|
||||||
|
||
|
Home > Keystrokes logging software |
Related keywords: logging, keystrokes, switching logging data print, record keystrokes, internet logging, keystrokes monitoring, call logging, time logging, Logging, data logging |
|
|
51. | Ghost Keylogger 3.80 (keylogger.net) | ||
is an invisible easy-to-use surveillance tool that records every keystroke to an encrypted log file. The log file can be sent secretly with email to a specified receiver. Ghost Keylogger also monitors the Internet activity by logging the addresses of visited homepages. It monitors time and title of the active application; even text in editboxes and message boxes is captured | |||
Updated: 3, 2005 | Rating: 0 | Author: Jon Kagstrom | Size: 600 kb | Demo Similar programs | |||
52. | Automize 6.02 (hiteksoftware.com) | ||
on task failure, FTP browsing, ZIP file viewer, extensive logging, remote task control and more. It supports dynamic variables to achieve advanced automation tasks. The program is written in Java and therefore cross-platform compatible. Automate ftp transfers, ftp daemon and monitor, web downloads through proxy or secured websites, check or send emai, success based chaining | |||
Updated: 3, 2005 | Rating: 107 | Author: Melvin Desilva | Size: 8900 kb | Shareware Go to category: System Utilities > Automation Tools Similar programs | |||
53. | Snoop 1.1 (yoursnoop.com) | ||
Outgoing e-mail Web Sites Visited Instant Messages/Chat Keystrokes Typed Snoop Features: Stealth Mode Hot Key Activation Help Keyword notification reports Activity Reports Log files by keywords or date. or all log files Works with Modems, Cable Modems, and DSL. Can be automatically or manually configured for browsers and e-mail clients. Snoop is built for | |||
Updated: 3, 2005 | Rating: 0 | Author: Snoop Internet Security | Size: 1390 kb | Freeware Go to category: Network & Internet > Other Similar programs | |||
54. | Ghost Keylogger 3.80 (keylogger.net) | ||
is an invisible easy-to-use surveillance tool that records every keystroke to an encrypted log file. The log file can be sent secretly with email to a specified receiver. Ghost Keylogger also monitors the Internet activity by logging the addresses of visited homepages. It monitors time and title of the active application; even text in editboxes and message boxes is captured | |||
Updated: 8, 2004 | Rating: 298 | Author: Jon Kagstrom | Size: 600 kb | Demo Go to category: System Utilities > Other Similar programs | |||
55. | PC Activity Monitor Net 6.3 (spy-soft.biz) | ||
parents are outside of the home they can remotely monitor children's PC activity using this software. A security service could monitor employee's PC activity from any Internet host in the world to prevent industrial espionage. For local Intranet networks a system administrator can monitor correctness of user's PC activity and restore activity history in any case of | |||
Updated: 8, 2004 | Rating: 0 | Author: Raytown Corp. | Size: 981 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
56. | @KeyLogger Home 2.10 (activity-tracker.com) | ||
PC at any time during the day or night. The @KeyLogger records every keystroke made on your computer on every window, emails, messages, documents, web pages, usernames, even on password protected boxes, and more. Get to know how your children use home computer or track employees' work time activity | |||
Updated: 8, 2004 | Rating: 48 | Author: Konstantin Romanovsky | Size: 959 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
57. | ActMon Computer and Internet Monitoring 5.04 (ActMon.com) | ||
are its powerful keyboard logger - so powerful, it even logs the keystrokes entered during Windows 2000/XP login. And ActMon has a unique "kernel-level" file protection: Files are not just hidden! They are completely inaccessible to unauthorized users. Files cannot be removed or manipulated by an unauthorized user or so called spyware "cleaner" applications or any other Windows | |||
Updated: 8, 2004 | Rating: 215 | Author: Team ActMon | Size: 1602 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
58. | HackerWacker Personal Edition 2.3.23.01 (hackerwacker.com) | ||
update to our popular HWPE software. HWPE 2 monitors and logs URLS, keystrokes, Open Windows, and File and Shell Activity. An optional Filtering feature allows you to log to a fifth log for words and strings you define. All logs and data are encrypted for maximum security, and automatically decrypted when viewed. Other features include stealth mode option, hot key access, Email logs | |||
Updated: 8, 2004 | Rating: 16 | Author: Thomas Streiff | Size: 5259 kb | Demo Go to category: Security & Privacy > Other Similar programs | |||
|
Home > Keystrokes logging software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|