Spytector is the ultimate invisible and undetectable keylogger (keystroke logger) that completely satisfies your PC monitoring and surveillance needs. Spytector keylogger is undetectable even for advanced users! Official website: www.spytector.com
Stealth Keystroker is an undetectable keystroke logger (keylogger) software which allows you to secretly record all activities of computer users and automatically deliver the logs to you via Email or FTP. See more at www.key-stroke.com
Ultimate Keylogger Free Edition is advanced freeware all-round monitoring solution. It runs in the background and monitors all typed keystrikes, applications, passwords, clipboard, email, and visited websites' URLs. You can view the reports ...
Freeware Keylogger is a completely free award winning monitoring application. It runs in the background and allows you to monitor all keyboard activities performed on your PC, visited websites, e-mail, chat, openned application and files. ...
Erase history, cache (temporary Internet files), recycle bins, cookies, typed URLs, auto-complete addresses. Using Save/Restore State capability you are able to leave the computer in exactly the same state as it was.
UnHackMe is specially designed to detect and remove Rootkits. UnHackMe is the first BootWatch Antirootkit, that uses unique detection method.
PDF Password is advanced and extremely fast password recovery, decryption and restrictions (print, copy, edit, etc.) removal tool for .pdf documents. All standard .pdf encryption methods are supported upto the latest used in Acrobat XI.
Quick Recovery gives immaculate availability of recovery and restoration possibilities for MAC OS, where it is abundantly responsible for retrieving MAC disk files and other user files. Free trial version gives manifested environment to layman.
DefenseWall is the easiest way to protect yourself from malicious software when you surf the Internet! Using next generation proactive protection technologies, it creates the strong protection against all malware.
Feature-rich disc burner studio to burn music CD, data disc, video DVD and disc images! Just click some buttons to backup and burn!
WinMend System Doctor is a Windows-based security application. With its innovative, intelligent detection engine, WinMend System Doctor can effectively detect and fix security vulnerabilities in the system.
With many risks out there on the Internet, a powerful intrusion prevention system is an essential to have installed on any computer. Protecting your computer from malicious attacks, DefenseWall Personal Firewall is effective and easy to use.
Amac Keylogger for Mac OS X secretly records typed keystrokes, passwords (pro edition), visited websites, IM chat contents, desktop screenshots and email sent. Amac Keylogger for Mac OS X automatically sends logs to your Email/FTP at preset interval.
Free Undetectable Keylogger is an easy-to-use monitoring tool. It allows you to investigate everything that happens on your PC. The program works on all Windows systems.
A-PDF Password Security Service is a windows service program which is running in the background. The service monitors folders you specified. As PDF files written in the folders, their password sercurity will be changed according your settings.
Aobo Mac OS X Keylogger is an invisible Keylogger for Mac OS X with multiple-user support. Aobo Mac Keylogger stealthily records Keystrokes, Websites, Chats, Screenshots and IP address. It also sends logs to Email box or uploads logs to FTP space.
The only Mac Keylogger that records passwords. Aobo Mac OS X Keylogger Pro is the best keylogger spy software for recording keystrokes typed on Mac OS X machine. It records keystrokes on any applications and send the logs to you by email/FTP.
SPYOME lets you monitor your network. The software keeps a log of all the keystrokes which you type besides capturing the screenshots of each activity. SPYOME records passwords, emails,...
A security application that makes networks safer and administrators' life easier. Remote Administrator helps quickly configure remote WinLock clients, lock remote workstations, and apply security profiles by means of easy-to-use interface.
WinLock Professional is a powerful security solution that lets you restrict access to various computer resources.
Power Spy secretly logs Facebook, keystrokes, chats & IMs, emails, web visits, video talk, logins, passwords, applications, searches and more. It also takes screenshots like a surveillance camera. Automatically sends log reports to your email.
WinLock is a comprehensive security software for personal or publicly accessible computers. It is a program that ensures that only authorized people can access sensitive information on your computer.
Computer Spy Pro software secretly logs all keystrokes, chats, emails, web sites and more. It takes screenshots like a surveillance camera. It displays exact activities, like MySpace, Facebook, PC games, online searches & shopping and webmails.
Remove Fake Antivirus is used to remove ThinkPoint, Antivirus 7, Security Central, Security Antivirus, Total PC Defender 2010, Vista Antivirus Pro 2010, Security tool, Your PC Protector, Vista Internet Security 2010 etc from your computer.
SpamAssassin in a Box is a powerful and reliable spam filter for Windows. Beside the famous e-mail filter SpamAssassin, it also contains a Windows system service, making SpamAssassin controllable via the Windows Service Control Manager.
Wallet Cloak is a robust security application designed to encrypt and hide cryptocurrency wallets within image files.
Employee Monitor Spy secretly logs your employees' PC & internet usage during their work hours. It lets you exactly what they type on PC keyboard, web sites they visit, who they talk to online and the content of their conversation.
Easily investigate all the web pages and images that someone has viewed. This program will succinctly show the web page title, date/time it was viewed, and thumbnails of all the images viewed. As an added convenience, it searches for cache folders.
File Monster completely erases files from your system -- actually overwriting the information in the file so it can not be recovered. It can even erase pesky hidden files, system files, and read-only files.