|
||||||
|
||
|
Home > Key log software |
|
|
111. | PC Activity Monitor Lite (PC Acme Lite) 7.2 (keyloggers.com) | ||
Activity Monitor Lite (PC Acme Lite) is designed for monitoring user's PC activity. PC Acme Lite works under Windows 2000/XP operating systems. All data collected by the monitoring are saved to the encrypted log file located on the user's machine. Monitoring program works in background | |||
Updated: 8, 2004 | Rating: 0 | Author: Raytown Corporation | Size: 2774 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
112. | PC Activity Monitor Net 6.3 (spy-soft.biz) | ||
All data collected through the monitoring are saved to an encrypted log file. The program runs completely hidden in the background so you can monitor whenever you want. Stealth technology ensures that PC Activity Monitor Net™ is completely hidden from everyone except you. Only you can launch or delete PC Activity Monitor Net™. This lets you secretly monitor anything viewed on your | |||
Updated: 8, 2004 | Rating: 0 | Author: Raytown Corp. | Size: 981 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
113. | PC Activity Monitor Standard (PC Acme Standard) 7.2 (keyloggers.com) | ||
Monitor Standard (PC Acme Standard) is designed for monitoring user's PC activity. PC Acme Standard works under Windows 2000/XP operating systems. All data collected by the monitoring are saved to the encrypted log file located on the user's machine. Monitoring program works in background, transparent for the user, on the level of OS kernel. PC Acme Standard supports | |||
Updated: 8, 2004 | Rating: 0 | Author: Raytown Corporation | Size: 2915 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
114. | PestPatrol 3.0 (safersite.com) | ||
access trojans (RATs), and more * Hacker tools: Password crackers, key loggers, port scanners, and more * Spyware: Rogue applications that phone home user and system information without permission. These pests create back doors into your PC, compromising privacy and data integrity. PestPatrol detects and disables or removes thousands of pests quickly and safely. PestPatrol | |||
Updated: 8, 2004 | Rating: 0 | Size: 3109 kb | Demo Go to category: Security & Privacy > Other Similar programs | |||
115. | ProBot 2.5.0 (nethunter.cc) | ||
and logging. ProBot software maintains the detailed event log that is stored securely in binary files. Special tools provided within the package are used to restore computer usage history and generate detailed reports for administration. ProBot is easy to integrate into network environment. Engine includes an embedded Web server called Remote Web Console, which allows to | |||
Updated: 9, 2005 | Rating: 49 | Author: Andrei Birjukov | Size: 2225 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
116. | ProBot SE 2.3.0 (nethunter.cc) | ||
watches over keylogging in NT console windows. The detailed event log is kept securely in encrypted binary files that may be later referred by the system administrator or computer owner for the exact reconstruction of the computer usage. ProBot SE is very suitable for monitoring Internet activity because it enables you view all of the Web site URLs visited by a subject. ProBot SE is | |||
Updated: 9, 2005 | Rating: 48 | Author: Andrei Birjukov | Size: 2236 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
117. | ProtectZ 1.60 (actualsecurity.com) | ||
all EXE or DLL files from rewriting. You may make all file's attributes unmodified. ProtectZ protects files and folders on local hard disk drive, network drive, character device and gives you possibility to view unauthorized access which is stored in the log file. ProtectZ enables you to permit access to protected files and folders by specified processes | |||
Updated: 8, 2004 | Rating: 723 | Author: Konstantin Evseenko | Size: 574 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
118. | Qubit Master 2.1 (quantum-intelligence.com) | ||
task by giving out a single voice command, menu selection or key combination. For example, say 'Send weekly report to Bill' and it will open a new e-mail message, address it to 'Bill', fill the subject line with 'Weekly report' and format the message body. Or, press Control, Shift and 'H' keys and it will take you to the Hotmail site, enter the user name and password | |||
Updated: 9, 2005 | Rating: 0 | Author: Branislav Vasilijevic | Size: 6571 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
119. | RBackup Remote Backup 8.53 (remote-backup.com) | ||
and encrypts backup files using a choice of encryption methods and key lengths: DES, TDES-128, AES-128, AES-192, AES-256, or Blowfish (up to 448 bit key length.) RBackup then sends backup files off-site to the RBackup Server through the Internet, Intranet, or direct dial-up modems. RBackup has many failsafe features, and conforms to standard backup methodology. RBackup can be | |||
Updated: 2, 2006 | Rating: 42 | Author: Remote Backup | Size: 56564 kb | Commercial Go to category: System Utilities > Backup & Restore Similar programs | |||
120. | RebootEx 2.11 (ashkon.com) | ||
and/or relogon to your computer. The program provides the following key features: ability to reboot, shutdown, shutdown & power off the computer, log off the current user, shutdown remote computer and schedule logon after reboot. A number of additional command line options makes it a highly | |||
Updated: 9, 2005 | Rating: 134 | Author: Ashkon Software | Size: 477 kb | Shareware Go to category: System Utilities > Launchers & Task Managers Similar programs | |||
|
Home > Key log software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|