|
||||||
|
||
|
Home > Invisible secrets software |
|
|
21. | PAL PC SPY 1.01 (palsol.com) | ||
everything that happens on your PC and online. It is a completely invisible KEY RECORDER and SCREEN CAPTURE utility that secretly captures anything the user sees or types on the keyboard. PAL PC Spy operates in stealth mode. Users are unaware of its existence. Special hotkey and login is | |||
Updated: 9, 2005 | Rating: 0 | Author: Christian Champion | Size: 1250 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
22. | SpyAnytime PC Spy 2.4 (waresight.com) | ||
is a powerful spy software to secretly track all activities of computer users with just a single click, and it does NOT require you to have advanced computer skills at all. It allows you to monitor and record all areas of computer usage, e.g. keystroke, e-mail, online chat, passwords, Web sites, and take screen snapshots every few seconds like a surveillance camera. Features include | |||
Updated: 9, 2005 | Rating: 520 | Author: Jason H | Size: 1400 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
23. | SurfSecret Privacy Protector 5.02 (surfsecret.com) | ||
sits down to use your computer - your entire surfing history will be invisible to them. By constantly destroying cookies, Privacy Protector makes it impossible for companies to profile or track your actions on the web. Nobody will know where you have been surfing - not a family member, friend, or even | |||
Updated: 9, 2005 | Rating: 16 | Author: Jon Oringer | Size: 800 kb | Shareware Go to category: Network & Internet > Other Similar programs | |||
24. | Ghost Keylogger 3.80 (keylogger.net) | ||
know what people are doing on your computer? Ghost Keylogger is an invisible easy-to-use surveillance tool that records every keystroke to an encrypted log file. The log file can be sent secretly with email to a specified receiver. Ghost Keylogger also monitors the Internet activity by logging the addresses of visited homepages. It monitors time and title of the active | |||
Updated: 3, 2005 | Rating: 0 | Author: Jon Kagstrom | Size: 600 kb | Demo Similar programs | |||
25. | SecuritySkillz PC SystemGaurd 1.1 (securityskillz.com) | ||
destroys those hidden FTP type trojans(backdoors) transferring your secret data and confidential files without your knowledge. Even those advanced trojans which use random ports to trasfer your private details. Keloggers generally require a secret hotkey to become visible, but our code fools it into revealing itself just by clicking a single button. When spy program is | |||
Updated: 3, 2005 | Rating: 0 | Author: Amit Gupta | Size: 3072 kb | Shareware Go to category: Business > Other Similar programs | |||
26. | Ghost Keylogger 3.80 (keylogger.net) | ||
know what people are doing on your computer? Ghost Keylogger is an invisible easy-to-use surveillance tool that records every keystroke to an encrypted log file. The log file can be sent secretly with email to a specified receiver. Ghost Keylogger also monitors the Internet activity by logging the addresses of visited homepages. It monitors time and title of the active | |||
Updated: 8, 2004 | Rating: 298 | Author: Jon Kagstrom | Size: 600 kb | Demo Go to category: System Utilities > Other Similar programs | |||
27. | PC Activity Monitor Net 6.3 (spy-soft.biz) | ||
Activity Monitor Net™ is an ultimate invisible and undetectable easy-to-use monitoring and surveillance tool for both networked and personal PCs. It is professional software that captures all users activity on the PC. All data collected through the monitoring are saved to an encrypted log file. The | |||
Updated: 8, 2004 | Rating: 0 | Author: Raytown Corp. | Size: 981 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
28. | BMS-EmailObserver 5.1 (monitoring-software.co.uk) | ||
invisibly copy all outgoing emails and accurately send them to your secret email address pre-configured by the program Control Panel, no matter which email client software a monitored user might use (either Microsoft Outlook Express, Eudora, Pegasus, The Bat! or similar). Full control over outgoing | |||
Updated: 8, 2004 | Rating: 0 | Author: Raytown Corporation | Size: 631 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
29. | The Keytrap Application invisible keylogger 2.1 (keytrap.camouflagesoft.com) | ||
activity. The keystrokes are stored in an encrypted file in a secret location. There is an Admin program available for retrieving the keystroke information in a convenient report format. The report stores the keystrokes according to application as well as date and time. The program will record everything - including all passwords typed, all chat room activity, etc. It also lets you | |||
Updated: 8, 2004 | Rating: 116 | Size: 458 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
|
Home > Invisible secrets software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|