|
More tags: security, spy, keylogger, monitoring, stealth, key logger, surveillance, detective, parental, intelligence, access control, remote, internet, trojan, hack, hacking,
|
|
Stealth Keyboard Interceptor for Win NT/2000/XP |
|
|
Category : |
Utilities - Security |
|
|
|
Platform : |
WinXP, WinNT 4.x, Windows2000 |
|
|
Price : |
USD 69 |
|
|
Developer: |
|
|
|
Rating : |
|
|
|
License : |
Shareware |
|
|
Limitations: |
N/A |
|
|
Date : |
28/03/2007 |
|
|
Size : |
0.46 MB |
|
|
Software In :
Utilities
Security
security, spy, keylogger, monitoring, stealth, key logger, surveillance, detective, parental, intelligence, access control, remote, internet, trojan, ing,
|
|
|
Also See
1)
Encryption Xpert
Want to know what the easiest and the safest way to protect your data is? It's encryption. You can encrypt your files manually, as well as one hundred years ago, or using modern software. Encryption X...
License:Shareware USD 24.95
Size:0.92 MB
2)
VB AntiCrack
VB AntiCrack is used to make it more difficult to crack your programs written in Visual Basic 6.0. Most crackers will not be able to crack your program because they will not find a single text strings...
License:Shareware USD 39
Size:1.47 MB
3)
S.O.S.Automation
Baby - Medical monitor and alarm system. Implemented in software for a home PC. constantly monitor the surroundings and call you upon emergency. This is extremely useful for infants and dependent. Cal...
License:Shareware USD 18
Size:3 MB
baby alarm, security, pc alarm, home monitor, ils servers,
4)
CDDVD Lock
CD-DVD Lock is intended for restricting read or write access to removable media devices such as CD, DVD, floppy and flash, as well as for restricting access to certain partitions of hard disk drives. ...
License:Shareware USD 29
Size:0.92 MB
5)
WinDentify
Windentify is a voice biometric source code for desktop clients. Visit www.windentify.com for live server demo. Includes fully working voice verified windows logon. Now start your machine with your vo...
License:Shareware USD 29
Size:8.77 MB
6)
Outlook Express Protector
Outlook Express Protector is designed for controlling access to Outlook Express and its e-mail and address data bases. It does not encrypt protected files and folders, however no programs can get acce...
License:Shareware USD 29
Size:0.62 MB
7)
IDFile
File verification utility, uses SHA-2 algorithm....
License:Freeware USD 0
Size:0.22 MB
8)
CHAOS Public Key
CHAOS+PK uses the newest chaos. It is high speed and allows variable-length keys, making protection very reliable and suitable for use in working. Uses the Public Key for encryption CHAOS keys by send...
License:Shareware USD 59.95
Size:0,4 MB
9)
ANTITHIEFWARE
ANTITHIEFWARE is a program that eliminates all adwares, spywares, viruses, Dialers, and hijackers that might exist on your PC. ANTITHIEFWARE is a program that uses a database with tens of thousands fi...
License:Shareware USD 29.99
Size:0.45 MB
10)
asquared HiJackFree
a-squared HiJackFree is a detailed system analysis tool which helps advanced users to detect and remove all types of HiJackers, Spyware, Adware, Trojans and Worms. Manage all types of Autoruns on your...
License:Freeware USD 0
Size:1.54 MB
Tags: spyware, browser, tools, adware, toolbar, scripts, virus, trojan, malware, worm, dos, horse, worms, viruses, trojan horse, objects
|
1)
FileLink
Unix users know and love it, now Windows users have the ability to give a single file multiple names. If you have the existing file C:\DOCS\FILE.DOC and execute the command FileLink C:\MEMO\ANOTHER.DO...
License:Freeware USD 0
Size:0.04 MB
2)
Quick Free Keylogger
WideStep Software presents light and affordable monitoring utility – Quick Keylogger that supports 64 bit Windows as well as other OS. Simple download and deployment guarantees a smooth start of you...
License:Freeware USD 0
Size:0.84 MB
3)
Flash File Recovery
Need a sure solution for recovering lost, corrupted or accidentally deleted photographs? Flash File Recovery is a 100% risk-free application that salvages images from digital cameras or flash memory c...
License:Shareware USD 49.50
Size:0.9 MB
image recovery, file recovery, flash recovery, file, restore, undelete, unformat, flash, card,
4)
Virtual Drive Creator
Create Virtual Drives from long paths, it's easy! Type the full path or (even easier) browse to the path via the Drive and Folder Lists. Choose a drive letter from the "Available Virtual Drive Letters...
License:Freeware
Size:0.39 MB
5)
1Click Spam Shield
1 Click Spam Shield is the solution for eliminating one of the biggest threats of the mailing systems: spam. With this utility, you are receiving all your email safely and securely, all filtering bein...
License:Shareware USD 29.95
Size:5.34 MB
6)
SmokingGun.Net: Keylogger and More
Now with FREE WEB ACCESS to log files! Easy to use internet monitoring & parental control software effortlessly records all activity on the PC and helps protect children when they go online and surf t...
License:Shareware USD 19.99
Size:.6 MB
7)
Active Desktop Wallpaper
Transform your desktop to an exciting picture gallery. Three wallpaper change modes available: manual, cycling or around-the-clock list. Create list of wallpapers easily, add pictures and text to any ...
License:Shareware USD 14.95
Size:1.36 MB
8)
DocPad
DocPad is a superior alternative to Notepad. Although it fills the same role, plain text editing, it has many advantages: 10-level undo, alphabetization, block indent/unindent, bookmark, case conversi...
License:Freeware
Size:3.45 MB
9)
MailScan 4 for Mailtraq
MailScan 4 for Mailtraq is the world's first out-of-the-box, e-mail virus and content scanner for the Mailtraq Mail Server. This server is published by Fastraq Limited. MailScan for Mailtraq (MSMT) ac...
License:Shareware USD 209
Size:10.78 MB
10)
OVvAssistent
Der Gesetzgeber verpflichtet jede Organisation (Unternehmen, Vereine, Verbande usw.), die personenbezogene Daten verarbeitet und unter den Anwendungsbereich des Bundesdatenschutzgesetzes (BDSG) fallt,...
License:Freeware USD 0.00
Size:0.27 MB
|
|
More tags: security, spy, keylogger, monitoring, stealth, key logger, surveillance, detective, parental, intelligence, access control, remote, internet, trojan, ing,
|
|