, Anti-Malware and Firewall, all-in-one. Complete security suite to clean and protect your PC from all internet threats: viruses, spyware, trojans, bots, adware and worms. An intelligent firewall closes off and hides your system when using public networks. Your PC will be practically invisible. Includes IPv6 support.
  • Proactive anti-malware program to clean and protect your PC from all internet threats: viruses, spyware, trojans, bots, adware and worms. It uses a triple-layer prevention engine: Surf Protection, Real-time File Guard and Behavior Blocker. This triple-layer blocks access to fraudulent and dangerous websites , scans for malware in real-time and catches zero-day threats for the ultimate protection.
  • The free Svchost Process Analyzer examines all Svchost instances. This makes it easy to recognize processes that start up through Svchost and disguise their activities. This was the way the Conficker Worm, which infected millions of computers, operated. The genuine Svchost.exe is an important Windows system process and is located in the C:\Windows\System32 directory. The Svchost.exe processis often misused by spyware, Trojans or worms.

Page 2 of 10
1 2 3 4 5 6 7 8 9 10


Legal disclaimer | Privacy policy

© 2004-2015 IT Shareware