Free Serial Port Monitor 3.31
Free software serial port monitor, Com Rs232 sniffer with communication packet data analyzer. This monitoring utility can spy, capture, view, analyze, test com ports activity performing com port connection and traffic analysis with data acquisition and control. You can use this system as device interface testing tool, modem data transfer viewer and so on.
Free Key Logger 2.0.43
Free Key Logger records everything that has been typed on a computer's keyboard. It works in two modes: normal and stealth. In stealth mode it is virtually undetectable!
Supreme Spy 2006
Supreme Spy Net Spy Software is the most affordable spy software download solution to secretly monitor computer activity including capturing keystrokes, programs, websites and screenshots! View the exact sequence of everything that occurs on the pc (keystrokes/programs/websites/screenshots in real time) using playback mode just like you would use a VCR! Capture Keystrokes, Passwords, instant messenger conversations, chat room conversations...
CommView for WiFi PPC 1.1 Beta
CommView for WiFi PPC is a special lightweight edition of CommView for WiFi that runs on Pocket PC handheld computers. This product is a cost-effective WLAN diagnostic solution designed for express wireless site surveys, as well as capturing and analyzing network packets on wireless 802.11b/g networks. CommView for WiFi PPC gathers information from the wireless adapter and decodes the analyzed data.
wireless, wi-fi, 802.11, wep, network, monitoring, sniffer, capturing, traffic, packet,
Mom Knows Best 3.0
Mom Knows Best is an easy way to restrict and monitor usage of your computer. Our logging features, keyword triggers and our manual white/black lists make Mom Knows Best a great solution for home or small business use. See whats being typed into any program, when its typed and by the user that typed it. Use keyword triggers to restrict a broad range of web sites quickly. Or restrict by domain and file rules.
control, monitoring, spy, parental, keylogging, access, password protect, log, system,
KGB Keylogger 1.21
KGB Keylogger offers you several integrated tools to monitor user activities. Log all key strokes, record clipboard entries and all web sites. All activities are secretly logged into a file, and supported with snapshots, time stamps, application names and window captions. You'll know all of the users activities minute by minute. See everything that was typed and also where and when it was typed. Can run in Stealth mode and report over email.
kgb, record, secret, keylogger, keystroke, recorder, spy, key logger, keystrokes, logger,
Advanced Invisible Keylogger 2.1.0
Advanced Invisible Keylogger is the most powerful stealth spy software offered by ToolAnywhere! Advanced Invisible Keylogger runs silently at the lowest level of Windows capturing every keystroke including usernames and windows log-on passwords. Advanced Invisible Keylogger can also capture active window text, text typed in all popular instant messengers including AOL, YAHOO, ICQ, MSN and AIM.
advanced invisible keylogger, active keylogger, free, free keylogger, best keylogger, spyware, monitoring, record all keystrokes,
Link Logger - Linksys WRT54G/GS 220.127.116.11
Link Logger is the leading professional firewall logging tool for the Linksys WRT54G/GS Routers. Link Logger helps you monitor your internet traffic including where, when and how your users are using the internet and what malicious traffic is attacking your network. Link Logger features include 20 different reports and graphs, attack/scan alerts, traffic history, and much more to help you understand and manage your network traffic and security.
linksys, wrt54g, wrt54gs, logviewer, traffic, logs, security, logging, tool, monitoring,
CommView for WiFi 5.4
CommView for WiFi is a special edition of CommView designed for capturing and analyzing network packets on wireless 802.11a/b/g networks. It gathers information from the wireless adapter and decodes the analyzed data. With CommView for WiFi you can see the list of network connections, IP statistics, and examine individual packets. Packets can be decrypted utilizing user-defined WEP or WPA-PSK keys and are decoded down to the lowest layer.
wireless, wi-fi, 802.11, wep, wpa, network, monitoring, sniffer, analyzer, traffic,
ScreenViewer is used for remote computer screen monitoring. It captures a remote screenshot whenever you want to view remote screen. It can also save the screenshot as a JPEG file. It consist of two parts: server and client. server is installed in remote computer, invisible. client is installed in your computer, then you can watch the screen of server. client supports multiple servers and you can watch multiple screens at the same time!
screen, view, remote screen, monitor, monitoring, capture, watch, viewer, remote monitoring, screenshot,
PC Activity Monitor (PC Acme) 6.4.1
PC Activity Monitor (PC Acme) is an ultimate invisible and undetectable easy-to-use monitoring and surveillance tool for both networked and personal PCs. It is professional software that captures all users activity on the PC. It is a powerful management tool for users and companies, which want to increase their productivity and profitability. This is the most remarkable security product for a computer you have seen.
security, monitoring, intelligence, access control, parental control, investigation, surveillance, detective, espionage, spy,
Internet Chat Monitor ICQ 1.2
ICQ Sniffer is a handy network utility to capture and log ICQ chat from computers within the same LAN. It supports messaging through ICQ server with format of plain text, RTF, or HTML. All intercepted messages are well organized by ICQ user with buddies and shown instantly on the main window. It provides rich-features report system to export captured ICQ conversations as HTML files for later analyzing and reference.
sniffer, icq, conversations, monitoring, report, messenger, aol, instant, msn instant messenger, aim,
COM Port Toolkit 3.7
COM Port Toolkit is an integrated serial communications testing toolkit. It sends user's data to and receives one from a device and records all transfers to a log. You can test equipments serial communications protocol by hand: feed it input, check the output. COM Port Toolkit can capture serial communications between the device and the software by using special serial port driver.
port, serial, toolkit, monitoring, monitor, software, download, data, analyzer, tool,
Anti-keylogger? is a dedicated anti-keylogging product. Unlike most other anti-spyware, Anti-keylogger? doesn't depend on signature bases ? just because it doesn't use them. Based solely on heuristic algorithms, it recognizes behavior of a spy program - and disables it instantly. Anti-keylogger? can protect even against "custom-made" software keyloggers, which are extremely dangerous - and very popular with cybercriminals.
anti-keylogger, antikeylogger, key logger, keystroke, spyware, snoopware, spy, hack, hacking, monitoring,
OverSpy captures all online conversations, web sites visited, passwords, all emails sent and received, all keystrokes typed, all computer operations and opened documents, and takes screenshots every few minutes. Total surveillance!
spy software, computer monitoring, surveillance, spy, monitoring,