|
SpyAgent
Keystroke Cop in effect, neutralizes
any key loggers on your system by disallowing
them access to your keystrokes! No longer worry
if someone is trying to get your passwords, credit
card numbers, or any amount of sensitive information!.
|
|
----------------------------------------------------------------------------------------------------------------------
|
iSpy
Now
iSpyNOW remotely deployable
computer monitoring software product offered
anywhere! iSpyNOW provides you with the ability
to remotely install the software from any location
and monitor/control the PC in real-time from
your web browser!
|
|
----------------------------------------------------------------------------------------------------------------------
|
Net
Nanny
Net Nanny respects your right
to control how your family uses the Internet,
based on your own unique needs and values.
That's why we give you the most flexible and
comprehensive set of options available today
to be an effective parent in cyberspace. Net
Nanny is the only program available today
that allows you to see and control every single
site in our web site database. It allows you
to block pornography, hate literature, bomb
formulas, and anything else that you deem
inappropriate.
|
|
----------------------------------------------------------------------------------------------------------------------
|
Who's
Watching Me
Find out if you have a snooper
installed on your computer. Trapware's WHO'S WATCHING
ME snooper detector (patent pending) finds snoopers
and tells you what information they are gathering.
.
|
no photo available
|
----------------------------------------------------------------------------------------------------------------------
|
iStealth
Platinum
i-Stealth will filter out inappropriate
material according to your desired settings. Here
are some of the exciting features this program
has to offer: Take pictures of the screen at desired
intervals, records instant messages, chats, email
sent & received and file transfers, web sites
and time spent online, e-mail reporting, filters
web pages; prevents personal information from
being sent, block specific web-sites or block
according to content specified with pre-set keywords,
keystroke logging, protect your system from others,
set computer and internet time limits, monitor
file activity, and more!
|
no photo available
|
----------------------------------------------------------------------------------------------------------------------
|
Surf
Spy
Surf Spy is an invisible tool that
monitors the Internet activity on your computer.
It captures the link (URL) of every visited web
site and stores it to an encrypted file. The log
file can be sent secretly with email to a specified
receiver. Surf Spy Enterprise allows logging to
a centralized server. This is very useful for
large companies and schools that want to monitor
a large number of computers. .
|
no photo available
|
----------------------------------------------------------------------------------------------------------------------
|
SpyCop
Corporate
SpyCop finds spy programs such
keyloggers designed specifically to record your
screen, email, passwords and much more! SpyCop
will detect the spy, tell you when it was installed,
and optionally disable it! SpyCop can find over
270 spy programs.
|
|
----------------------------------------------------------------------------------------------------------------------
|
NetMonitor
a program that allows you to control
and monitor computer screens of students and by
this you can control and monitor the progress
of all students in a classroom more efficiently.
Experiences from previous testing show us that
the students if monitored take computer exercises
more seriously than otherwise. We have implemented
an option of sending a message to selected computers.
In this way the teacher can send messages to individual
students which enables him to improve the guidance
and differentiation of teaching.
|
no photo available
|
----------------------------------------------------------------------------------------------------------------------
|
Salus
- Desktop Security & Monitoring Software
a security application which allows
the owner or user of a desktop or laptop computer
to see which files are accessed, when, for how
long, which Internet sites are being connected
to, who sends e-mail to where, and so on. In fact,
the program keeps a detailed log of all the activities
perfomed on the computer.
|
no photo available
|
----------------------------------------------------------------------------------------------------------------------
|
CyberSpy
powerful PC monitoring and surveillance
needs. Records all emails typed and viewed, chat
conversations, websites, keystrokes, passwords
typed, and even desktop snapshots. Perfect spy
tool for monitoring others who use your PC - children,
spouses, or employees.
|
|
----------------------------------------------------------------------------------------------------------------------
|
Guardian
Software
Guardian Monitor permits you to
supervise everything your child does from surfing
the Web, email, chat, instant messaging and even
peer to peer sites like music and video download
sites and generates reports with day by day history.
|
|
----------------------------------------------------------------------------------------------------------------------
|
Content
Watch
Cleaning up computers - content
audit, content watch, content cleanup, content
monitor, content protect,
|
|
----------------------------------------------------------------------------------------------------------------------
|
Internet
Privacy Pro
Ensures that all the Internet activities
taking place on your computer will remain private,
because simply erasing your history and cache
is NOT Enough!
|
|
----------------------------------------------------------------------------------------------------------------------
|
iStealth
Platinum
i-Stealth will filter out inappropriate
material according to your desired settings. Here
are some of the exciting features this program
has to offer: Take pictures of the screen at desired
intervals, records instant messages, chats, email
sent & received and file transfers, web sites
and time spent online, e-mail reporting, filters
web pages; prevents personal information from
being sent, block specific web-sites or block
according to content specified with pre-set keywords,
keystroke logging, protect your system from others,
set computer and internet time limits, monitor
file activity, and more!
|
no photo available
|
----------------------------------------------------------------------------------------------------------------------
|
KeyKey
Monitor
The main feature of KeyKey Monitor
is to capture every word and letter typed into
a computer and save it for you to view at any
time.
Why would you want to capture and record everything
typed into your computer? Suppose your computer
crashes, or the power goes out while you are working.
Maybe you suspect your spouse, boyfriend, or girlfriend
of cyber-cheating on you in chat rooms or by email.
Maybe you have children, and you would like to
know what they are doing on the computer when
you aren't there to watch them. Maybe you have
an employee or employees and you want to make
sure they are not wasting company time. The list
of possible uses goes on and on.
|
no photo available
|
----------------------------------------------------------------------------------------------------------------------
|
Info-Guardian
takes a screenshot of what's happening
on the screen at preset intervals (usually 1 minute)
to monitor children or employees PC usage. It
features completely hidden operation (cannot be
access with Alt-Tab or Ctrl-Alt-Del) and password
security. Info-Guardian runs in the background
and takes a gray scale screenshot at regular intervals
and you can play back the screenshots like a slideshow
and see what was being displayed on the screen
at that time.
|
no photo available
|
----------------------------------------------------------------------------------------------------------------------
|
Advanced
Keylogger
Advanced KEYLOGGER is an invisible
surveillance tool that records every keystroke
to encrypted user-friendly easy-to-understand
logs. Logs can also be automatically sent to any
number of specified e-mails. Advanced Keylogger
also monitors the internet activity by logging
all web-pages the user visits. Advanced KEYLOGGER
keeps track of everything happening on the screen
invisibly screenshotting what is on, also being
capable of monitoring text and graphics copied
and cut to the clipboard.
|
|
----------------------------------------------------------------------------------------------------------------------
|
Spy
Sweeper
Don’t get caught without protection
from harmful spyware that invades your privacy
and can lead to identity theft. Spy Sweeper protects
you where your firewall and anti-virus software
can’t by detecting and safely removing invasive
spyware including: Trojans, adware, keyloggers,
and system monitors. With features like proactive
home page protection and automated cookie removal,
Spy Sweeper sets a new standard, offering functionality
not found in other spyware protection programs.
|
|
----------------------------------------------------------------------------------------------------------------------
|
Keyboard
Spectator Pro
a multifunctional keyboard tracking
software (a.k.a. key logger) that is widely used
by both regular users and IT security specialists.
The reason for such popularity is that this program
does not just record keystrokes; it is capable
of recording language specific characters (ex.
umlauts), date and time certain window was initiated
as well as the caption of that window.
|
|
----------------------------------------------------------------------------------------------------------------------
|
Spy
Anytime PC Spy
an extremely powerful and easy
to use PC monitoring software. It allows you to
secretly monitor and record user's activities
on computer, such as web sites visited, windows
opened, application executed, Internet chats,
every keystroke, including username and password,
and even take snapshots of the entire Windows
desktop at set intervals, just like a surveillance
camera pointed directly at your computer monitor.
|
|
----------------------------------------------------------------------------------------------------------------------
|
Access
Control (parental control)
The ultimate in computer and internet
parental control software! Access Control now
allows you to specify what days and hours your
children may access the computer, internet, or
any game and application on your system! Build
a daily time schedule for the week detailing when
each of your children may use all aspects of your
system.
|
|
----------------------------------------------------------------------------------------------------------------------
|
Spylo
PC Monitor
Stealth -monitoring utility provides
you the information about every runned application,
every keystroke, stored password, established
internet connection and takes a screen shots of
these events.Program logs are extremely compact
- screen shots are JPG compressed, monitoring
eats very small amount of processor time and monitor
is invisible to user - it is not shown by Alt+Tab
or in system tray.
|
|
----------------------------------------------------------------------------------------------------------------------
|
MaxNetShield
ultimate in internet / PC privacy
and security. Max Net Shield combines the utility
of an internet history cleaner, file encryption,
and spy software / adware detection and removal.
|
|
----------------------------------------------------------------------------------------------------------------------
|
Ghost
Keylogger
Ghost Keylogger is an invisible
easy-to-use surveillance tool that records every
keystroke to an encrypted log file. The log file
can be sent secretly with email to a specified
receiver. Ghost Keylogger also monitors the Internet
activity by logging the addresses of visited homepages.
It monitors time and title of the active application;
even text in editboxes and message boxes is captured.
.
|
|
---------------------------------------------------------------------------------------------------------------
|