Sponsored Links:

Adieux Defense System (or just Adieux) is a file monitoring mechanism that will monitor your computer's processes and services running. With a vast number of ideas for future development of Adieux, there is a wide range of useful ways to take advantage of...

ADS Scanner

ADS Scanner 2.0.1

ADS Scanner searches through your drives and lists all the files that have Alternate Data Streams attached. You can then remove all or some of the streams found. ADS are hidden files that are attached to visible ones. They are not visible in Explorer and...

Advanced Email Monitoring is e-mail monitoring software. It allows you to record and forward incoming and outgoing emails, including web-mail services like Hotmail and Yahoo mail. Advanced Email Monitoring allows capturing incoming emails of POP3-based...

Sponsored Links:

AgenteX9

AgenteX9 3.0.0.5

Totally invisible and imperceptible spyware that monitors the keyboard recording into a log file everything that was typed on the keyboard of the computer. Filters URLs and content prevent access to undesirable sites. Monitoring the main browser "Internet...

AlarmDisk 2 provides a much-needed layer of security for systems running PATA and SATA drives. This new, exciting release performs real-time monitoring of many system features and displays important system information in a clear and easy-to-use format. A...

Alert Watch - Kids & Teens, providing an economical way for YOU to see what your child is seeing and doing when they're on the computer and online. With Alert Watch - Kids & Teens, you can see what web pages your kids visit, what they type, the pictures...

Aloaha MailAndArchive is a great email archiving solution which integrates into any existing mail infrastructure - be it MS Exchange or any other Mail Server. It gives you all the business benefits of email archiving without the setup and running costs...

Sponsored Links:

Protect your computer against hackers with Anti Hacker, a powerful hacker and rootkit detector. With Anti Hacker's state-of-the-art threat detection algorithms, it can find dangerous threats hiding in your computer such as rootkits, key loggers, trojans,...