|
||||||
|
||
|
Home > Internet activity software |
Related keywords: internet, Internet, activity, internet explorer, Internet Explorer, internet privacy, internet security, internet marketing, INTERNET, internet spy |
|
|
221. | Ghost Keylogger 3.80 (keylogger.net) | ||
email to a specified receiver. Ghost Keylogger also monitors the Internet activity by logging the addresses of visited homepages. It monitors time and title of the active application; even text in editboxes and message boxes is captured. The key logger runs completly invisbly on all operating systems, even in the NT/2000/XP process list. Some applications of the keylogger | |||
Updated: 8, 2004 | Rating: 298 | Author: Jon Kagstrom | Size: 600 kb | Demo Go to category: System Utilities > Other Similar programs | |||
222. | Golden Eye 4.11 (monitoring-spy-software.com) | ||
you ever wondered what your children doing on the Internet? Who they talk to and what pictures they see? Are you suspecting your husband or wife is cheating on you? who they email ? what movies they see? who they chat with ? Do you want to know what your employees are doing during work hours? Golden Eye is designed to monitor and record all the activity on your computer | |||
Updated: 2, 2006 | Rating: 42 | Author: Kevin | Size: 1490 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
223. | HackerWacker Personal Edition 2.3.23.01 (hackerwacker.com) | ||
monitors and logs URLS, keystrokes, Open Windows, and File and Shell Activity. An optional Filtering feature allows you to log to a fifth log for words and strings you define. All logs and data are encrypted for maximum security, and automatically decrypted when viewed. Other features include stealth | |||
Updated: 8, 2004 | Rating: 16 | Author: Thomas Streiff | Size: 5259 kb | Demo Go to category: Security & Privacy > Other Similar programs | |||
224. | Internet History Eraser 5.5 (internet-history-eraser.com) | ||
Internet History Eraserallows you to easily delete the files that accumulate from Web surfing. It provides features specifically for Internet Explorer, Netscape, Opera and a number of other Internet software programs. Not only will you protect your privacy, you'll free up valuable disk | |||
Updated: 2, 2006 | Rating: 0 | Author: Kevin | Size: 1460 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
225. | Jetico Personal Firewall 1.0.1.61 (jetico.com) | ||
Personal Firewall protects your computer from unwanted hacker's attacks from outside as well as from malicious programs "living" secretly inside your computer's memory and hard drive. Three levels of protection are included: low-level network packets filtering, application-level network events filtering and filtering of user-level process activity. Jetico Personal | |||
Updated: 9, 2005 | Rating: 42 | Author: Jetico Inc. | Size: 2744 kb | Freeware Go to category: System Utilities > Other Similar programs | |||
226. | Kaspersky Anti-Virus Personal Pro 5.0 (kaspersky.com) | ||
monitors all sources of possible virus infections: email, the Internet, CDs and more. Personal Pro also protects all parts of your PC: system memory, boot sector, files, mail databases and etc. It also contains unique technology for protecting your MS Office documents. Scanning archived and compressed files Viruses often hide in archived and compressed files, where most antivirus | |||
Updated: 3, 2005 | Rating: 39 | Author: Andrey Shepelev | Shareware Go to category: Security & Privacy > Anti-Virus Tools Similar programs | |||
227. | Keylogger Pro 1.7 (exploreanywhere.net) | ||
KeyloggerPro is an advanced, low level stealth keystroke monitoring application that will secretly record and backup all keystrokes typed on your PC. It offers a wide variety of features including the ability to view keystrokes remotely by having the program send keystrokes to a specified email address every | |||
Updated: 2, 2006 | Rating: 257 | Author: Bryan Hammond | Size: 886 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
228. | Language Identifier 1.5 (lextek.com) | ||
analyzing which language most closely matches your document's text. Not only does the language identifier tell you which language is most likely the language you are dealing with but it will also tell you the top three languages that most closely match. Use the language identifier to identify what languages e-mail or web pages are written in or to find out what language | |||
Updated: 9, 2005 | Rating: 0 | Size: 2148 kb | Freeware Go to category: System Utilities > Other Similar programs | |||
229. | Lockout Desktop Security 1.1.652 (dynamicdesigns.co.uk) | ||
restrict when your PC can be used, restrict CD usage, log Internet usage, and log attempts at restricted activities. Note: This is a 30-day trial. After 30 days, the program will be disabled after 15 minutes of use. The full-version retail price is Ј30. Some Of Lockout's Features Hide all control panel applets at the click of a button | |||
Updated: 9, 2005 | Rating: 0 | Author: Craig Wilkinson | Size: 2857 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
230. | Maxus SE 3.05 (neurobridge.com) | ||
multi-functional tool designed to improve your Windows and Internet experience. It actually comprises several utilities listed below. The first is a powerful built-in dial-up connections manager that lets you establish Internet connections using any account existing in your system, schedule your computer to automatically connect to your ISP and disconnect at the specified | |||
Updated: 8, 2004 | Rating: 42 | Author: NeuroBridge | Size: 1383 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
|
Home > Internet activity software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|