System Security Internet & Network Multimedia Productivity Search | Forum |
![]() |
|
|
Click here to download Windows Live Toolbar for free.
iSpyNOW is the critically acclaimed, award winning remotely deployable computer monitoring application. iSpyNOW is first of its kind - offering users the ability to remotely monitor a machine via a web interface without ever having physical access to that PC. iSpyNOW 3.0 now sets a standard in the remote monitoring and surveillance market. No matter if the remote PC is online or offline, running a firewall our router configuration iSpyNOW 3.0 will record information secretly in complete stealth mode undetectable to any user! - As seen on TechTV, BBC World, Fortune Spytech SpyAgent is a powerful and easy-to-use software utility that allows you to log all keystrokes typed and applications launched. All logs are easily viewed with the built in log viewers and can be saved to a convenient, easily viewed text format. SpyAgent can be ran on windows startup in active monitoring mode with an optional splash warning screen. This allows you to have the option to let others using your workstation that they are being monitored (or not). A built in stealth mode is available to keep users from task-ending or knowing about SpyAgent. Screenshot
- WebAttack 5/5
Stars Editor's Pick Award Ever want to monitor your home PC from work? Want to monitor PC's across your corporate network from your web-browser? Do you want the ability to remote control, administrate, and monitor remote computers? SpyAnywhere is your solution! SpyAnywhere provides the power to remotely control computer's with SpyAnywhere installed - all from your favorite web-browser! SpyAnywhere allows many powerful controls for remote control, and also allows you to remotely monitor other computers.
- ZDNet Hotfiles: 5 star Editor's Pick e-Surveiller is a powerful user-activity monitoring, logging and management software package. With it, you can monitor the activities of computer users on standalone computers, on a local area network and on remote computers across the Internet. You view the screens of monitored users on a LAN or across the Internet in real-time! User-activity logs are also periodically transferred, uploaded or emailed to you for analysis and more! + Link: e-Surveiller Screenshot Screenshot Screenshot Screenshot Screenshot - TopShareware Editor's Choice Award HackerWacker Personal Edition is a premiere security product that monitors, logs and helps protect and control your PC in a shared environment such as work, home, or school. Logging Options feature logging of: keystrokes, URLS visited, file, system, and shell activity, windows activity, and a forbidden Word-Filter Echelon system totally admin-definable. Other advanced features include email notification of Word-Filtered log, screen capture options, sound, User Immunity list, Stealth Mode with one-key easy access, Disable Task keys or task button, Load with windows, Take Actions when Filtered Word is detected, Port Nabber trap-door Internet Scanner Logging and protection, Send URL Log to HTML file for analysis, and much more!
- TUCOWS 5 of 5 Cows Desktop Spy secretly takes pictures of your computer screen, records all applications loaded, web sites visited, chat conversations, E-mail activity, and anything else that is visible on the screen. You can take pictures of the entire screen or just of active Window and save the pictures in high quality or low quality JPEG format. This program could be useful for parents who want to know what their children are doing on the Internet or employers concerned about inappropriate use of company PCs. Screenshots can be taken many times per second, if your computer can go that fast, or as infrequently as once every few minutes or hours. Screenshots can be played back like a slide show, displayed frame by frame at the speed you choose. Desktop Spy has many built-in features to save processing memory and disk space. You can also set a password to this program to prevent other people from using it. Wiretap Pro is complete PC surveillance and monitoring software. It features screen snapshots, clipboard logger, password logger, key stroke logger, windows viewed log, applications log, documents accessed log, websites visited log, email capture, IM capture, and powerful filter service to block specific websites or applications. Wiretap Pro also has the ability to automatically email all logs, at scheduled intervals, to any email address you choose. + Link: Wiretap Pr Free Download Screenshot - FileTransit 5 Stars Rating Transforms PC into a burglar and fire alarm system. Monitors mouse and keyboard activity for uninvited intruders, plus utilizes computer's microphone to listen for fire and home alarms. Works with your web cam or inexpensive door mounted alarms to detect intruders in and around your home or office. Notifies you instantly via email, network messaging, pager or even dials a phone number and plays a pre-recorded sound file. EffeTech HTTP Sniffer is a HTTP packet sniffer, protocol analyzer and file reassembly software based on windows platform. Unlike most other sniffers, it is dedicated to capture IP packets containing HTTP protocol, rebuild the HTTP sessions, and reassemble files sent through HTTP protocol. Its smart real-time analyzer enables on-the-fly content viewing while capture, analyze, parse and decode HTTP protocol. Features:
+ Link: Screenshot Tutorial - SoftwareSeeker Editor's Pick Webcam Watchdog is a powerful software for monitoring your house, business or factory. You can setup Webcam Watchdog to initiate high performance recording when there's a motion detected. Webcam Watchdog can also alert you by emailing you the captured image and play the alarm sound. Webcam Watchdog also gives you 24/7 digital video recording. - PC Magazine Editor's Choice Award
Related Link: +
|
xStudio.ca does not responsible for any third-party software listed here. If you have concern or question about their software, please contact their vendor. The descriptions of the software may not accurately reflect up-to-date products information and should be checked again with vendor websites. All trademarks are owned by their respective companies.
Last modified: April 17, 2008
If you have any question, please feel free to use support forum.