Home | Submit a file  |  New  |  Categories  |  Our awards  |  Link to us  |  RSS Feeds

Advertising
Display: short descriptions | full descriptions
  • In the modern work place, managers effectively use network pc monitoring to ensure employee productivity and to keep an eye on undesirable system activities. Kernel Computer Activity Monitor is an advanced tool designed for this purpose. It is invisible to the PC users, as it does not appear in the Task Manager, Process List, Desktop, and Add/Remove Programs. It is a useful tool for organizations as well as individuals - investigators can use it to spy system happenings, and parents can use it to monitor the activities of children. It invisibly takes screenshots, records key strokes, monitors internet and email activities, gives information about Application accesses, saves clipboard activities, tracks passwords and notifies of print activities. Using this tool is an easy thing because of its user-friendly interface. You can configure this application to monitor and record the activities, so that your physical presence is not necessary at the time of monitoring. In addition, there is an option to receive reco ...
  • SpyPal Free Keylogger secrectly records Facebook, keystrokes, screenshots, websites visited, applications, clipboard, passwords, emails, documents and more. In Invisible Mode, it is completely hidden to monitored users. Use hotkey and password to access the program. Automatically sends logs to your email every x seconds. Perfect for monitoring employees and parental control.
  • iMyth Security Systems is a tool designed to help you deal with a large number of threats and intrusion issues that can target drives and devices connected via USB. It provides general protection in the form of system and USB shields, allows you to immunize your devices as well as completely block USB ports. A well structured interface iMyth Security Systems displays a user-friendly interface which is separated according to the main functions it provides. You get quick access to protection features, system tools, USB configuration, device immunization and scanning, drive monitoring and even activity logs. The application is well structured and should pose no problem to anyone when it comes to using and configuring. Lock USB ports and encrypt files Since malware takes all shapes and can be transported to your computer using a large number of containers, iMyth Security Systems allows you to avoid any risks and completely block the use of a USB port. It allows you to disable any kind of commu ...
  • PC Monitoring Keylogger secretly logs Facebook, keystrokes, chats, IMs, emails, websites visited, microphone, video talk, logins, passwords, applications, searches, documents and more. Logs Skype, Yahoo Messenger, MSN, ICQ, AIM, etc. Takes screenshots every x seconds like a spy cam. Sends logs to your email. You can check logs on a remote PC, tablet, smart phone, or directly on the monitored PC. Perfect for monitoring employees, kids and spouse.
  • Invisible Spy Keylogger secretly logs Facebook, keystrokes, chats, IMs, emails, websites visited, microphone, video talk, logins, passwords, applications, searches, documents and more. Logs Skype, Yahoo Messenger, MSN, ICQ, AIM, etc. Takes screenshots every x seconds like a spy cam. Sends logs to your email. You can check logs on a remote PC, tablet, smart phone, or directly on the monitored PC. Perfect for monitoring employees, kids and spouse.
  • Remote Spy Keylogger secretly logs Facebook, keystrokes, chats, IMs, emails, websites visited, microphone, video talk, logins, passwords, applications, searches, documents and more. Logs Skype, Yahoo Messenger, MSN, ICQ, AIM, etc. Takes screenshots every x seconds like a spy cam. Sends logs to your email. You can check logs on a remote PC, tablet, smart phone, or directly on the monitored PC. Perfect for monitoring employees, kids and spouse.
  • Home PC Keylogger secretly logs Facebook, keystrokes, chats, IMs, emails, websites visited, microphone, video talk, logins, passwords, applications, searches, documents and more. Logs Skype, Yahoo Messenger, MSN, ICQ, AIM, etc. Takes screenshots every x seconds like a spy cam. Sends logs to your email. You can check logs on a remote PC, tablet, smart phone, or directly on the monitored PC. Perfect for monitoring employees, kids and spouse.
  • BAS trend logs can be collected and prepared for input to available trend analysis tools in minutes instead of hours. The saved overhead flows straight to the bottom line and/or contributes to more competitive contract bids. Exported trend matrices are free of the errors inherent in the process of manually building spreadsheets from raw trending data. Any analysis based on a matrix created with Trend Importer can be relied upon to be accurate.
  • Lepide Event Log Manager is a sophisticated tool that empowers the user to avail the information about a site which includes accessed files, activity status, traversed paths, referring pages, search engines, browser related information, etc. The software archives the event logs of the entire network in a central repository which makes it extremely simple and easy to maintain them. Also, it generates timely notifications and alerts to inform the administrator whenever any critical event related to event logs takes place. Using this efficacious utility, event browsing for all the systems within the entire network can be simplified. Moreover, it facilitates you to view the specific or all windows and W3C event logs from a centralized platform. Also, it provides compliance reports for HIPAA, PCI, SOX, FISMA and GLBA and thus sustains compliance and also help in avoiding the legal hassles. The software has two editions- A Freeware edition and Enterprise edition. The users can choose any one as per their need and u ...
  • Screenlogger is smart and clever program recording PC-user activities, the main software function is screen-shots (snapshots) logging when You set time-periods to create sreenshots and delete them, the kind of Keylogger logging most actual things: logs clipboard, search engine queries, social networks, messengers: Skype, ICQ, AIM, etc., files, applications activities, visited web-sites, remembering logins and passwords, useful information security soft for parental or employees control monitoring purposes Screenlogger main characteristics: Logging each keystroke, Screenshots' logging by set periods, Screenlogger friendly software interface, Clipboard data logging, Logging of search engines' queries, sites, social networks, messengers, files, Screenlogger LogFile search system, Logs calendar, Logs archive searching, Screenshots logging by set periods, Snapshots auto-deletion setting, Screen-shots quick preview and auto-enlarge by 1 click in LogFile, Works in OS Windows XP, NT, 2000, 2003, ...
  • RiverGate Rss Reader is a FREE news aggregator or feed reader that uses web feed to retrieve syndicated web content such as weblogs, podcasts, vlogs, and mainstream media websites, or in the case of a search aggregator, a customized set of search results. To make it as easy as possible for anyone willing to use such a program RiverGate Rss Reader has a very simple, clean interface without any redundant buttons just for the visual sake.
  • DocFlex/XSD is a toolkit to generate high quality XML schema documentation in HTML, RTF and TXT (plain text) formats with a possibility of automatic inserting of XSD diagrams produced by XMLSpy or Oxygen XML (with the full support of diagram hyperlinks). The entire doc-generator is implemented in the form of special "XSDDoc" templates interpreted by a Template Processor with interchangeable output generators. The templates are edited using a graphic Template Designer with WYSIWYG capabilities, which allows you to customize the generated output as much as you want. Using TXT output, you can also generate documentation in other formats (e.g. DITA) by specify in templates all necessary markup (tags, control words etc). This includes even inserting diagrams and image maps to them. FEATURES - Clear-cut highly navigable HTML documentation: Javadoc-like frameset structure, dense layouts (more information in less space), abundance of cross-links. - The same documentation in RTF format ...
  • Minimal countdown timer to control work flow. I realize that I work more productive if I make breaks each 45 minutes. Here is my implementation of promodo like timer for Windows. If you need to have brakes in other periods, please use program settings and modify timer period.Now application is very simple it shows a message and logs time when timer starts/stops/finishes.
  • Autoplay Menu Designer is a powerful development tool to create dynamic and interactive Windows-based autorun applications or Web applications that are built on Microsoft Silverlight. It is the easiest way to create a professional autorun interface and generate autorun files for CD/DVDs from simple CDs for your friends to intricate business presentations and other multimedia products like software CDs, CD catalogs, CD presentations, etc.
  • "Win" means for MS Windows, "Cln" is the short form of cleanup. WinCln .NET program is used to cleanup the useless files in a PC. It aims to protect your privacy by removing the sensitive data like system logs, visited website, e-mail content and more. Clean up fast : No install is needed, no time is wasted on file searching. Free of charge no advertising, no splash screen. Easy to use : User friendly interface, most functions can be accessed with 2 keystrokes or 3 mouse clicks. Easy to learn : Shortcut keys are identical with MS Windows. Web Update utility is included that allows you to quickly find software updates. Standard mode: Dump files: logs for system event, setup log, etc You can select the dump files that you like to delete. Choose the items and confirm with the permanently erase or move to recycle bin button. It will prompt you to switch to another mode or not when finished cleanup or no item found. For company, beware of removing critical syste ...
  • Do you want to know how your employees are using their internet? Just try RecoveryFIX Employee Activity Monitor, a sophisticated tool for internet activity monitoring. The software is easy to install and requires no specific skill set to operate. With this tool, you can easily get details of website visited, and date and time of visiting. You also can have the screenshots and logs of all the activities.
  • Video Avatar is a tool for creating animated GIF avatars. You can choose the video movie and its part and then crop it for your avatar or userpic. By using Video Avatar you can create original video avatars for your blogs, journals, you can also set userpic in your profile page for any forums, communities, your website. Download free version and you will see the results!
  • Access Lock is a system-tray security utility, which enables you to lock your PC with a password by two methods. The first one hides your desktop and shows a screen saver while the second one does not hide it allowing others to watch what happens there. It also prevents unauthorized access on boot, logs the attemps of breaking the lock and allows people around to leave messages while the system is locked.
  • LogMeister is a powerful solution to centrally monitor and analyze virtually any log your systems and applications can generate including Event Logs, text logs and RSS. It will alert you to critical events throughout your network, facilitate central archiving of log data and assist with analysis and meeting audit requirements. As LogMeister is a centralized monitoring solution there is no need to install agents on monitored PC's and servers.
  • EBooksWriter GOLD is the leading professional tool for ebook authors. A comprehensive all-in-one ebook software, not just a compiler. With a single integrated tool you create, edit, protect (passwords, forbid print and copy, expiry...) pack a compact self install EXE e-book, and also EPUB MOBI OPF with ease. Can ask user data and email for your ML; shopping cart so not just ebooks but also ecatalogs. No HTML or "programming", 6000+ features...
  • Advanced News Reader: Gather all your favorite newspapers, blogs and magazines and read them at one page
  • Kernel Computer Activity monitor is the software to trust when it is important to track all computer activities of employees. It captures snapshot of the target computer screen at specific intervals. One can specify maximum size of snapshots and also if snapshot should be of the active window. Every key that is pressed by user gets recorded. Administrator can check what all keys were typed after analyzing the keystrokes. Kernel Computer Activity Monitor records every internet activity ranging from browsers used, pages visited, visit time or user name. The tool enabled admin to look at the history of accessed application. Details such as name, launched time, executable path and launched by information are recorded about the application. The admin can save clipboard activities as well that can let you know everything that was copy-pasted including text and images. Kernel Computer Activity Monitor reports every email activity that is accessed without using SSL connection. The reports include date and time ...
  • SmartLogAnalyzer is a simple program to parse default access.log file written by the Apache Web-server, convert to XML document and analyze the output XML file. This is web statistics program for your web logs - display useful statistics about your website. The tool is designed with a user-friendly interface and is easy to use.
  • 1 Free Keylogger offers full invisible remote control of user activity on PC: keystroke logger, makes screenshots, web camera snapshots, website visits, online searches, social networks - Facebook, myspace, google+, vkontakte, capture login/password for web sites, apps activity, IM/chat etc. 1 Free Keylogger allows remote monitoring in three ways: sending logs via email or FTP and online logs view via secure web account on 1freekeylogger.com.
  • Trojan Killer identifies and resolves both known and unknown threats (trojans, spyware, malware and annoying adware). Samples of malware include various types of adware (displays unwanted advertising); spyware (may keep and send logs of your keyboard and mouse activity, such as credit card or personal identity information); hidden dialers (may initiate unsolicited phone call which then shows on your bill), and more.
Advertising

Page 7 of 10
1 2 3 4 5 6 7 8 9 10


Legal disclaimer | Privacy policy

© 2004-2019 IT Shareware