PC James Bond 007 2007 5.2
PC James Bond 007 secrectly records keystrokes, screenshots, websites visited, windows opened, applications run, Skype, MSN IM, ICQ, AIM, Yahoo! IM, clipboard, emails read, docs, passwords and more. In Stealth Mode, it is completely invisible to computer users. You can set hotkey and password to access the program. Receive all logs from a preset email or ftp at set interval. Usages: monitors employees, children, spouse and investigate crimes.
MSN Spy Monitor 2007 5.2
Spy all version MSN IM chatting records. Spy stealthily so that the user won't know such monitoring exists. Possible usages of MSN Spy Monitor include: Spy employees, children and spouse chatting on MSN. View logging records from the program or send a report to a pre-determined email address. Use your hotkey to activate it from complete stealth mode and protect program access by password. Uninstall it easily from the program interface.
Docklight RS232 Terminal - RS232 Monitor 1.6
Docklight is a test, analysis and simulation tool for serial communication protocols (RS232, RS485/422 and others). It allows you to monitor the communication between two serial devices or to test the serial communication of a single device. Key functions include: * Simulating serial protocols * Logging RS232 data * Detecting specific data sequences * Responding to incoming data.
PC Spy Monitor 2007 5.2
PC Spy Monitor secrectly records keystrokes, screenshots, websites visited, windows opened, applications run, Skype, MSN IM, ICQ, AIM, Yahoo! IM, clipboard, passwords, emails, docs and more. In Stealth Mode, it is completely invisible to computer users. Set hotkey and password to access the program. Send logs to a preset email or ftp at set interval. Usages: monitors employees, children, spouse and investigate crimes.
monitor, pc, spy, camera, msn, icq, aim, ie, yahoo, messenger,
EtherBoss MSN Monitor & Sniffer 1.11
EtherBoss MSN Messenger Conversation Monitor is a handy network utility to capture and log MSN Messenger chat on network. All intercepted messages will be saved on the disk automatically. It also provides rich-features report and finding system to locate and export captured MSN conversations as HTML files. Run the MSN sniffer on any computer on your network. No additional program installation is needed on the monitoring target computers.
msn, sniffer, monitor, chat, conversation, report, messenger, msn instant messenger, spy, logger,
KGB Keylogger 1.21
KGB Keylogger offers you several integrated tools to monitor user activities. Log all key strokes, record clipboard entries and all web sites. All activities are secretly logged into a file, and supported with snapshots, time stamps, application names and window captions. You'll know all of the users activities minute by minute. See everything that was typed and also where and when it was typed. Can run in Stealth mode and report over email.
kgb, record, secret, keylogger, keystroke, recorder, spy, key logger, keystrokes, logger,
Ghost Keylogger 3.80
Ghost Keylogger is an invisible easy-to-use surveillance tool that records every keystroke to an encrypted log file. The log file can be sent secretly with email to a specified receiver. Ghost Keylogger also monitors the Internet activity by logging the addresses of visited homepages. It monitors time and title of the active application; even text in editboxes and message boxes is captured. The key logger runs invisbly on all operating systems.
keylogger, keystroke logger, passwords, ghost, ghost keylogger, key, logger, ghost, keylogger, invisible keylogger,
PC Spy Keylogger 2.3
PC Spy Keylogger is a top-rated, invisible and easy-to-use surveillance tool that records every keystroke to a log file. The log file can be sent secretly with email or FTP to a specified receiver.
keylogger, key logger, key, logger, keylog, key log, key, log, pc, spy,
Keyboard Collector 2.07e
Secretly log and view all keys typed, including emails, instant messages, passwords, and more. You simply choose to have it run all the time, or to start at a specific time of the day, and it runs undetected while capturing all keyboard and data entry. Even if the computer is restarted, Keyboard Collector will automatically start running again. It runs invisible, does not show when CTRL-ALT-DEL is pressed, and doesnt slow down system performance.
key, logger, keylogger, keystroke, spy, pc, windows, monitor, capture, silently,
AIM Sniffer is a handy network utility to capture and log AIM (AOL Instant Messenger) chat from computers within the same LAN. It supports not only messaging through AIM server but also direct connection messaging. All intercepted messages are well organized by AIM user with buddies and shown instantly on the main window. It provides rich-features report system to export captured AIM conversations as HTML files for later analyzing and reference.
sniffer, aim, conversations, monitoring, report, messenger, aol, instant, aol instant messenger, spy,
AIM Log Manager 1.6.300
This is a unique and powerful tool to log, organize, and manipulate your AOL Instant Messenger conversations (AIM Triton supported), with powerful trend-analysis and organizational tools. AIM Log Manager also allows stealth monitoring, automatic compression, recording images and files from directly connected IMs, and recording AIM buddy events, such as buddies signing on/off.
aim, triton, log, manager, aimlogger, analyze, conversations, away message, im, logging,
TunnelME is a program that allows to connect to any Internet service through a chain of SOCKS or HTTP proxies to hide the actual IP address and to work with a programs that are not designed to support SOCKS protocol directly. It can act as SOCKS proxy, as well as HTTP proxy or any other service, depending of remote server specified. TunnelME can be used with client programs that do not support proxies, but work with one TCP-connection.
proxy, firewall, bypassing, tunnel, tcp, logger,
SystemSherlock Lite 1.00
SystemSherlock Lite is designed to analyse changes made to the registry and file system on your Windows workstation. SystemSherlock Lite saves an image of the registry and all your files and folders. Later on - for example after installing some software - you can analyse in detail what changes have been made to your system. You will find out exactly which registry entries and files that have been created, deleted or modified.
systemsherlock, system, sherlock, kephyr, free, freeware, file, system, filesystem, registry,
Many powerful electronic devices can be connected to a PC through an RS232 interface. However, most are virtually useless without good accompanying software. ByteWedge by Fogsoft supports a wide range of devices, from lab equipment to office telephone systems. It can collect data from devices and input it directly into your database, whether it is MS Access, MySQL or any other ODBC-compliant database.
rs232, logger, serial port, rs232 data, rs232 to database, rs232 import,
Access Manager 2.0.57
Access Manager is a free software solution that keeps all your passwords in one, simple to use list. It offers fast, easy and secure password management. One 'Master Password' is all that is needed to access all your passwords and private information. You can view or edit your password list, and drag & drop or copy passwords to web pages and other software. Strong encryption keeps your information secure.
password manager, password managers, password, passwords, manager, managers, management, secure, security, private,