Sponsored Links:

Stop P-O-R-N

Stop P-O-R-N 8.4.4 updated

STOP P-O-R-N is a handy and easy to use application that can block the access to any pornographic material. It will protect your family or classroom from inappropriate material on the Internet. If inappropriate material is detected the web browser will...

TeenagerGoodnight allows parents to control what hours the computer should be shutdown. Parents choose the days and the hours the computer should be shutdown and how much warning should be given before a shutdown occurs. It also allows parents to...

HomeGuard

HomeGuard 2.2.4 updated

HomeGuard is an advanced parental control and activity monitoring tool for family and child safety online and offline. Once installed HomeGuard will silently and automatically block all pornographic and inappropriate content online and record detailed...

Sponsored Links:

WebLocker

WebLocker 1.2 updated

WebLocker is a free software created by TheYousSoft Corporation. It's a Web Blocker, Anti-Porn, Anti-DNS Leak, Connectivity Fixer. WebLocker is programmed to be compatible with most Windows version: XP, Vista, 7, 8, 8.1 and 10 (x86 & x64) and it's for...

Kid Browser protects your children from the internet while protecting your computer from your children. Customizable kid safe browser from toddler to teen. Protect your kids from the internet and protect your computer for your kids at the same time. So...

Toddler Keys is a useful tool for parents that allows you to lock your computer keyboard, CD drive doors, and power-off button. When the keyboard is used it will display images and play sounds every time a key is pressed, thereby preventing access to the...

Sponsored Links:

Control when your child can be on his or her PC. The Bedtime Monitor allows you to set how late they can be on and how early they can turn it on. The application allows you to bump up their bed time on special nights without changing settings. It has a...

XP Advanced Keylogger is a top-rated invisible easy-to-use surveillance tool that records every keystroke to a log file. The log file can be sent secretly with email or FTP to a specified receiver. It can also detect specific keywords and take a...