|
More tags: security, monitoring, intelligence, access control, parental control, investigation, surveillance, detective, espionage, spy, key loger, keylogger, trojan, hack, hacking, cheating spouse, internet,
|
Category : |
Utilities - Security |
|
|
|
Platform : |
Win95, Win98, WinME, WinNT 4.x, Windows2000, WinXP |
|
|
Price : |
USD 149.95 |
|
|
Developer: |
|
|
|
Rating : |
|
|
|
License : |
Shareware |
|
|
Limitations: |
20 Uses |
|
|
Date : |
02/07/2007 |
|
|
Size : |
1.16 MB |
|
|
Software In :
Utilities
Security
security, monitoring, intelligence, access control, parental control, investigation, surveillance, detective, espionage, spy, key loger, keylogger, trojan, ing, cheating spouse, internet,
|
PC Activity Monitor (PC Acme) is an ultimate invisible and undetectable easy-to-use monitoring and surveillance tool for both networked and personal PCs. It is professional software that captures all users activity on the PC. All data collected by the monitoring are saved to encrypted log file. The log file can be optionally sent via e-mail to a specified address (or saved to a specified shared resource in LAN environment) for further inspection and analysis. The important advantage of PC Acme Pro keylogger is an ability to save log files in special database for further analysis and retrieving information by specifying a search condition.It is a powerful management tool for users and companies, which want to increase their productivity and profitability. This is the most remarkable security product for a computer you have seen. Program works in background, transparent for user, and captures the following events: - Application start - Switching between applications/windows. In addition program saves static text elements and windows edit controls: - Window content of most chat clients (ICQ, AIM, Yahoo etc.) - Content of Internet browser window (Internet explorer) - Mail content, viewed by Microsoft Outlook and Microsoft Outlook Express - etc. - Keystrokes - Pasting text from clipboard - File operations - System registry operations - Application installation/uninstallation - Putting programs in Startup folder - Visiting web sites. Log files are converted to HTML format for more convenient viewing in browser (Internet Explorer 4.0 or higher is recommended). Log file can be optionally sent via e-mail to specified address (or saved to specified shared resource in LAN environment) for further inspection and analysis (NET and PRO versions only). The important advantage of PRO version is an ability to save log files in special database for further analysis and retrieving information by specifying a search condition.
Benching BeautiesBaltimore Offline Map Travel GuideCalorificHoney Battle - Bears vs BeesNAPLEX Flashcard Study SystemKeysym 15e6Carnival Costumes
|
|
Also See
1)
Encryption Xpert
Want to know what the easiest and the safest way to protect your data is? It's encryption. You can encrypt your files manually, as well as one hundred years ago, or using modern software. Encryption X...
License:Shareware USD 24.95
Size:0.92 MB
2)
VB AntiCrack
VB AntiCrack is used to make it more difficult to crack your programs written in Visual Basic 6.0. Most crackers will not be able to crack your program because they will not find a single text strings...
License:Shareware USD 39
Size:1.47 MB
3)
S.O.S.Automation
Baby - Medical monitor and alarm system. Implemented in software for a home PC. constantly monitor the surroundings and call you upon emergency. This is extremely useful for infants and dependent. Cal...
License:Shareware USD 18
Size:3 MB
baby alarm, security, pc alarm, home monitor, ils servers,
4)
CDDVD Lock
CD-DVD Lock is intended for restricting read or write access to removable media devices such as CD, DVD, floppy and flash, as well as for restricting access to certain partitions of hard disk drives. ...
License:Shareware USD 29
Size:0.92 MB
5)
WinDentify
Windentify is a voice biometric source code for desktop clients. Visit www.windentify.com for live server demo. Includes fully working voice verified windows logon. Now start your machine with your vo...
License:Shareware USD 29
Size:8.77 MB
6)
Outlook Express Protector
Outlook Express Protector is designed for controlling access to Outlook Express and its e-mail and address data bases. It does not encrypt protected files and folders, however no programs can get acce...
License:Shareware USD 29
Size:0.62 MB
7)
IDFile
File verification utility, uses SHA-2 algorithm....
License:Freeware USD 0
Size:0.22 MB
8)
CHAOS Public Key
CHAOS+PK uses the newest chaos. It is high speed and allows variable-length keys, making protection very reliable and suitable for use in working. Uses the Public Key for encryption CHAOS keys by send...
License:Shareware USD 59.95
Size:0,4 MB
9)
ANTITHIEFWARE
ANTITHIEFWARE is a program that eliminates all adwares, spywares, viruses, Dialers, and hijackers that might exist on your PC. ANTITHIEFWARE is a program that uses a database with tens of thousands fi...
License:Shareware USD 29.99
Size:0.45 MB
10)
asquared HiJackFree
a-squared HiJackFree is a detailed system analysis tool which helps advanced users to detect and remove all types of HiJackers, Spyware, Adware, Trojans and Worms. Manage all types of Autoruns on your...
License:Freeware USD 0
Size:1.54 MB
Tags: spyware, browser, tools, adware, toolbar, scripts, virus, trojan, malware, worm, dos, horse, worms, viruses, trojan horse, objects
|
1)
FolderWatch
Unlike other backup program that will run only on demand or at defined schedule, Folder Watch guards your files all the time. Folder Watch does this by monitoring a given number of folders on your har...
License:Shareware USD 25
Size:0.84 MB
2)
Grace Privacy Suite
Grace Privacy Suite completely and securely removes all data from hard drives or disk partitions before return of leased assets or computer disposal. Don't give away sensitive information, valuable co...
License:Shareware USD 199.00
Size:6.92 MB
3)
AimAtFile Fast File Search
AimAtFile is an effective way to find document files by their contents. It lets you search for files of many types: MS Office documents, HTML, PDF, plain text, media files and others on a desktop comp...
License:Shareware USD 29.90
Size:0.60 MB
search, find, document, file, indexing, service, microsoft, office, pdf, network,
4)
Cipherlok
Cipherlok is a data security product that provides easy to use yet highly secure encryption of files on your PC or notebook using the Blowfish algorithm. Files or folders can be encrypted directly by ...
License:Shareware USD 45
Size:2.38 MB
5)
Registry Cleaner
Registry Cleaner v6.0 is an advanced registry cleaner for Windows that allows you to safely scan, clean, and repair registry problems with a few simple mouse clicks. Problems with the Windows Registry...
License:Shareware USD 29.95
Size:1.9 MB
6)
Advanced Spyware Remover
It protects your online private information and defends against future internet threats. Advanced Spyware Remover is an advanced but easy-to-use anti spyware tool that removes spyware, adware, malware...
License:Freeware
Size:3.08 MB
7)
CLTools 4Win
CL-Tools 4Win is a free suite of user interfaces for several command line utilities otherwise available only in DOS Mode. These four are used often here and I thought I would make them available to an...
License:Freeware USD 0.00
Size:2.26 MB
8)
ZoomAView The Computer Magnifier
ZoomAView is a powerful, easy to use computer desktop screen magnifier for Windows. Featuring multiple magnify zoom levels (up to 32x) within a fully moveable and sizeable lens window, ZoomAView helps...
License:Shareware USD 24.95
Size:1.66 MB
9)
WinCleaner Memory Optimizer
WinCleaner Memory Optimizer will clean, optimize and free up your computer's memory. Specifically designed to free ram on XP systems. Memory is vital to the computer and that is why this software can ...
License:Freeware USD 0.00
Size:0.79 MB
10)
Complete Internet Cleanup Lite
Complete Internet Cleanup is a multiple award-winning utility to delete your Internet tracks. All your Internet traces are logged to index.dat files and deleting Cache, Cookies and History does not de...
License:Shareware USD 24.95
Size:0.89 MB
Tags: internet, web, delete, clean, erase, cache, cookies, cleanup, clear
|
|
More tags: security, monitoring, intelligence, access control, parental control, investigation, surveillance, detective, espionage, spy, key loger, keylogger, trojan, ing, cheating spouse, internet,
|
|