SEARCH: Email Spy Monitor

POPcon PRO

POPcon PRO connects MS Exchange Server(tm) to POP3 and IMAP mailboxes. It acts as an e-mail collector that retrieves messages from POP3 mailboxes and delivers them to your Microsoft Exchange Server mailboxes according to the intended user found in the...

Platinum Hide IP

Use Platinum Hide IP to keep your real IP address hidden, surf anonymously, secure all the protocols on your PC, provide full encryption of your activity while working in Internet, and much more, all with the click of a button...

Keylogger Me

Keylogger Me is software tool for secretly monitoring computer users without their knowledge. The software operates in the computer's background so that only the person who installed the software knows it is running. And only you are able to access...

REFOG Employee Monitor

Enhance staff performance and ensure your security policies by installing employee monitoring product. Refog Employee Monitor intercepts and saves input, tracks open programs and files used, logs chats and messages in all popular IM programs, tracks all open Web pages,...

PC Screen Spy Monitor

Have you ever wondered what your spouse, kids or employees have been doing on the computer and Internet? Is your spouse engaging in online sexual conversation while you are asleep? Are your kids taking secret chat conversations with an adult...

WFilter Enterprise

Web filter, email filter, IM filter, p2p blocker ... all in one. WFilter is an internet monitoring and filtering software program that can help organizations to monitor and manage all Internet behaviors on their networks. You only need to install...

gPhotoShow Pro

gPhotoShow Pro is an easy to use make-your-own photo slide show or screen saver. It can display an unlimited number of images, video, panoramic images, flash animations (swf files) and web pages. gPhotoShow can also create professional looking standalone slideshows/screen...

REFOG Personal Monitor

Discipline employees and monitor actions of advanced computer users with REFOG Personal Monitor. The PC monitoring tool intercepts and logs keystrokes, cut-and-paste operations, records launched applications and Web sites visited by your employees or family members. Instant alerts by email...

QuartzDesk Lite Edition

QuartzDesk is an advanced Java Quartz scheduler management and monitoring GUI / tool with many powerful and unique features: * Support for Quartz 1.x and 2.x schedulers. * Persistent job execution history. * Job execution log message capturing. * Notifications...

Simple Shop

Simple Shop is a powerful and effective point of sale system that can handle every aspect of business management. It offers a variety of features including the adoption of RFID cards, universal support on any POS machine and a multi-language...

Syspectr

O&O Syspectr gives you a comprehensive overview of your Windows infrastructure. O&O Syspectr displays all relevant system information whenever you want to see it: hardware, software, level of usage and general condition of all hard disks, status of connections as...

FlippingBook Publisher

FlippingBook Publisher modern flip book maker for digital catalogs, online magazines, digital brochures with page flip animation. FlippingBook Publisher offers a wide range of possibilities for publishers, advertisers, web-designers, entrepreneurs and trainers: from creating stunning publications with page flip effect...

DNS Blacklist Monitor

DNS blacklist (DNSBL) monitor software is used to monitor your email server public IP address in DNS blacklist zones like zen.spamhaus.org and many others. Why you should use DNS blacklist monitor software Blacklist monitor software lets e-mail system administrators know...

Ocster Backup Business

This software is optimized for small businesses and was designed to work fully automatic. You simply specify what you want backed up and when and then the software takes care of the rest. The software offers a lots of great...

SniperSpy

Helicopter parenting for the millennial and big brother watching from rear often results in crippling teenagers and employees! There is a middle path which is monitoring their activity virtually, logging daily user activity, investigating wrongful Internet usage, objectionable conduct and...