|
More tags: keylog, keylogger, monitor, free, surveillance, remote, stealth, spy, e-mail, email, activity, report, record, log, invisible, spouse, child, control, parent, ,
|
Category : |
Utilities - Security |
|
|
|
Platform : |
Win95, Win98, WinME, WinNT 3.x, WinNT 4.x, WinXP, Windows2000 |
|
|
Price : |
USD 0 |
|
|
Developer: |
|
|
|
Rating : |
|
|
|
License : |
Freeware |
|
|
Limitations: |
N/A |
|
|
Date : |
10/08/2004 |
|
|
Size : |
0,40 MB |
|
|
Software In :
Utilities
Security
keylog, keylogger, monitor, free, surveillance, remote, stealth, spy, e-mail, email, activity, report, record, log, invisible, spouse, child, control, parent,
|
SC-KeyLog is a powerful, invisible keylogger that captures all users activity and saves it to an encrypted logfile. The software logs all typed keystrokes, button mouse-clicks, window titles, the date and time of entered characters/mouse-clicks, system information and logged on usernames in stealth. An optional mailing feature allows you to automatically send the logfile to a specified email address on a user defined interval. Use this tool to: Find out what is happening on your computer while you are away, to maintain a backup of your typed data automatically, to spy on others or use it to monitor your kids. SC-KeyLog is highly customizable, easy to use and creates exceptionally small custom keylogger engines of only 33 KB in size! Create as many keylogger engines as you like and deploy them on remote systems with ease. The software works on Windows 95/98/ME/NT/2000/XP.
温馨天气Secta Building Services LtdDA42 NGAviation Fuel Weight CalculatorGuide to Wii Sports - FREERanma 1/2 Memory GameEventManagerSwipe Scans galleryArcheAge Labor PointsBierstüberl Möllbrücke
|
|
Also See
1)
Encryption Xpert
Want to know what the easiest and the safest way to protect your data is? It's encryption. You can encrypt your files manually, as well as one hundred years ago, or using modern software. Encryption X...
License:Shareware USD 24.95
Size:0.92 MB
2)
VB AntiCrack
VB AntiCrack is used to make it more difficult to crack your programs written in Visual Basic 6.0. Most crackers will not be able to crack your program because they will not find a single text strings...
License:Shareware USD 39
Size:1.47 MB
3)
S.O.S.Automation
Baby - Medical monitor and alarm system. Implemented in software for a home PC. constantly monitor the surroundings and call you upon emergency. This is extremely useful for infants and dependent. Cal...
License:Shareware USD 18
Size:3 MB
baby alarm, security, pc alarm, home monitor, ils servers,
4)
CDDVD Lock
CD-DVD Lock is intended for restricting read or write access to removable media devices such as CD, DVD, floppy and flash, as well as for restricting access to certain partitions of hard disk drives. ...
License:Shareware USD 29
Size:0.92 MB
5)
WinDentify
Windentify is a voice biometric source code for desktop clients. Visit www.windentify.com for live server demo. Includes fully working voice verified windows logon. Now start your machine with your vo...
License:Shareware USD 29
Size:8.77 MB
6)
Outlook Express Protector
Outlook Express Protector is designed for controlling access to Outlook Express and its e-mail and address data bases. It does not encrypt protected files and folders, however no programs can get acce...
License:Shareware USD 29
Size:0.62 MB
7)
IDFile
File verification utility, uses SHA-2 algorithm....
License:Freeware USD 0
Size:0.22 MB
8)
CHAOS Public Key
CHAOS+PK uses the newest chaos. It is high speed and allows variable-length keys, making protection very reliable and suitable for use in working. Uses the Public Key for encryption CHAOS keys by send...
License:Shareware USD 59.95
Size:0,4 MB
9)
ANTITHIEFWARE
ANTITHIEFWARE is a program that eliminates all adwares, spywares, viruses, Dialers, and hijackers that might exist on your PC. ANTITHIEFWARE is a program that uses a database with tens of thousands fi...
License:Shareware USD 29.99
Size:0.45 MB
10)
asquared HiJackFree
a-squared HiJackFree is a detailed system analysis tool which helps advanced users to detect and remove all types of HiJackers, Spyware, Adware, Trojans and Worms. Manage all types of Autoruns on your...
License:Freeware USD 0
Size:1.54 MB
Tags: spyware, browser, tools, adware, toolbar, scripts, virus, trojan, malware, worm, dos, horse, worms, viruses, trojan horse, objects
|
1)
Active Boot Disk
Active Boot Disk Professional combines six powerful tools that let you recover your lost data, reset Windows passwords, make computer system backups and securely erase data. Active Boot Disk is used f...
License:Shareware USD 79.95
Size:3.25 MB
2)
SplitMe
SplitMe, is an universal binary file splitter and self-rejoin exe generator. Meaning that you may split any file type into smaller pieces in order to fit on floppy, cdrom, e-mail or other media type w...
License:Shareware USD 14.95
Size:0.65 MB
3)
My Privacy Total
Analyze your privacy vulnerability! My Privacy Total is a software application intended for probing the confidential information stored on your computer on its vulnerability to unauthorized access by ...
License:Shareware USD 39.95
Size:1.59 MB
online privacy, ensure personal privacy, private info, anti spyware, anti adware,
4)
PasswordsPro
The range of hashes supported include: MySQL, MySQL5, DES(Unix), MD4, MD4(HMAC), MD5, MD5 (HMAC), MD5(Unix), MD5(APR), SHA-1, SHA-1(HMAC), SHA-256, SHA-384, SHA-512, Domain Cached Credentials, Haval-1...
License:Demo USD 60
Size:1.14 MB
5)
EZ Backup Outlook Basic
EZ Backup Outlook Basic makes it easy to backup your Microsoft Outlook mail, address book and settings (PST Files) to any local, network or removable drive. The application creates a self-restoring ba...
License:Shareware USD 9.95
Size:2.6 MB
6)
QuickNote
QuickNote is a handy little program which makes it easier to write the same pieces of text over and over again. It stores text documents in an easy-to-browse interface and allows you to copy them into...
License:Shareware USD 14.95
Size:1.02 MB
7)
PCISniffer
Areas of Use # PCI device detection for PCs # vendor and device names in plain text # displaying PCI configuration data # detecting PCI resource conflicts New in version 1.5: # Storing PCI data to flo...
License:Freeware
Size:1.03 MB
8)
Browser Hijack Recover(BHR)
Browser Hijack Recover(BHR) is a safe and easy-to-use tool that recovers your browser after it has been hijacked by Spyware, Adware, Hijackware and Other Pests. Browser Hijack Recover(BHR) wills scan ...
License:Shareware USD 29.98
Size:2.34 MB
9)
ClickBook
ClickBook, a powerful yet easy-to-use printing utility, lets you print customized day planner pages, wallet booklets, brochures, greeting cards, catalogs, banners, posters, microfiche, and more from I...
License:Shareware USD 49.95
Size:7.94 MB
10)
Tray Expert
Tray Expert 3 is a desktop application that allows you to launch your favorite programs, music, pictures, games, and websites from a skinnable menu that pops up next to your clock at the bottom-right ...
License:Shareware USD 4.95
Size:0.28 MB
Tags: windows, desktop, menu, launcher, organize, task, launch, skins, expert
|
|
More tags: keylog, keylogger, monitor, free, surveillance, remote, stealth, spy, e-mail, email, activity, report, record, log, invisible, spouse, child, control, parent,
|
|