PC Spy Keylogger 2.3
PC Spy Keylogger is a top-rated, invisible and easy-to-use surveillance tool that records every keystroke to a log file. The log file can be sent secretly with email or FTP to a specified receiver.
keylogger, key logger, key, logger, keylog, key log, key, log, pc, spy,
Docklight RS232 Terminal - RS232 Monitor 1.6
Docklight is a test, analysis and simulation tool for serial communication protocols (RS232, RS485/422 and others). It allows you to monitor the communication between two serial devices or to test the serial communication of a single device. Key functions include: * Simulating serial protocols * Logging RS232 data * Detecting specific data sequences * Responding to incoming data.
rs232, rs-232, docklight, rs232 terminal, serial communication, logging, rs232 monitor, rs232 analyzer, com port monitor, serial port monitor,
EtherBoss MSN Monitor & Sniffer 1.11
EtherBoss MSN Messenger Conversation Monitor is a handy network utility to capture and log MSN Messenger chat on network. All intercepted messages will be saved on the disk automatically. It also provides rich-features report and finding system to locate and export captured MSN conversations as HTML files. Run the MSN sniffer on any computer on your network. No additional program installation is needed on the monitoring target computers.
msn, sniffer, monitor, chat, conversation, report, messenger, msn instant messenger, spy, logger,
KGB Keylogger 1.21
KGB Keylogger offers you several integrated tools to monitor user activities. Log all key strokes, record clipboard entries and all web sites. All activities are secretly logged into a file, and supported with snapshots, time stamps, application names and window captions. You'll know all of the users activities minute by minute. See everything that was typed and also where and when it was typed. Can run in Stealth mode and report over email.
kgb, record, secret, keylogger, keystroke, recorder, spy, key logger, keystrokes, logger,
PC James Bond 007 2007 5.2
PC James Bond 007 secrectly records keystrokes, screenshots, websites visited, windows opened, applications run, Skype, MSN IM, ICQ, AIM, Yahoo! IM, clipboard, emails read, docs, passwords and more. In Stealth Mode, it is completely invisible to computer users. You can set hotkey and password to access the program. Receive all logs from a preset email or ftp at set interval. Usages: monitors employees, children, spouse and investigate crimes.
monitor, pc, spy, camera, msn, icq, aim, ie, yahoo, messenger,
Ghost Keylogger 3.80
Ghost Keylogger is an invisible easy-to-use surveillance tool that records every keystroke to an encrypted log file. The log file can be sent secretly with email to a specified receiver. Ghost Keylogger also monitors the Internet activity by logging the addresses of visited homepages. It monitors time and title of the active application; even text in editboxes and message boxes is captured. The key logger runs invisbly on all operating systems.
keylogger, keystroke logger, passwords, ghost, ghost keylogger, key, logger, ghost, keylogger, invisible keylogger,
Serial Monitor Device Monitoring Studio 5.22.00.1627
Software serial port monitor Rs232 sniffer with protocol analyzer and packet data logger. This monitoring utility can spy, capture, view, log, analyze, test com ports activity performing com port connection and traffic analysis with data acquisition and control. You can use this system as device interface testing tool, modem data transfer viewer and so on.
monitor, serial, port, rs232, com, sniffer, software, monitoring, modem, protocol,
MSN Spy Monitor 2007 5.2
Spy all version MSN IM chatting records. Spy stealthily so that the user won't know such monitoring exists. Possible usages of MSN Spy Monitor include: Spy employees, children and spouse chatting on MSN. View logging records from the program or send a report to a pre-determined email address. Use your hotkey to activate it from complete stealth mode and protect program access by password. Uninstall it easily from the program interface.
monitor, msn, spy, camera, cam, spyware, record, email, key, stroke,
Many powerful electronic devices can be connected to a PC through an RS232 interface. However, most are virtually useless without good accompanying software. ByteWedge by Fogsoft supports a wide range of devices, from lab equipment to office telephone systems. It can collect data from devices and input it directly into your database, whether it is MS Access, MySQL or any other ODBC-compliant database.
rs232, logger, serial port, rs232 data, rs232 to database, rs232 import,
TunnelME is a program that allows to connect to any Internet service through a chain of SOCKS or HTTP proxies to hide the actual IP address and to work with a programs that are not designed to support SOCKS protocol directly. It can act as SOCKS proxy, as well as HTTP proxy or any other service, depending of remote server specified. TunnelME can be used with client programs that do not support proxies, but work with one TCP-connection.
proxy, firewall, bypassing, tunnel, tcp, logger,
Break is designed to help you work more effectively by recording your work times and reminding you when you have been working for too long. Work can be divided into five different categories, with maximum work capping for each category. It maintains a running total to show you how long you are on your computer, and what you do most on it. In addition, Break totalises time at work, on break and away from the computer.
alarm, timer, assembly, countdown, health, coffee, sinner, rsi, work, logger,
AIM Log Manager 1.6.300
This is a unique and powerful tool to log, organize, and manipulate your AOL Instant Messenger conversations (AIM Triton supported), with powerful trend-analysis and organizational tools. AIM Log Manager also allows stealth monitoring, automatic compression, recording images and files from directly connected IMs, and recording AIM buddy events, such as buddies signing on/off.
aim, triton, log, manager, aimlogger, analyze, conversations, away message, im, logging,
The RAS Logger System 3
The RAS Logger System is a logging system for RAS (Dial-Up & VPN) and printers. Using The RAS Logger System you can view and analyse your traffic (including number of bytes transmitted, date etc) and also how many pages were printed on your printer. Thus, you can check your provider invoices and/or plan buying of new printer cartridges.
the ras logger system, ras, logger, printer, report, remote access, dial up, vpn, virtual private network, money,
Visual TimeAnalyzer for time tracking 1.4
Visual TimeAnalyzer is a richly illustrated reporting time tracking, timesheet and project management software. Track working time, pauses, projects, costs, software and Internet use. Easily log individual users or specific projects, and record detailed accounts of time spent within each program. The logger automatically monitors all activities on family?s PC or company?s network. Parents have control over their children's PC use.
time tracking, monitoring, activity, pc activities, track, monitor, working time, mon, observe, observer,
Inlook Express 2.0
Inlook Express allows you to spy on your computer by logging keystrokes and saving screenshots. You can see what other users do with your computer when you are not there to monitor them. Inlook Express can put your mind at ease by knowing what your children / spouse is doing online. It is free to try for a limited time only.
keystroke, log, logger, logs, keystrokes, parental, control, children, family, spy,
Browse Pages: 1