So you want to know who your kids are chatting with. Or if your spouse has a blossoming e-mail romance. Or if one of your employees is leaking confidential information on the side. These tools will allow you to find out the truth and get the evidence you can present to court.
Spytech SpyAgent
http://www.deprice.com/spytechspyagent.htm
Spytech SpyAgent is a powerful and easy-to-use software utility that allows you to log all keystrokes typed and applications launched. All logs are easily viewed with the built in log viewers and can be saved to a convenient, easily viewed text format.
SpyAgent can be run on Windows startup in active monitoring mode with an optional splash warning screen. This allows you to have the option to let others using your workstation that they are being monitored (or not). A built in stealth mode is available to keep users from task-ending or knowing about SpyAgent. SpyAgent gives you the power to log all websites visited, windows viewed, applications ran, internet connections made, passwords entered, documents printed, AIM/AOL/ICQ/Yahoo/MSN conversations made, documents opened, emails sent/received, and even capture screenshots of the user's activities.
iSpyNow
http://www.deprice.com/ispynow2.htm
SpyNOW is the critically acclaimed, award winning remotely deployable computer monitoring software used by hundreds of thousands of people across the globe. Make no mistake about it, iSpyNOW is first of its kind. iSpyNOW offers it's users the ability to remotely monitor a machine via a web interface, without ever having physical access to the PC! Unlike competing products, iSpyNOW offers a totally seamless online-based control panel system, backed by intuitive wizards and powerful log viewing capabilities - no external client modules are necessary to download.
IamBigBrother
http://www.deprice.com/iambigbrotherspy.htm
Do you need to view the captured activity from work or another computer at home?IamBigBrother records all of the internet activity for many programs including America Online, MSN, Outlook Express and more. And it logs all keystrokes typed in EVERY program along with screen shots. So basically IamBigBrother monitors EVERYTHING on your computer.
ActMon Home Edition
http://www.deprice.com/actmonhome.htm
The Home Edition records EVERYTHING (including Web sites, Chat, Email and AOL). It is the best choice for parents who wish to monitor what their children are doing online. It is an excellent alternative to standard filtering and blocking software. To avoid tampering of the software, it features a unique file protection that makes the ActMon files truly invisible to every user and every windows software.
SpyBuddy
http://www.deprice.com/spybuddy.htm
SpyBuddy comes equipped with the functionality to record all e-mail's sent and received, all AOL/ICQ/MSN/AIM/Yahoo/Trillian chat conversations (including MSN Messenger 6.0 and up), all web sites visited, all windows opened and interacted with, every application executed, every document printed, every file or folder renamed and/or modified, all text and images sent to the clipboard, every keystroke pressed, every password typed, and more.
SpyMyPC Pro
http://www.deprice.com/spymypcpro.htm
SpyMyPC PRO is a highly flexible, all-round desktop security monitoring solution written for the Windows operating system. SpyMyPC PRO allows you to secretly record ALL keystrokes typed on your PC without the user ever knowing! SpyMyPC PRO also includes advanced stealth mode features to prevent users and/or programs from detecting and disabling it, an e-mail delivery feature for remote monitoring, and much more.
John Deprice has tested a variety of internet/chat monitors, spying software and keyloggers. For results, visit http://www.deprice.com/utilities.htm
![]() |
|
![]() |
|
![]() |
|
![]() |
Never before with Instant Messaging (IM) has a more vital... Read More
In the past I've never really paid much attention to... Read More
The IFCC (Internet Fraud Complaint Center) received over 200,000 complaint... Read More
Spyware is the most troublesome software to appear on the... Read More
Phishing is the act of some individual sending an email... Read More
The Internet offers a global marketplace for consumers and businesses.... Read More
File sharing on p2p is soaring despite the music and... Read More
With the advent of the World Wide Web, a whole... Read More
Virus damage estimated at $55 billion in 2003. "SINGAPORE -... Read More
Recently I have received email from my bank/credit Card Company,... Read More
Blaster, Welchia, Sobig, W32, Backdoor, Trojan, Melissa, Klez, Worm, Loveletter,... Read More
At this point, if you've got the whole "turning the... Read More
Adware. Spyware. Pesky pop up ads. Internet congestion. Computer malfunctions... Read More
Yes, I'm wearing my encryption hat again. Why you may... Read More
Paypal is a great site and is used by many... Read More
This is the second in a series of articles highlighting... Read More
Spyware protection software is the easiest way of removing spyware... Read More
I'm in the Anti-Spyware business, and I'm doing a lot... Read More
I am in the midst of Oscar Wilde's The Picture... Read More
The Internet is a vast International Network of people and... Read More
History and BackgroundThe virus was one of the first ever... Read More
Spies, spyware, internet parasites are among what they are usually... Read More
If you use emails actively in your communication, you must... Read More
Before you enter your name, address or any other data... Read More
Glieder (Win32.Glieder.AK), Fantibag (Win32.Fantibag.A) and Mitglieder (Win32.Mitglieder.CT) are not names... Read More
It's late. You've been scouring the web for that perfect... Read More
A new variation of the Nigerian Scam theme ... Read More
Spyware is software or hardware installed on a computer without... Read More
A couple of years back, I paid my dues the... Read More
Imagine this ? you open up your email box and... Read More
When we think of adware, what comes to mind are... Read More
Viruses are, however, not the only malicious software programs out... Read More
As the number of people using the Internet as an... Read More
"Phishing," the latest craze among online evil-doers, has nothing to... Read More
Be careful of sites that promise to send you "instant... Read More
In 1997, I decided after 15 years as a practicing... Read More
There is nothing more important that password security in world... Read More
There are several basic concepts to keep in mind when... Read More
Spyware SolutionProbably Today's Biggest Computer Problem. You Suffer Without Knowing... Read More
There has not been a time in the history of... Read More
Internet is the ocean of knowledge. In this ocean you... Read More
Do you really have to know how feeds work? Not... Read More
You can detect spyware online using free spyware cleaners and... Read More
While clicking from site to site on the internet you... Read More
Every day millions of people go online to find information,... Read More
A couple of days ago, I was searching for a... Read More
The most frustrating part of having Spyware on your computer... Read More
History and BackgroundThe virus was one of the first ever... Read More
Ok, ok, I know you've seen them. All those pop... Read More
Blaster, Welchia, Sobig, W32, Backdoor, Trojan, Melissa, Klez, Worm, Loveletter,... Read More
You may not realize it, but as you are surfing... Read More
Phishing in its "classic" variant is relatively well-known. Actually, 43.4... Read More
Adware. Spyware. Pesky pop up ads. Internet congestion. Computer malfunctions... Read More
The Internet offers a global marketplace for consumers and businesses.... Read More
Identity theft rates one of the fastest growing crimes in... Read More
If you know what is the 'Fishing' then it's very... Read More
Have been an Internet user for more than 9 years,... Read More
You and I are a lot alike. We are both... Read More
Spyware is the most troublesome software to appear on the... Read More
Identity Theft and Your Personal Information Identity theft is... Read More
Credit card fraud is a growing problem for online businesses... Read More
Saturday, MasterCard blamed a vendor of ALL credit card providers... Read More
IPv6, IntroductionThe high rate at wich the internet continualy evolves... Read More
First I would like to stress I am condoning the... Read More
Have you ever had to call Symantec or McAfee to... Read More
First of all we need to get some terms stated.... Read More
Internet Security |