SEARCH: pc activity monitoring

Ultimate Keylogger

Ultimate Keylogger is powerful all-round monitoring solution. Application monitors all activities on computer systems including applications, keyboard, passwords, clipboard, chat, email, and visited websites. To avoid tampering of the software, it features a unique file protection. Ultimate Keylogger is completely...

Servers Alive

Servers Alive is your 24/7 automatic server monitoring solution for guarding against server and process failures or attack. Script your own tests plus use our built-in functionality to automatically monitor critical server functions and processes including: PING (ICMP/TCP and IPX),...

Sentry-go Plus!

Sentry-go is a low cost, expandable, network-efficient monitoring solution for Windows. With it, you purchase & plug in the monitoring components you need for your server - add features to an existing Sentry-go Quick Monitor or build complete customised monitoring...

PC On/Off Time

All time tracking software requires an agent that needs to run in the background all the time. This slow down the computer. Furthermore you have to install the time tracking software first, then you have to wait days and weeks...

Keylogger Me

Keylogger Me is software tool for secretly monitoring computer users without their knowledge. The software operates in the computer's background so that only the person who installed the software knows it is running. And only you are able to access...

PC Screen Spy Monitor

Have you ever wondered what your spouse, kids or employees have been doing on the computer and Internet? Is your spouse engaging in online sexual conversation while you are asleep? Are your kids taking secret chat conversations with an adult...

Leak Blocker

Leak Blocker prevents data leakage from corporate computers using removable devices. It can be used to achieve two main goals: restricting the use of external devices and activity monitoring (including file access actions). In addition Leak Blocker can allow only...

LAN Employee Monitor

LAN Employee Monitor - LAN monitoring software, an employee monitoring tool. This security LAN monitoring software monitors the screens of all employees? computer in real time by matrix screen. And it can remote control the employee's PC activity as easily...

232Analyzer

Software RS232/RS485/RS422/TTL Serial Port Monitor / Terminal / Protocol Analyzer / Debugger - control, monitor, debug, log, spy, sniff, capture, view, analyze, and test serial ports activity. It allows communication logging (c/w timestamps in millisecond) between serial devices using serial...

Ability FTP Server

Ability FTP Server incorporates many advanced features, all of which are accessible through an easy to use interface. This flexible FTP server is designed to suit almost any setup and usually only takes a couple of minutes to configure. Offering...

Vallum Halo Manager

Vallum Software is a provider of enterprise end point management solutions. The Vallum Halo Manager is a web based enterprise network monitoring solution. Vallum Halo is a simple install that will automatically discover all devices and immediately provide availability data...

GlassWire

GlassWire helps protect your privacy & security by monitoring your network activity for suspicious activity. You'll be shocked by how many applications on your computer are sending your private data over the Internet without you knowing. Once suspicious activity is...

SniperSpy

Helicopter parenting for the millennial and big brother watching from rear often results in crippling teenagers and employees! There is a middle path which is monitoring their activity virtually, logging daily user activity, investigating wrongful Internet usage, objectionable conduct and...

Defender Pro Ultimate

Defender Pro Ultimate is an antivirus and online security software solution that provides the ultimate security solution for every PC user. Defender Pro Ultimate, is much more than a simple antivirus program, as it offers customizable features to each user...

Computer Monitor

Secretly monitor all activity on your computer, capturing keystrokes, programs, internet explorer websites and screenshots. Completely invisible and easy to use, all information captured is stored in an encrypted log file. The log file can be sent secretly at scheduled...