|
||||||
|
||
|
Home > Key monitoring software |
|
|
71. | Sound Snooper 1.3.2 (sound-snooper.com) | ||
Snooper can be used for conference recordings, phone calls monitoring and recording, radio broadcasts logging, spying, employee monitoring, etc. Key features of SoundSnooper are: (1) Multiple sound card support. Sound Snooper supports recording from multiple sound cards simultaneously. (2) Voice activated recording. The program automatically starts and stops recording | |||
Updated: 2, 2006 | Rating: 0 | Author: SoftCab Inc | Size: 207 kb | Shareware Go to category: Audio & Multimedia > Other Similar programs | |||
72. | R-Guard 2.2 (r-tt.com) | ||
settings control. R-Guard features also include real time Files Monitoring, Files Operations Audit and Encryption. For robust and rapid encryption R-Guard uses the industry standard AES encryption algorithm with the 256-bit key and transparent True-On-The-Fly-Encryption technology. R-Guard is a reliable data security tool for advanced access right control, encryption and | |||
Updated: 9, 2005 | Rating: 0 | Size: 3020 kb | Shareware Go to category: Security & Privacy > Access Control Similar programs | |||
73. | Actual Startup Pro 2.55 (actualsystem.com) | ||
manager of programs that are run at system's start. Allows to view, add, edit, move, delete, temporary disable and monitor (using periodical checking) startup tasks. Displays descriptions for the programs extracted from their .exe and .dll files. Allows to close running programs. Convenient user interface: toolbar with familiar MSOffice-like buttons, statusbar, right-click | |||
Updated: 9, 2005 | Rating: 39 | Author: Actual System, Inc. | Size: 676 kb | Shareware Go to category: System Utilities > Automation Tools Similar programs | |||
74. | Hide&Protect 1.016c (softwar-protect.com) | ||
compress and encrypt your application, and has mechanism of monitoring of your application. Main key features : - Multi process activities - Real time control process - Monitoring of the target - Disable use of debuggers - Obfuscation of memory dumpers - Compression and encryption of target code Hide&Protect is built in as invisible protection of | |||
Updated: 9, 2005 | Rating: 0 | Author: LE CHATELIER Jerome | Size: 1113 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
75. | SpyMyPC PRO 1.9 (benutec.com) | ||
PRO is award-winning, highly flexible, all-round desktop security monitoring solution, the best choice if you want to know what others are doing on your own computer while you are not at home (or office). Logs all keystrokes, applications, windows, websites, Internet connections, passwords and chat | |||
Updated: 9, 2005 | Rating: 0 | Author: Benutec Software | Size: 666 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
76. | web based msde dba tool - Shusheng SQL Tool 1.0 (websqltool.com) | ||
and dba utility to design, create, query, backup, manage and monitor database from a web browser. Pure ASP script, no installation needed. Freeware for Educational and Personal usage. For DBA ( Database Admin ) o Maintain Operators, Categories, Alerts, Notifications, Jobs, Job Steps and Schedules. o Monitor connections, locks and performance of SQL server. Kill bad | |||
Updated: 9, 2005 | Rating: 0 | Author: Shusheng Zhou | Size: 819 kb | Freeware Go to category: Business > Databases & Tools Similar programs | |||
77. | PC Activity Monitor (PC Acme) 6.4 (keyloggers.com) | ||
Activity Monitor (PC Acme) is an ultimate invisible and undetectable easy-to-use monitoring and surveillance tool for both networked and personal PCs. It is professional software that captures all users activity on the PC. All data collected by the monitoring are saved to encrypted log | |||
Updated: 9, 2005 | Rating: 0 | Author: Raytown Corporation LLC | Size: 976 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
78. | PC Activity Monitor (PC Acme) 6.4 (keyloggers.com) | ||
Activity Monitor (PC Acme) is an ultimate invisible and undetectable easy-to-use monitoring and surveillance tool for both networked and personal PCs. It is professional software that captures all users activity on the PC. All data collected by the monitoring are saved to encrypted log | |||
Updated: 9, 2005 | Rating: 0 | Author: Raytown Corporation LLC | Size: 976 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
79. | PrivacyKeyboard 6.1 (anti-keylogger.com) | ||
PrivacyKeyboard for Microsoft Windows 2000/XP is the FIRST product of its kind in the world that can provide every computer with strong protection against ALL types of keylogging programs (keyloggers) and keylogging hardware devices (hardware keyloggers), both known and unknown, currently in use or presently | |||
Updated: 9, 2005 | Rating: 0 | Author: Raytown Corporation LLC | Size: 2909 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
80. | SpyAnytime PC Spy 2.4 (waresight.com) | ||
you to have advanced computer skills at all. It allows you to monitor and record all areas of computer usage, e.g. keystroke, e-mail, online chat, passwords, Web sites, and take screen snapshots every few seconds like a surveillance camera. Features include autostart monitoring, password protection, halt on idle, sorting and searching records, HTML report, screen snapshots | |||
Updated: 9, 2005 | Rating: 0 | Author: Jason H | Size: 1400 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
|
Home > Key monitoring software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|