Home | Submit a file  |  New  |  Categories  |  Our awards  |  Link to us  |  RSS Feeds

Popular search phrases :: A :: activity
Advertising
Display: short descriptions | full descriptions
  • NETGATE Registry Cleaner cleans and defragment your registry, speed-up your PC, removes unneeded files on disks, removes activity traces. It includes Startup manager to manage programs started at Windows startup and Uninstall manager for handy applications uninstall. Supports scheduling of scans and backup option for better security.
  • Being a keystroke logger, Keylogger Free records all keys pressed on the keyboard. You'll be able to see each word typed in documents, emails, chat room activity, instant messages, website addresses, search engine searches and more. In a word, this powerful and invisible PC keylogger recorder software helps record virtually every action that occurs on the computer so you know what application was used, what was typed, and who typed it.
  • RecoveryFix Employee Activity Monitor is an invisible software tool that is highly useful for business managers, organizations and home users with which you can easily monitor the activities of employees, children and spouse. Employee Monitor Software helps the network administrators to review and monitor the activities of the employees around a network in real time. Using this tool, you can view the live desktop activities of a network. It also enables you to keep a close look on the employees activities by recording all the events occurred in the PCs. It records all the activities including the system processes, keystrokes, opening/closing of windows, FTP activities, website visits, internet activities, downloading etc., creating desktop screenshots and chat logs. Using this tool; you can monitor several PCs of your organization from a remote place also. This eminent Employee Monitor Software also facilitates the users to create offline logs of the monitored computer activities to view them later. Th ...
  • Free Folder Monitor is free file monitor software to record the system changes in real-time, investigating exactly what files/folders have been altered, created or removed. It also lets you specify what types of changes to monitor and what kinds of notifications to display instantly when the change occurs without losing data. In addition, Free Folder Monitor is easy for system debugging and trouble shooting, file activity audit and log.
  • With this program you will easily capture your screen activity and save it as video or audio. Just select the area that you wish to capture and click Record. You will capture your entire screen, a particular window or custom area on your screen. Ideal for video instructions, streaming videos, presentations, and video chat sessions. You will also add narration, record sound from your speakers, microphone and Line In. Runs on all Windows systems.
  • The all-in-one spy program which intercepts everything that is typed on keyboard, monitors visited websites, scans Windows clipboard for changes, makes screenshots every few minutes. It can also monitor both sides of IM chats and activity in social networks. And this program is absolutely invisible for everyone except you. You just have to press a speical hotkey, and enter your password to show the keylogger. You can easily read spy reports.
  • Extra Folder Icons is a 45-piece set of high-resolution, top-quality Windows 7 folder icons. Each icon in the set represents a particular activity, category or type of object that the user can associate with the contents of the folder. The set is intended for Windows users looking for additional folder decoration options. Each icon contains a folder image and a main visual defining the folder type.
  • PC Spy Software logs all Facebook, PC & internet activity and emails log reports to you. PC Spy Software logs all keystrokes, chats & IMs, emails, websites visited, applications, usernames, passwords, documents opened, online searches, microphone sound and more. It takes screenshots like a spy cam. PC Spy Software runs invisibly and PC users won't know its existence. Great for monitoring employees, children, spouse and investigating crimes.
  • Food Exchange Diet Planner is a tool to be used by food professionals and knowledgeable individuals to create and test diet plans based on the food exchange scheme. The program is very easy to use and, additionally, it contains a calorie calculator which can be used to compute your daily energy needs based on sex, weight, height and physical activity level.
  • Kid Key Logger Pro is a powerful, fully featured, keylogger, specifically designed for parents to record their children activity, while they let them play on their computers. Kid Key Logger Pro can log keystrokes, mouse and windows events ans also capture screenshots of your desktop. Log files can be written to disk, emailed or uploaded on a server. The key logger can be remote-controlled from another PC or from an Android device.
  • In the modern work place, managers effectively use network pc monitoring to ensure employee productivity and to keep an eye on undesirable system activities. Kernel Computer Activity Monitor is an advanced tool designed for this purpose. It is invisible to the PC users, as it does not appear in the Task Manager, Process List, Desktop, and Add/Remove Programs. It is a useful tool for organizations as well as individuals - investigators can use it to spy system happenings, and parents can use it to monitor the activities of children. It invisibly takes screenshots, records key strokes, monitors internet and email activities, gives information about Application accesses, saves clipboard activities, tracks passwords and notifies of print activities. Using this tool is an easy thing because of its user-friendly interface. You can configure this application to monitor and record the activities, so that your physical presence is not necessary at the time of monitoring. In addition, there is an option to receive reco ...
  • The ActivityZilla simplifies user activity monitoring - now you can monitor all your kid's PC activity directly from your web browser! Do you want to see what your kids are doing on the computer when you are away? Now this is possible by just using your web browser on a PC or a smartphone. Internet can be a dangerous place for your kids. It is your responsibility to monitor what your kids are doing on a PC.
  • TaskJob Manager for Windows: simple database management software that helps you to enter, organize, and manage any kind of small tasks, activities, project jobs. Databases included: Personnel: maintain and organize personnel. Tasks: catalog, manage, and track all tasks. Task Costs: enter and track all costs and expenses. Activity Log: track all task activities.
  • Total Privacy Provides the Most Advanced Information Removal Solution for Protection Against Today's Malicious Online and Offline Threats. Total Privacy is a safe and easy-to-use Windows privacy protection tool that securely cleans Internet tracks, system activities and program history information stored on your computer. Supports all major browsers in addition to over 450 popular third-party applications.
  • The product contains: a proxy server that provides caching and blocks unwanted resources; a secure firewall to protect against network attacks; a billing system; system for the dynamic control of speed and sessions; blocking of excessive network activity; diversion and routing of traffic; mail gateway; integration with Active Directory; secure authorisation; web server statistics; remote access; reports.
  • iMyth Security Systems is a tool designed to help you deal with a large number of threats and intrusion issues that can target drives and devices connected via USB. It provides general protection in the form of system and USB shields, allows you to immunize your devices as well as completely block USB ports. A well structured interface iMyth Security Systems displays a user-friendly interface which is separated according to the main functions it provides. You get quick access to protection features, system tools, USB configuration, device immunization and scanning, drive monitoring and even activity logs. The application is well structured and should pose no problem to anyone when it comes to using and configuring. Lock USB ports and encrypt files Since malware takes all shapes and can be transported to your computer using a large number of containers, iMyth Security Systems allows you to avoid any risks and completely block the use of a USB port. It allows you to disable any kind of commu ...
  • Lepide Event Log Manager is a sophisticated tool that empowers the user to avail the information about a site which includes accessed files, activity status, traversed paths, referring pages, search engines, browser related information, etc. The software archives the event logs of the entire network in a central repository which makes it extremely simple and easy to maintain them. Also, it generates timely notifications and alerts to inform the administrator whenever any critical event related to event logs takes place. Using this efficacious utility, event browsing for all the systems within the entire network can be simplified. Moreover, it facilitates you to view the specific or all windows and W3C event logs from a centralized platform. Also, it provides compliance reports for HIPAA, PCI, SOX, FISMA and GLBA and thus sustains compliance and also help in avoiding the legal hassles. The software has two editions- A Freeware edition and Enterprise edition. The users can choose any one as per their need and u ...
  • Try DBF Recovery Toolbox and retrieve the data from corrupted databases of DBF format that were damaged for any reason. This application recovers the data from damaged documents and converts the contents of corrupted databases into clean files of DBF format. It is much easier than any other database processing activity, it looks like the decompression of zipped documents, follow the guidelines it is all you may do.
  • A tool to optimize your online activity (and not only) and ensure a safe and reliable Windows experience is pretty much requisite. Cerberus Security Guard is a program devoted to security challenges whose purpose is to keep your computer safe from attacks of Trojan horses, keyloggers, multiple interceptors, and other kinds of system hacks, including various types of spyware.
  • After user-login many applications start automatically and often invisible for the user. These programs can such monitor the computer activity, check for updates or run periodic tasks. The software abylon APP-BLOCKER shows all applications clearly in a table, like the entries in the startup menu, in the registry, all running services and processes. One click is enough to permanently disable them or remove completely.
  • Do you want to know how your employees are using their internet? Just try RecoveryFIX Employee Activity Monitor, a sophisticated tool for internet activity monitoring. The software is easy to install and requires no specific skill set to operate. With this tool, you can easily get details of website visited, and date and time of visiting. You also can have the screenshots and logs of all the activities.
  • KeyLog Pro is an invisible easy-to-use surveillance tool that records every keystroke to a report file. KeyLogPro also monitors Internet activity by logging the addresses of visited homepages and can be used to Filter harmful and inappropriate content. It monitors time and title of the active application; even text in edit boxes is captured. Some features include: - Records everything typed, including emails, instant messages, chats, and website addresses into a report file - Monitor any programs used - Includes a Internet filter and Banned websites functionality - Simple to install - Password Protected and special Hot Key to invoke program - Excellent real-time backup device
  • Acala Screen Recorder - is a free video screen capture, screen recording tool used for recording screen activity into standard AVI video files and self-playback exe files. If you move the cursor, launch a new program, type some text, click a few buttons, or select some menus -- anything that you see on your screen - Acala Screen Recorder Free will be able to record all these and even the sound.
  • When you work with your PC, all activity information is stored in various files and in the Windows registry. All pictures you have seen on the Internet, all passwords and bank accounts you use and other detailed information can be easily extracted from your PC by any person with a minimal computer knowledge. This program lets you destroy all hidden needless activity information that may potentially contain evidence and endanger you needlessly
  • Cleaning up your harddisk can be a time-consuming activity, but Disk Recon makes this job a lot easier. Disk Recon allows you to investigate folder sizes, find duplicate files, examine your disk usage, monitor files and directories and more. New features include batch file renaming, batch attribute changing and file or image preview. With its intuitive interface you can easily find all the information you need to clean up your harddisk.
Advertising

Page 4 of 10
1 2 3 4 5 6 7 8 9 10


Legal disclaimer | Privacy policy

© 2004-2019 IT Shareware