Home | Submit a file  |  New  |  Categories  |  Our awards  |  Link to us  |  RSS Feeds

Popular search phrases :: A :: activity
Advertising
Display: short descriptions | full descriptions
  • KeyLog Pro is an invisible easy-to-use surveillance tool that records every keystroke to a report file. KeyLogPro also monitors Internet activity by logging the addresses of visited homepages and can be used to Filter harmful and inappropriate content. It monitors time and title of the active application; even text in edit boxes is captured. Some features include: - Records everything typed, including emails, instant messages, chats, and website addresses into a report file - Monitor any programs used - Includes a Internet filter and Banned websites functionality - Simple to install - Password Protected and special Hot Key to invoke program - Excellent real-time backup device
  • Acala Screen Recorder - is a free video screen capture, screen recording tool used for recording screen activity into standard AVI video files and self-playback exe files. If you move the cursor, launch a new program, type some text, click a few buttons, or select some menus -- anything that you see on your screen - Acala Screen Recorder Free will be able to record all these and even the sound.
  • When you work with your PC, all activity information is stored in various files and in the Windows registry. All pictures you have seen on the Internet, all passwords and bank accounts you use and other detailed information can be easily extracted from your PC by any person with a minimal computer knowledge. This program lets you destroy all hidden needless activity information that may potentially contain evidence and endanger you needlessly
  • Cleaning up your harddisk can be a time-consuming activity, but Disk Recon makes this job a lot easier. Disk Recon allows you to investigate folder sizes, find duplicate files, examine your disk usage, monitor files and directories and more. New features include batch file renaming, batch attribute changing and file or image preview. With its intuitive interface you can easily find all the information you need to clean up your harddisk.
  • Mousotron Pro keeps track of the distance your mouse cursor moves and also the number of times you pressed the mouse buttons. On top of that it shows the number of keystrokes. If your boss says you don't work hard enough, this is the tool to prove him wrong. Mousotron is basically just fun, but it can also be a very handy tool in RSI prevention (Repetitive Strain Injury) or the rehabilitation of it. Now supports all major languages.
  • Sly Keylogger is the first free keylogging software which is able to monitor almost any activity on computer, when you are away. Just put it on computer, configure, and you will know what websites were visited and what applications were used. You will be able to read online conversations, and to see screen shots. Sly Keylogger is very powerful program for covert monitoring of user activities. Download it now, and you will find out the truth.
  • Free File Monitor is a small, yet reliable utility for users who want to constantly monitor the file access activity on their PC. The program will monitor which files have been changed, renamed, removed and created or a combination of one or more of these. This feature comes in handy when you monitor heavy data processing file/database servers and application's log files.
  • FAT/NTFS file recovery software is used to simply recover data from Windows OS, which are lost due to: various virus attacks, technical threats, accidental deletion, logical errors, Windows OS corruption, accidental formatting, bad sectors, improper shutdown of the system, and many more. Quick Recovery software for FAT/NTFS file recovery is an amazing software that delivers an absolute result of recovery. This Quick Recovery software is engineered and formulated with new technology and possesses rich features. Furthermore this program renders a user-friendly platform, which assists every user to execute the retrieval and restoration work very expeditiously. This application is purchased from the Cyberspace that is, the Internet, further must be uploaded to the system, and installed. After commencing the tool the user is required to select the property of recovery. Features: 1. Risk-free data recovery activity 2. Cost-effective tool 3. Deleted, damaged,missing, lost, corrupted, formatted, etc file ...
  • Kernel Computer Activity monitor is the software to trust when it is important to track all computer activities of employees. It captures snapshot of the target computer screen at specific intervals. One can specify maximum size of snapshots and also if snapshot should be of the active window. Every key that is pressed by user gets recorded. Administrator can check what all keys were typed after analyzing the keystrokes. Kernel Computer Activity Monitor records every internet activity ranging from browsers used, pages visited, visit time or user name. The tool enabled admin to look at the history of accessed application. Details such as name, launched time, executable path and launched by information are recorded about the application. The admin can save clipboard activities as well that can let you know everything that was copy-pasted including text and images. Kernel Computer Activity Monitor reports every email activity that is accessed without using SSL connection. The reports include date and time ...
  • A useful, effective and reliable application that monitors computer usage, user activity, programs or websites Terminal Camera is a comprehensive and practical software utility that provides you with a simple means of monitoring computer usage and user activity. With the help of Terminal Camera you have the possibility to track each opened application, playback all user activity within each section. It also provides you with an embedded video player so you can preview the selected action. Terminal Camera also can used for Terminal Services, RDP, RemoteApp, Citrix, XenApp etc.
  • If present market is to be considered, most of the companies make use of finished rates especially from the Government Standard Schedule of Rates (SSR) without calculating volume of resources involved. This unfortunately gives little scope to manage resources without analysis. Even if someone tries to work it out, that may take not less than weeks and months. Seemingly this is a cumbersome activity eating away hundreds of man-hours. At the same time, this cuts short working span of Engineers making it difficult to estimate direct/indirect cost of a project. AEC Budget as innovative budgeting tool that helps to estimate the resources under project execution, making it to plan by extending tight integration to MS Project. The tool helps in managing critical and accurate inputs like resources and utilization of the same with optimum usage, with optimization. AEC Budget is fully integrated with AEC-ERP as core part of major production and planning system enabling the enterprise performing the project to have ...
  • Nsasoft Network Traffic Emulator generates IP/ICMP/TCP/UDP traffic from clients to server to stress test servers, routers and firewalls under heavy network load. It is a very simple and fast program which can simulate client activity. The tool is designed with a user-friendly interface and is easy to use.
  • 1 Free Keylogger offers full invisible remote control of user activity on PC: keystroke logger, makes screenshots, web camera snapshots, website visits, online searches, social networks - Facebook, myspace, google+, vkontakte, capture login/password for web sites, apps activity, IM/chat etc. 1 Free Keylogger allows remote monitoring in three ways: sending logs via email or FTP and online logs view via secure web account on 1freekeylogger.com.
  • Trojan Killer identifies and resolves both known and unknown threats (trojans, spyware, malware and annoying adware). Samples of malware include various types of adware (displays unwanted advertising); spyware (may keep and send logs of your keyboard and mouse activity, such as credit card or personal identity information); hidden dialers (may initiate unsolicited phone call which then shows on your bill), and more.
  • HTTP traffic generator allows to generate a good amount of http traffic for testing web applications, web servers, intrusion detection system and their resistance to HTTP attacks. You can specify the requests count and interval between two requests. The generated requests are sent to the specified URL. It is a very simple and fast program which can simulate client activity.
  • Find the correct stickers to complete action scenes in this sixth set of Sticker Activity Pages. With dozens of pages and hundreds of missing stickers to find, kids will have hours of fun while improving their matching skills. Included are hundreds of ABC superhero stickers such as Bold Bertha, Captain Chill and ABC supervillians such as Archrogue, Battlebyte, Chaos Conspirator, and many more. Published by Dataware.
  • Create pirate scenes using the stickers and backgrounds from this fifth Sticker Book. There are dozens of scenic backgrounds including beaches and ships to use with the hundreds of pirate and soldier stickers. Since the stickers are electronic, not paper, kids can use them over and over again within different scenes. Published by Dataware.
  • Find the correct stickers to complete fairy tale scenes in this fourth set of Sticker Activity Pages. With dozens of pages and hundreds of missing stickers to find, kids will have hours of fun while improving their matching skills. Fairy tales include Beauty and the Beast, The Bremen Town Musicians, Cinderella, and many more. Published by Dataware.
  • Go through Animal Town and find the correct animal stickers to complete scenes in this third set of Sticker Activity Pages. With dozens of pages and hundreds of missing stickers to find, kids will have hours of fun while improving their matching skills. Published by Dataware.
  • Ultimate Keylogger is advanced all-round monitoring solution. It monitors all activities on computer systems including applications, keyboard, passwords, clipboard, chat, email, and visited websites. Ultimate Keylogger is completely undetectable. Process is hidden from task manager. Files are not visible. Ultimate Keylogger displays reports in web format or sends zip-compressed and encrypted activity reports invisibly via Email, FTP or LAN.
  • Make any video interactive (clickable)! Advertise and sell right from the video. Tag objects, add links, pop-ups, pictures, and Facebook likes directly into the video.. These features encourage purchases and comments, provide relevant information and make the video content dynamic and relevant.
  • iClone5 is real-time 3D animation for digital actors, environments & visual effects with drag & drop editing, powerful physics and Microsoft Kinect-ready motion capture designed for creativity in broadcast production, education & previzualization. Discover smart interactivity between actors and props that make animation fun and logical.
  • Any Parental Control Software can help you to keep track of what your child is doing online. With its help, parents are able to see everything typed onto the keyboard, including but not limited to emails, instant messages, social networking activity, chat, etc., capture screenshots taken at certain intervals, set time limits for kids' Internet use, and block websites and applications.
  • Smart Diary Suite is more than a simple Diary or a Personal Information Manager (PIM). You can plot your exercise program against your diary of health notes and see how they interact. Add information about changes in your diet and see how these changes have affected your health and activity levels. In addition to using informative graphs to show you how your choices affect your life, SDS has all of the functions that you would expect in a PIM.
  • Raking is no longer a chore, but a fun strategy game activity with Fall Mahjong's all new game, Rake Mahjong! Teach your kids a new fun association with the word rake and you'll have them raking all season long! Well, we won't guarantee that, but we will guarantee fun and excitement while playing this mahjong solitaire game only from Fall Mahjong.com! Mahjong is an exciting strategic matching game. Match the open mahjong tiles in couples
Advertising

Page 5 of 10
1 2 3 4 5 6 7 8 9 10


Legal disclaimer | Privacy policy

© 2004-2018 IT Shareware