Sponsored Links:

HealthMonitor is the most comprehensive instrument for monitoring your business IT system. Twenty-five plug-ins keep an eye on your system and when the threshold values you set in your configuration are approached, will either notify you by e-mail, text...

Keylogger Spy is a key logger which allows you to find out what other users do on your computer in your absence. It is designed for the hidden computer monitoring and the monitoring of the computer activity. Keylogger Actual Spy is capable of catching all...

Winpooch

Winpooch 0.6.6

Winpooch is a Windows watchdog, free and open source. Anti spyware and anti trojan, it gives a full protection against local or external attacks by scanning the activity of programs in real time. Associated with ClamWin antivirus, Winpooch keeps safe your...

Sponsored Links:

OverSpy

OverSpy 2.5

OverSpy captures all online conversations, Web sites visited, passwords, all e-mails sent and received, all keystrokes typed, all computer operations and opened documents. The program takes screenshots every few minutes and will send reports to you by...

Secure Office is an affordable and compact monitoring solution, designed for local networks. It captures keystrokes typed Websites visited, chats from all popular instant messengers and makes screenshots. All user logs are stored on the admin's PC. You...

TML

TML 1.01

TML is a free software service that provide you with a extra defense against thiefs. As we all know, we may need all the stuff we can get our hands on to stop them. This service is free of charge and all you will have to do is to register on our Web site...

Sponsored Links:

IMMonitor

IMMonitor 2.3

Web Surfing Monitor, Monitor all Web surfing activities. Chat Monitor, monitor and archive all instance message conversations in your LAN, include AIM, ICQ, MSN, YAHOO. Email record, save all email messages automatically. Easy to deploy, one computer to...

ActMask HTTP Sniffer CE integrates with Internet Explorer to provide HTTP communication monitoring, without the need for separately configured proxies or network sniffers. It catches all HTTP communication requests (url address) between Internet Explorer...