Monitoring software that runs invisible and records how your employee, child or spouse uses computer. Activity Logger invisibly records to the log file Internet surfing URLs, key strokes in email, chats or any application, programs user runs and work duration in every application, takes screenshots.
ENavigator for Epicor Enterprise is an operational dashboard for monitoring and analyzing CRM/ERP activities. Business ActivityMonitoring Alerts, Charts, and Tickers * Several pre-built BAM components for monitoring enterprise performance in real-time.
134. Activity Logger educational Monitoring software that runs invisibly and records how your child, spouse or employee uses computer. Activity Logger invisibly records to the log file visited websites, keystrokes in email, chats and all application, programs user runs and work duration in every application, takes screenshots. DetailsBuy now ($39.95) Find similar
Platform: Windows 95, Windows NT, Windows 2000, Windows XP, Windows 98, Windows ME, Windows Server 2003
Vendor: Deep Software Inc.
136. 2Spy!
Can: * Log everything you type (even non character keys), and do: applications you use, sites you visit on the Internet, mails you write, games you play, music you listen to and many more... * Monitor Dial-Up connections and show detailed info such as user's login name, host name, dial number, IP adresses etc... * Monitor process creations and terminations and allows to intercept them... * Capture silently your desktop or active window and save it as an image onto disk * Add time stamps to all events * Log every caption in the active window title bar as well as text on all controls * Stay totally invisible from the user: it is invisible in the task list, in the task bar notification area and system tray * Save everything to log file that can be located in any folder you like. DetailsDownload trial (Demo: 714 KB) Buy now ($15.00) Find similar
Platform: Windows 95, Windows 98, Windows ME
Vendor: Juric Zoran
One particularly scary and dangerous feature of all spy software is recording of computer user's keystrokes for the purpose of monitoring computer activity. Especially developed unique protection algorithm of our anti-hacker program will block operation of such keystroke monitoring feature for all spy software, both known and unknown.
138. MailDetective for MDaemon - Unlimited mailboxes
MailDetective for MDaemon is a cost-effective monitoring solution for network email usage. With MailDetective you can see the distribution of incoming and outgoing email traffic by users of your local network. MailDetective provides network administrators and IT managers of organizations running the MDaemon mail server with the information they need to prevent email abuse and enforce consistent enterprise-wide email usage policy. DetailsDownload trialBuy now ($499.00) Find similar
Platform: Windows 95, Windows NT, Windows 2000, Windows XP, Windows 98, Windows ME
Language: English, German, Russian
Vendor: ADVSoft
PC ActivityMonitor Standard (PC Acme Standard) is designed for monitoring user's PC activity. All data collected by the monitoring are saved to the encrypted log file located on the user's machine. Monitoring program works in background, transparent for the user, on the level of OS kernel.
ENavigator for Epicor Enterprise is an operational dashboard for monitoring and analyzing CRM/ERP activities. Business ActivityMonitoring Alerts, Charts, and Tickers * Several pre-built BAM components for monitoring enterprise performance in real-time.
Active Caller ID is an easy-to-use application which includes powerfull features like monitoring and logging the incoming phone calls, audio/visual notifications of incoming calls (OSD), name lookup using the built-in XML-based database, user defined group actions, e-mail notification, network support, auto hang up feature, fast phone number dialing and many other features.
DetailsBuy now ($16.95) Find similar
Platform: Windows 95, Windows 2000, Windows XP, Windows 98, Windows ME, Windows Server 2003
Vendor: Active Dimensions
Safe'n'Sec monitors all malicious actions of applications and external activities that pose a threat to user data and/or system integrity. Safe'n'Sec constantly monitors the system and activities of running applications using special algorithms and methods that provide fast decision making and yield few false positives.