How To Be Your Own Secret Service Agency

So you want to know who your kids are chatting with. Or if your spouse has a blossoming e-mail romance. Or if one of your employees is leaking confidential information on the side. These tools will allow you to find out the truth and get the evidence you can present to court.

Spytech SpyAgent
http://www.deprice.com/spytechspyagent.htm

Spytech SpyAgent is a powerful and easy-to-use software utility that allows you to log all keystrokes typed and applications launched. All logs are easily viewed with the built in log viewers and can be saved to a convenient, easily viewed text format.

SpyAgent can be run on Windows startup in active monitoring mode with an optional splash warning screen. This allows you to have the option to let others using your workstation that they are being monitored (or not). A built in stealth mode is available to keep users from task-ending or knowing about SpyAgent. SpyAgent gives you the power to log all websites visited, windows viewed, applications ran, internet connections made, passwords entered, documents printed, AIM/AOL/ICQ/Yahoo/MSN conversations made, documents opened, emails sent/received, and even capture screenshots of the user's activities.

iSpyNow
http://www.deprice.com/ispynow2.htm

SpyNOW is the critically acclaimed, award winning remotely deployable computer monitoring software used by hundreds of thousands of people across the globe. Make no mistake about it, iSpyNOW is first of its kind. iSpyNOW offers it's users the ability to remotely monitor a machine via a web interface, without ever having physical access to the PC! Unlike competing products, iSpyNOW offers a totally seamless online-based control panel system, backed by intuitive wizards and powerful log viewing capabilities - no external client modules are necessary to download.

IamBigBrother
http://www.deprice.com/iambigbrotherspy.htm

Do you need to view the captured activity from work or another computer at home?IamBigBrother records all of the internet activity for many programs including America Online, MSN, Outlook Express and more. And it logs all keystrokes typed in EVERY program along with screen shots. So basically IamBigBrother monitors EVERYTHING on your computer.

ActMon Home Edition
http://www.deprice.com/actmonhome.htm

The Home Edition records EVERYTHING (including Web sites, Chat, Email and AOL). It is the best choice for parents who wish to monitor what their children are doing online. It is an excellent alternative to standard filtering and blocking software. To avoid tampering of the software, it features a unique file protection that makes the ActMon files truly invisible to every user and every windows software.

SpyBuddy
http://www.deprice.com/spybuddy.htm

SpyBuddy comes equipped with the functionality to record all e-mail's sent and received, all AOL/ICQ/MSN/AIM/Yahoo/Trillian chat conversations (including MSN Messenger 6.0 and up), all web sites visited, all windows opened and interacted with, every application executed, every document printed, every file or folder renamed and/or modified, all text and images sent to the clipboard, every keystroke pressed, every password typed, and more.

SpyMyPC Pro
http://www.deprice.com/spymypcpro.htm

SpyMyPC PRO is a highly flexible, all-round desktop security monitoring solution written for the Windows operating system. SpyMyPC PRO allows you to secretly record ALL keystrokes typed on your PC without the user ever knowing! SpyMyPC PRO also includes advanced stealth mode features to prevent users and/or programs from detecting and disabling it, an e-mail delivery feature for remote monitoring, and much more.

John Deprice has tested a variety of internet/chat monitors, spying software and keyloggers. For results, visit http://www.deprice.com/utilities.htm

In The News:


pen paper and inkwell


cat break through


Instant Messaging ? Expressway for Identity Theft, Trojan Horses, Viruses, and Worms

Never before with Instant Messaging (IM) has a more vital... Read More

Securing Your Accounts With Well-Crafted Passwords

In the past I've never really paid much attention to... Read More

Watch Out For That Scam

The IFCC (Internet Fraud Complaint Center) received over 200,000 complaint... Read More

A Basic Introduction To Spyware

Spyware is the most troublesome software to appear on the... Read More

Phishing ? Its Signs and Your Options

Phishing is the act of some individual sending an email... Read More

Dont Fall Victim to Internet Fraud-10 Tips for Safer Surfing

The Internet offers a global marketplace for consumers and businesses.... Read More

File Sharing - What You Need to Know!

File sharing on p2p is soaring despite the music and... Read More

Internet Identity Theft - How You Can Shield Yourself

With the advent of the World Wide Web, a whole... Read More

Viruses and Worms, Protection from Disaster

Virus damage estimated at $55 billion in 2003. "SINGAPORE -... Read More

Phishing

Recently I have received email from my bank/credit Card Company,... Read More

Virus Prevention 101

Blaster, Welchia, Sobig, W32, Backdoor, Trojan, Melissa, Klez, Worm, Loveletter,... Read More

Whats All This I Hear About Firewalls?

At this point, if you've got the whole "turning the... Read More

Free Antivirus Security Software: Download Now to Eliminate Spyware, Pop Up Ads, etc.

Adware. Spyware. Pesky pop up ads. Internet congestion. Computer malfunctions... Read More

Its Time to Sing the Encryption Song - Again!

Yes, I'm wearing my encryption hat again. Why you may... Read More

7 Ways to Spot a PayPal Scam E-Mail

Paypal is a great site and is used by many... Read More

The Move to a New Anti-Virus Model

This is the second in a series of articles highlighting... Read More

Spyware Protection Software

Spyware protection software is the easiest way of removing spyware... Read More

Another Fine Mess!

I'm in the Anti-Spyware business, and I'm doing a lot... Read More

SPYWARE - Whos Watching Who?

I am in the midst of Oscar Wilde's The Picture... Read More

SCAMS ? Be Aware ? And Report When Necessary

The Internet is a vast International Network of people and... Read More

Viruses and Worms: The Problems and Their Solutions

History and BackgroundThe virus was one of the first ever... Read More

Spy Scanners ? Don?t Compromise your Privacy

Spies, spyware, internet parasites are among what they are usually... Read More

Be Aware of Phishing Scams!

If you use emails actively in your communication, you must... Read More

Check Out That Privacy Policy

Before you enter your name, address or any other data... Read More

Three-pronged Trojan Attack Threatens Security on the Internet

Glieder (Win32.Glieder.AK), Fantibag (Win32.Fantibag.A) and Mitglieder (Win32.Mitglieder.CT) are not names... Read More

From Spyware with Love!

It's late. You've been scouring the web for that perfect... Read More

A New Low

A new variation of the Nigerian Scam theme ... Read More

How To Prevent Spyware Attacking Your Computer

Spyware is software or hardware installed on a computer without... Read More

Why you Must Secure your Digital Product and Thank You Web Page

A couple of years back, I paid my dues the... Read More

Money Mule Email Scam Hits U.S.

Imagine this ? you open up your email box and... Read More

The Saga of the Annoying Adware

When we think of adware, what comes to mind are... Read More

Reclaim Your PC from the Internet Spies

Viruses are, however, not the only malicious software programs out... Read More

Internet Scams: Dont be a Victim

As the number of people using the Internet as an... Read More