Computer Surveillance Programs


Enum Programs  v.

Use this tool to quickly see what program is installed on a remote computer. Enum Programs will show you a list of installed software, exactly the same as what you would see if you ran Add/Remove Programs, on a remote PC.Requirements:
* NET Framework ...

Time Lock

Time Lock is a simple program, which allows to protect your computer against unwanted use. When the computer
is locked by the Time Lock software, nobody can access documents on your computer, run programs, browse on
the internet, etc. Time Lock ...


Quick Screen Note  v.1 2

When you are using a computer (Office programs, Internet, E-mail, photo...) and you wish to save your PC's screen with important information for future review, just push the PrintScreen button and the Quick Screen Note (QSN) program will make a screenshot ...

Internet Utility - Privacy Protector  v.3 10

Your computer is tracking all your activities. Every time you browse Internet, your activities are recorded by your own computer with programs like Internet Explorer, AOL and Netscape. That means anyone can touch your PC and see what web sites you visit, ...

IM Lock  v.2011.3.35

Using IM Lock you can block programs from running on your computer. These programs could include games, download programs, unwanted utilities, even spyware. You simply
enter in the .exe name of the program, and IM Lock will stop it from running.It ...

SystemSleuth  v.1.0

SystemSleuth is a feature rich computer surveillance program that secretly monitors all activity on your computer. You can view the encrypted logs locally or have them sent to any email account. SystemSleuth allows you to view emails, passwords, instant ...

CGOS  v.0.3.0

CGOS is a game playing server designed for Computer Go programs only. It was designed to address a need in the computer Go community - a way to test programs that play Go on a 9x9 board and also to get a rating for those programs.

NetTaskExec  v.1.3.5

NetTaskExec schedules programs and commands to run on local or network computers in the near future. You must have administrative privileges on the network computer and schedule service must be running in order to execute a command or computer program.

System Mechanic

System and registry clutter will degrade your computer's performance, leading to crashes, longer boot times, and system errors. System Mechanic combines over 40 powerful PC tuneup tools to clean hard drive clutter, repair your registry, defragment drives ...

Parental Control Program  v.

Computer monitoring software records keystrokes activities including typed text, document, user login and password, composed email etc performed by guest user on PC in your non-appearance. Best PC monitoring surveillance software tracks everything that ...

REFOG Terminal Monitor  v.

A surveillance software to monitor employee activities on the Terminal Server, prevent security problems and dictate how much time the users spend for work and for leisure. Ensuring staff compliance is the primary task of REFOG Terminal Monitor (http://www.

Free Internet Window Washer  v.3.6.1

As you work on your computer and browse the Internet, you leave behind traces of your activity.The Windows built-in functions will not protect you, most of the tracks can not be erased with them. Therefore, anyone else can see what you have ...

MonteCarlo Backgammon  v.

Monte Carlo Backgammon is a neural net based computer backgammon player which has learned to play backgammon by self play.

Training neural nets to evaluate backgammon positions is a process whose results speak for themselves. After all, almost ...

PortableStorageExplorer  v.1.3.3

Portable Storage Explorer displays remote network computer USB devices, removable storage, CD-Rom and DVD drive information and state, drive type, serial number, revision, device name, last cleaned time, device vendor and product name, operational state, ...

RemoteNetstat  v.1.3.4

Remote Network Statistics displays remote network computer IP, ICMP, TCP, UDP and Server statistics, shows the details about IP datagrams including forwarding enabled-disabled state , default time to live, the number of received datagrams, datagrams ...

Pages : 1 | 2 >
Newest Reviews