Search Software:      

  

Free Programs Downloads

 

Computer Monitor Keylogger

Secretly monitor all activity on your computer, capturing keystrokes, programs, internet explorer websites and screenshots. Completely invisible and easy to use, all information captured is stored in an encrypted log file. The log file can be sent secretly at scheduled intervals to any specified email address. All activity in Internet Explorer can be monitored, and webpages are cached for viewing offline. Screenshots can be taken at given intervals, capturing everything that is currently on the screen. Monitor your computer while you are away, retrieve lost information, monitor your childrens activity, and much more! Capture keystrokes, even passwords! Capture programs used Capture websites in Internet Explorer Capture screenshots Encrypted log file Secretly email log files Invisible "Stealth Mode" Unique playback mode lets you view captured keystrokes/programs/webpages/screenshots in real time Run silently at startup Auto-capture at startup Does not Contain any Adware, Spyware, or other Third Party Software. A brandable (a.k.a. Private Label) version of this software, with full resell rights, is available at www.rebrandsoftware.com.

keylogger surveillance monitoring secretly monitor activity computer

Expired Domain Sniffer

Find expired domain names by browsing the internet, searching yahoo/google, and much more. Expired Domain Sniffer is really lots of programs in one! Many other software sellers have separated these functions into different programs, but our Expired Domain Sniffer combines them all into one program! Domain Name Manager: All domain names found throught the program are added to the domain name manager, which sorts domain names by length. Browse for domain names: A browser just like Internet Explorer, which looks through any page you view for domain names and checks to see if they are expired. Domain Name Creator: Enter a base word, and the software will create and check the availability of thousands of domain names. Yahoo and Google Searches: Given a search term, the program will automatically search through yahoo and google looking for expired domain names. All Two, Three and Four letter domains: The program will search for all two, three or four letter domain names. Full Word List: A list of millions of potential domain names, which can be checked for availability. Custom Word Lists: The software includes lots of word lists, from computer terms to business words, to entire dictionaries, which can be checked for availablity, or you can create your own wordlists to scan! Just put one word or domain name on each line of a text file. Does not Contain any Adware, Spyware, or other Third Party Software. A brandable (a.k.a. Private Label) version of this software, with full resell rights, is available at www.rebrandsoftware.com.

domain names expired domains domain expired find expired domain names yahoo google other

See Whos Linking

There are thousands of reasons you might want to know who is linking to you, but most web-based statistics programs only show you a small number of referrers and don't properly handle complex links with ?'s and &'s in them. Worst of all, when you click a link in your web-based stats program, it puts the URL of your administrative section into other people's log files, opening the door to hackers if your site isn't protected properly! This software fixes these problems. It makes it easy to see who is linking to you, what they are linking to, and doesn't leave footprints behind that allow hackers into your admin section. Handles multiple log files at once Removes internal links that originated from pages on your website Lets you browse directly to the pages that are linking to you using the in-program browser Removes duplicate links Generates statistics about the sites that are linking to you The branded version of this software will display your webpage every time it is run! Does not Contain any Adware, Spyware, or other Third Party Software. A brandable (a.k.a. Private Label) version of this software, with full resell rights, is available at www.rebrandsoftware.com.

referers referrers reciprocal links link popularity scan log files see which other websites

Webmaster Color Picker

If you've ever tried to select a color scheme for your website, you know it can be difficult. Not only do you have to choose matching colors, but you have to convert them into different representations like HEX or RGB to use them. Now you can use this Photoshop-like color picker to help choose colors for your websites, programs or office applications. It displays HTML, RGB, VB and Decimal color codes for each selected color. You can see the last 18 colors you have selected in order to pick the colors that match best! Select from millions of colors! 18 color history lets you see how colors match! Displays colors in RGB, Decimal, VB and HTML color codes! Templates for 256 web-safe colors! Save your colors to the program pallette to use them later! Does not Contain any Adware, Spyware, or other Third Party Software. A brandable (a.k.a. Private Label) version of this software, with full resell rights, is available at www.rebrandsoftware.com.

color picker color converter rgb decimal vb colors compare colors photoshop pick compare colors convert

PromiScan

PromiScan is a renowned sniffing node detection tool and has been used worldwide ever since its release. Promiscan is one of the tools mentioned in the 2003 SANS/FBI Top 20. PromiScan 3.0 (commercial version) has improved its monitoring capabilities by providing continuous monitoring to detect promiscuous applications starting and ending without increasing the network load. Today, many examples of information leaks from corporations can be seen in recent headlines and potential network sniffing by malicious insiders could represent a significant threat to many corporations. Network sniffing enables listeners to listen in on all network communications and to obtain passwords to gain unauthorized access to a server, which could result in divulging mission-critical corporate data. Still, no effective measures to prevent network sniffing have been implemented to date. By simply activating sniffing software, an individual with malicious intent can passively accept all packets, regardless of their destination addresses, without sending any suspicious packets. For this reason, it's extremely difficult to detect sniffers. PromiScan 3.0 is an innovative application software for remotely monitoring computers on local networks to locate network interfaces operating in a promiscuous mode that illegally accepts all packets. PromiScan 3.0 continuously monitors traffic to detect sniffing programs starting and ending and alert the administrator. By installing PromiScan 3.0, you can detect network sniffing immediately and can even prevent potential sniffing activities by people inside your intranet.

sniffing sniffer detecting detection detector monitoring monitor eavesdropping wiretap packet capture promiscuous mode

LanHelper

LanHelper is a particular network management utility. It can make your network management more easy. No any extra server program is required to be installed. LanHelper scans network at high speed and retrieves the abundance of network information. The information includes computer name, IP address, MAC address, workgroup name, user name, OS type, server type, comment, shared resource, etc. The scan engine can even detect the access to shared folders, which helps you to find writable, read-only or password-protected shared folders. Without installing any server program, you would find the network management is easier by using the program. Remote Wakeup sends the Wake-On-LAN commands to power on the machines on LAN or WAN. Supports schedule. Remote Shutdown shuts down or reboots the remote machines through local network. Supports schedule. Remote Execute enables you to execute command, run program or open other files on remote computers. For example, make the remote computer open an URL or just play an MP3 song. When the LanHelper Integrated Command is used in Remote Execute, you can even make the remote machine perform many operations such as lock computer, capture screen, get system information, manage process and more, even if the machine is located outside your local network. Refresh Status verifies whether machines are online or not, and detects whether the computer names or the IP addresses have been modified or not. Send Message sends messages to users, computers, workgroups, the whole LAN or range of IPs in a flexible way. The scan results are saved to XML file. The saved XML file can be used in other programs supporting XML. It will be converted into HTML table, which is more convenient for viewing, when you open it in browser.

wake-on-lan lan scan ip shutdown remote online detect status control lock execute

Quick Keylogger

Quick Keylogger - Perfect Invisible Family Keystroke Logger for PC surveillance! Software for PC surveillance has become extremely popular recently, additionally, it is really important for many users and PC owners. Quick Keylogger is a very powerful and easy to use solution for PC surveillance. Quick Keylogger is easy-to-use, very simple and small. Quick Keylogger is extremely compact, still being award-winning tool. With Quick Keylogger you can easily record all keystrokes, the time they were made and the application where they were entered. It works in the absolutely stealth mode and is completely undetectable spyware: you will not see it in processes list, registry, Add/Remove Programs utility, anywhere. Quick Keylogger includes what many consider to be the BEST key logger engine on the market, saving keystrokes by application, by date and time, it will capture absolutely all keystrokes, all buttons pressed in your system. Quick Keylogger will record all keystrokes typed secretly, completely undetectable to the user! Quick Keylogger remains hidden from any user, on any Windows computer, offering a complete surveillance and monitoring solution that is easy to use no matter what your computer skill levels are! Quick Keylogger is the best solution for both: computer pundits, medium-level and computer-illiterate users. With Quick Keylogger you can secretly capture usernames, logons and passwords in complete silence, without being detected. You will know who and when tried to login into their accounts, you will record every password typed in your system! Thanks to Quick Keylogger you can now secretly capture all instant messengers chats, online chats and forums typed on your keyboard. All of them are invisibly written into the encrypted log file, only you will be able to open it and review the activity recorded. Quick Keylogger will silently log every e-mail created on your computer. It will record user account, e-mail program he or she uses to send/receive e-mails.

keylogger free keylogger family keylogger parental control software key logger monitoring software keyloggers keystroke logger perfect keylogger ghost keylogger keyspy

Fresh System

Fresh System is a suite of powerful tools designed to keep your computer clean and running smooth. Main function of Fresh System is to uninstall applications. This module also helps user to find orphaned registry entries due to improper uninstallations. Startup manager is another essential tool to manage programs running at startup. Internet Cache Cleaner protects your privacy by removing browsing tracks including cookies. Fresh System contains Temporary File Cleaner, Duplicate File Finder and Empty Folder Finder tools to free up your valuable disk space.

uninstall applications temporary junk duplicate files internet privacy protect trail system cleaner fresh

Right click commander 2000

RCC software is designed for all users who value their time and convenient working conditions. It is a new utility type for the work with files and folders. Due to the full integration with Windows Explorer RCC adds "My computer" folder contents to the pop up menu of any application (the current window of the program should be intended for the work with files). Thus the disks, folders, files and the operations with them will be presented as the items and subitems of the hierarchical pop up menu. The software is easy to use and simple to understand. It will take the user a few seconds to understand the main points how it works (to be more precise, a few mouse movements).And besides, the more complex folder structure you use and the larger amount of documents you use, the higher is your productivity. The basic advantage of RCC is that it does not substitute other programs but expands and improves their features. It is the advisable to use RCC as an addition to Windows Explorer (including the "Desktop" and the "Start" menu), in the "Open", "Save As:" dialog windows in any program and along side with Total Commander file manager. Each of these programs offers its own interface and work style. With the help of RCC you can carry out many file operations unanimously, and which is more important - effectively (more convenient and faster).

shell dialog-box explorer extension context menu file folder manager launcher e-mail

Ace Utilities

Ace Utilities is a collection of tools to optimize your system performance and to remove unneeded files and internet tracks. It allows you to find and remove invalid registry entries, delete your application and internet history (plug-in support for 85+ external programs), manage your cookies and more. You can also see what programs start automatically with windows and optionally disable selected items. Furthermore, Ace Utilities includes options to find duplicate files, fix or remove broken shortcuts and to uninstall software. Other features include secure file deletion, disk space analysis, an Empty Folder finder and more.

ace utilities system registry clean unwanted files startup microsoft regclean internet

 
Audio Software
Office & Business
Games Software
Graphics Software
Internet Software
Home Software
Developers Tools
System Utilities
 
 
 
 

Page 1 out of 20    1 2 3 4 5 6 7 8 9 10 ...20

 

Copyright 2004-2010 FilesWeb.com