Invisible Monitoring Spy secretly logs Facebook, keystrokes, chats, IMs, emails, websites visited, microphone, video talk, logins, passwords, applications, searches, documents and more. Logs Skype, Yahoo Messenger, ICQ, AIM, etc. Takes screenshots every x seconds like a spy cam. Sends logs to your email. You can check logs on a remote PC, tablet, smart phone, or directly on the monitored PC. Perfect for monitoring employees, kids and spouse.
SpyPal secrectly records Facebook, keystrokes, screenshots, websites visited, applications, Skype, Yahoo Messenger, clipboard, passwords, emails, documents, microphone and more. In Stealth Mode, it is completely invisible to monitored users. Use hotkey and password to access the program. Automatically sends logs to your email or ftp every x seconds. Perfect for monitoring employees, children, spouse and investigating crimes.
CTG Network Manager - IT Network Management and monitoring Software that provides any IT Department with the ability to track all aspects of an IT assets life cycle from purchase, to deployment, inventory, software management, status monitoring, incident resolution, and record keeping, through to its retirement. Windows based Software designed for IT asset and configuration management. Also includes CTG Network Map and CTG Network Scanner
Have you got any doubts or concerns about productivity of your employees? Do you need to check on productivity of certain people in your company? Are you looking for a way of exposing exports of confidential data and information from your web?
Spytector is the ultimate invisible and undetectable keylogger (keystroke logger) that completely meets your PC monitoring and surveillance requirements. Spytector keylogger is running in total stealth, undetectable even for advanced users, perfect for monitoring the way your PC is used. Spytector is tracking all the activities of PC users (visited websites, all the keystrokes, both sides of chat conversations, opened windows etc.) and delivers the logs to you via Email or/and FTP. In the delivered logs are also included the local stored passwords (for FireFox, Opera, Google Chrome, Internet Explorer, Safari, Outlook, Google Talk, Windows Live Messenger etc.) and URL history (visited websites).
Spytector is completely invisible on the user's desktop and cannot be seen in the task manager, it's injected into system processes on the startup and the logs are hiddenly sent through the default browser or email client (to bypass the firewalls). The keylogger is using advanced hooking and steal ...
All-In-One Spy Keylogger secretly logs Facebook, keystrokes, chats, IMs, emails, websites visited, microphone, video talk, logins, passwords, applications, searches, documents and more. Logs Skype, Yahoo Messenger, etc. Takes screenshots every x seconds like a spy cam. Sends logs to your email. You can check logs on a remote PC, tablet, smart phone, or directly on the monitored PC. Perfect for monitoring employees, kids and spouse.
Aobo Keylogger for Mac Standard, the invisible keylogger for Mac OS X with multiple-user support, has the ability to monitor all the activities on the targeted Mac, including keystrokes typed, IM chatting conversations entered, comments posted on social media, websites visited and so on.
Aobo Keylogger for Mac Standard secretly sends log reports to your Email box in interval for remote log viewing. Timely uploading logs to FTP space are also available in Aobo Keylogger for Mac Standard.
Below are the features of Aobo Keylogger for Mac Standard:
Stealth monitoring- All the monitoring behaviors are undergo silently and secretly
IM message monitoring - All the chat conversations on Skype/MSN/AIM/Adium/iChat are recorded
Social networking monitoring - It logs all the posts and comments composed on the Mac and sent to social networks like Facebook/Twitter
Websites monitoring - Aobo Keylogger for Mac keeps track of every URL of websites visited in Safari, Firefox and Chrome
Screenshots capturing - It ...
Turn your PC into a video surveillance system that monitors your home/office from a remote location. Detect motion and trigger alerts like sounding an alarm, recording audio and video, taking photos, broadcasting video, and sending email notifications. Configure WebCam Monitor in minutes using any USB camera. Video broadcasts can be viewed from any PC. The scheduler turns monitoring on and off to fit your schedule.
Axence nVision gives you everything you need to manage your network in an efficient and effective manner. The application consists of 5 modules (centrally managed): proactive network monitoring and visualization; hardware and software inventory (license audit); intelligent user monitoring (blocking websites); data leak protection (port blocking), helpdesk (remote access, trouble ticket database, chat) - all with a wide range of alerts & reports.
iKeyMonitor Android Spy is a key logger for Android cell phones that logs keystrokes, passwords, SMS, WhatsApp messages, calls, websites, GPS locations, captures screenshots and send all the logs to appointed email box. iKeyMonitor Android Spy can be a helper for Android users, like parents and employers, who want to monitor what has been done on Android cell phones - even if the activity logs are erased. Users can download iKeyMonitor Android Spy Free Version here and start monitoring right away.
Key Features of iKeyMonitor Android Spy
- Work in stealth
- Record typed keystrokes and passwords in US keyboard.
- Log all incoming and outgoing SMS and WhatsApp/Skype/Viber/Kik messages
- Log call history with the contacts, date and times and durations
- Track the websites visited in Chrome and Stock web browsers
- Track GPS locations
- Take screenshots at the time interval set by users
- Send log reports to user-defined email address
- Remotely turn on/off the monitoring status
Amac Keylogger for Mac OS X secretly records typed keystrokes, passwords(pro edition), visited websites in Safari/Firefox/Chrome, IM chat conversations from Skype/AIM/iChat/Adium/MSN, desktop screenshots. Amac Keylogger for Mac automatically sends logs to you by Email/FTP.
Main functions of the Amac Keylogger for Mac OS X:
- Automatically run when the Mac starts up
- Monitor all user accounts with a click
- Log all typed keystrokes includes account name
- Log chats of both sides from Skype/AIM/iChat/Adium/MSN
- Record websites in Safari/Firefox/Google Chrome
- Take periodical high-quality screenshots
- Log typed Passwords (Professional Only)
- Log the IP address of the Mac
- Send logs to Email/FTP at the preset interval
- Password protection and customizable hot keys
Amac Keylogger for Mac OS X can be used to
Watch Kids Online
Amac Keylogger for Mac OS X assi ...
An all-in-one and agentless network monitoring and management system, capable of monitoring every device in your network. Monitor bandwidth, availability, performance, services and traffic flow. Automatically generate maps and dependencies. Supports leading OS types: Windows, Linux, Mac OS X, VMWare ESX/ESXi, and BSD. Advanced layer-2 mapping. Automatic alert correlation. Baseline thresholds and range triggers. Over 7000 MIBs and a MIB compiler
Power Spy secretly logs Facebook, Skype, keystrokes, chats & IMs, emails, web visits, video talk, microphone, logins, passwords, applications, searches and more. It also takes screenshots like a surveillance camera. Lets you know exactly what they do on a computer screen while you are away. Automatically sends log reports to your email or ftp. Starts monitoring with system startup. Runs silently and invisibly.
Power Spy software secrectly logs Facebook use, keystrokes, website visits, emails, chats and IMs: Skype, Yahoo Messenger and more. Takes screen snapshots at every X seconds like a surveillance camera. Displays exact activities, like Facebook, PC games, online searches & shopping, file transfers and webmails. You can receive reports remotely via emails or ftp. Perfect for monitoring kids, spouse and employees.
LinqConnect is a LINQ to SQL compatible ORM solution with extended functionality, support for SQL Server, Oracle, MySQL, PostgreSQL, and SQLite, its own visual model designer, seamlessly integrating to Visual Studio, and SQL monitoring tool. LinqConnect includes support for Silverlight and Windows phone 7 and Metro apps development, it uses only its own classes without referencing the System.Data.Linq assembly.
The utility is intended for visual monitoring (control) of a network traffic from all network interfaces (devices) which are available in system, and also providing the main statistical information on the data transmitted through them
KSnetManager is a revolutionary parental control tool that is distinct from other internet monitoring software: 1) Instead of being a hidden monitoring program, it is interactive. 2) Instead of passive monitoring, it actively controls and blocks unexpected activities. 3) It controls and monitors not only websites, but also all programs on your computer. 4) The program has a fully encrypted key logger; and much more.
Win Spy Software Pro is a Complete Stealth Monitoring Software that can both monitor your Local PC and Remote PC or any Android (cell Phone or Tablet) device. WinSpy Software will capture anything the user sees or types on the keyboard. Win-spy will also capture WebCam shots and record surrounding sounds. Now Works behind Firewalls and Routers. New build includes JPG and PDF Remote File and Advanced Android Monitoring.
FireDaemon Pro is a system utility that allows you to install and run any 32-bit or 64-bit application or script (EXE, DLL, BAT CMD, .NET, Perl, Java, Python, TCL/TK) as a Windows service. FireDaemon Pro features easy service configuration via the GUI or command line, a low memory and CPU overhead, subprocess prioritization, custom environments, scheduling, popup closing, CPU binding, monitoring and logging to the event log and on-disk log files.
The Ultimate FTP, FTP/SSL (FTPS) .NET Component offers a comprehensive interface for FTP, providing the developer with everything that he needs to incorporate secure file transfers in an application, as well as remote file management using FTP. In addition to downloading and uploading by file name, URL, and wild card masks, the FTP library also supports remote file management functionality such as directory listings and the ability to rename, delete and move files on the server. The component also offers the flexibility, ease of use and rapid development features of a component without the complexities of working with the native socket class or in-depth knowledge of how the File Transfer Protocols are implemented. In most cases, only a few lines of code are required to implement a file transfer in your application.
The following is a list of some key features of the component:
* Upload, download, append, rename and delete FTP file
* Large file support (can be greater than 4GB)
* Parse li ...
Recycle Cleaner ActiveX control allows you to delete files in the basket, get information on the basket, a list of files in the Recycle Bin, as well as operations with remote files in the cart, such as: removal and showing the properties of one or more files. It also shows the principle for monitoring the basket. Well, the Recycle Cleaner ActiveX is easy to use, easy to integrate into your application, and fits all your requirements.
DEKSI Network Monitoring Suite is a set of three award winning network software tools that allow you to monitor devices and servers on your network, obtain online data when the time a device becomes available and when it times out or goes out of service, and thus ensure a proactive response to any network problems your organization might encounter. The network software bundle also allows you to monitor the Internet and local traffic usage on your LAN, to manage network devices (switches, workstations, and servers).
DEKSI Network Administrator is a network mapping, network monitoring, and network diagramming solution for corporate Microsoft Windows networks. DEKSI Network Administrator generates a network map, which speeds up accessing to remote hosts' properties and resources. Scan your network, find hosts, place them on a network diagram, and monitor their state! DEKSI Network Administrator can export a network diagram to a graphic image, Microsoft Visio, as well as an XML scheme.
DEKSI Netw ...
Network Mapping and Monitoring software. DEKSI Network Duo is a set of two award winning network software programs, DEKSI Network Administrator, and DEKSI Network Monitor that allow you to monitor devices and servers on your network, obtain online data when the time a device becomes available and when it times out or goes out of service, and thus ensure a proactive response to any network problems your organization might encounter. The network software bundle also allows you to map your entire computer network.
DEKSI Network Administrator generates a network map, which speeds up accessing to remote hosts' properties and resources. Scan your network, find hosts, place them on a network diagram, and monitor their state! DEKSI Network Administrator can export a network diagram to a graphic image, Microsoft Visio, as well as an XML scheme.
DEKSI Network Monitor will show you when a device is available as well as the time it became unavailable or out of service. This will enable the network adminis ...
DEKSI Network Suite is a set of award winning network software tools that allow you to monitor devices and servers on your network, obtain online data when the time a device becomes available and when it times out or goes out of service, and thus ensure a proactive response to any network problems your organization might encounter. The network software bundle also allows you to monitor the Internet and local traffic usage on your LAN, to manage network devices (switches, workstations, and servers), and to create a database of all the software and hardware that is installed on your network and help you monitor any changes that have occurred on your network and remote computers.
DEKSI Network Inventory will allow you to have a comprehensive and detailed audit of your software License Keys and Serial Numbers and will enable you to enter valid serial numbers and license keys for your products and discover if unauthorized or illegal copies of those software products are installed on various computers on your n ...