So you want to know who your kids are chatting with. Or if your spouse has a blossoming e-mail romance. Or if one of your employees is leaking confidential information on the side. These tools will allow you to find out the truth and get the evidence you can present to court.
Spytech SpyAgent
http://www.deprice.com/spytechspyagent.htm
Spytech SpyAgent is a powerful and easy-to-use software utility that allows you to log all keystrokes typed and applications launched. All logs are easily viewed with the built in log viewers and can be saved to a convenient, easily viewed text format.
SpyAgent can be run on Windows startup in active monitoring mode with an optional splash warning screen. This allows you to have the option to let others using your workstation that they are being monitored (or not). A built in stealth mode is available to keep users from task-ending or knowing about SpyAgent. SpyAgent gives you the power to log all websites visited, windows viewed, applications ran, internet connections made, passwords entered, documents printed, AIM/AOL/ICQ/Yahoo/MSN conversations made, documents opened, emails sent/received, and even capture screenshots of the user's activities.
iSpyNow
http://www.deprice.com/ispynow2.htm
SpyNOW is the critically acclaimed, award winning remotely deployable computer monitoring software used by hundreds of thousands of people across the globe. Make no mistake about it, iSpyNOW is first of its kind. iSpyNOW offers it's users the ability to remotely monitor a machine via a web interface, without ever having physical access to the PC! Unlike competing products, iSpyNOW offers a totally seamless online-based control panel system, backed by intuitive wizards and powerful log viewing capabilities - no external client modules are necessary to download.
IamBigBrother
http://www.deprice.com/iambigbrotherspy.htm
Do you need to view the captured activity from work or another computer at home?IamBigBrother records all of the internet activity for many programs including America Online, MSN, Outlook Express and more. And it logs all keystrokes typed in EVERY program along with screen shots. So basically IamBigBrother monitors EVERYTHING on your computer.
ActMon Home Edition
http://www.deprice.com/actmonhome.htm
The Home Edition records EVERYTHING (including Web sites, Chat, Email and AOL). It is the best choice for parents who wish to monitor what their children are doing online. It is an excellent alternative to standard filtering and blocking software. To avoid tampering of the software, it features a unique file protection that makes the ActMon files truly invisible to every user and every windows software.
SpyBuddy
http://www.deprice.com/spybuddy.htm
SpyBuddy comes equipped with the functionality to record all e-mail's sent and received, all AOL/ICQ/MSN/AIM/Yahoo/Trillian chat conversations (including MSN Messenger 6.0 and up), all web sites visited, all windows opened and interacted with, every application executed, every document printed, every file or folder renamed and/or modified, all text and images sent to the clipboard, every keystroke pressed, every password typed, and more.
SpyMyPC Pro
http://www.deprice.com/spymypcpro.htm
SpyMyPC PRO is a highly flexible, all-round desktop security monitoring solution written for the Windows operating system. SpyMyPC PRO allows you to secretly record ALL keystrokes typed on your PC without the user ever knowing! SpyMyPC PRO also includes advanced stealth mode features to prevent users and/or programs from detecting and disabling it, an e-mail delivery feature for remote monitoring, and much more.
John Deprice has tested a variety of internet/chat monitors, spying software and keyloggers. For results, visit http://www.deprice.com/utilities.htm
The Internet is a vast International Network of people and... Read More
While clicking from site to site on the internet you... Read More
Identity Theft is one of the most serious problems facing... Read More
There are several basic concepts to keep in mind when... Read More
For many, the daily walk to the mailbox evokes mixed... Read More
A new variation of the Nigerian Scam theme ... Read More
It's a sad statistic, but hundreds of unsuspecting kids are... Read More
The Message Must Get Through The year is 300A.D.,... Read More
The first thing people think about when defending their computers... Read More
Spies, spyware, internet parasites are among what they are usually... Read More
The Loss Prevention Manager should be receptive to the needs... Read More
Ok, ok, I know you've seen them. All those pop... Read More
Today's Internet or World Wide Web is being over regulated.But,... Read More
Do you really have to know how feeds work? Not... Read More
The Federal Bureau of Investigation has identified "phishing" as the... Read More
1)Spyware is on your system. Like it or not, statistically... Read More
Be careful of sites that promise to send you "instant... Read More
Have you ever got an email asking you to confirm... Read More
Manual Spy Bot Removal > BookedSpaceBookedSpace is an Internet Explorer... Read More
Have been an Internet user for more than 9 years,... Read More
You may not realize it, but as you are surfing... Read More
"Dear Bank of the West customer", the message begins. I've... Read More
You can detect spyware online using free spyware cleaners and... Read More
From: "Paypal Security" Subject: New Security Requirements Date: Tue, 26... Read More
Spyware/adware is a new major concern for PC users everywhere.... Read More
Viruses, Bugs, Worms, Dataminers, Spybots, and Trojan horses. The Internet... Read More
When you signed up for that ultra-fast DSL or Cable... Read More
Scams involving email continue to plague consumers across America, indeed... Read More
Long gone are the days that we could feel secure... Read More
If you are a parent, you have probably wondered at... Read More
Internet is the ocean of knowledge. In this ocean you... Read More
First, let's do a little recap'. As I stated in... Read More
If you know what is the 'Fishing' then it's very... Read More
As the number of people using the Internet as an... Read More
There are ways to insure security though. You can get... Read More
During the release of a new software product specialized to... Read More
Is your data secure? Think again. Securing data is unlike... Read More
When the Internet first came about, it was realized it... Read More
Let us take the example of scrambling an egg. First,... Read More
Pharming is one of the latest online scams and rapidly... Read More
One evening, during the graveyard shift, an AOL technical support... Read More
Recently, my site and other internet accounts ( http://www.nabaza.com/sites.htm )... Read More
Every single time you access a website, you leave tracks.... Read More
Have you ever bought a product or service from the... Read More
Security leaks can be a big problem for any site... Read More
May. 16th 2005 - MicroWorld has reported the discovery of... Read More
Today's Internet or World Wide Web is being over regulated.But,... Read More
With the advent of the World Wide Web, a whole... Read More
File sharing on p2p is soaring despite the music and... Read More
When we think of adware, what comes to mind are... Read More
There you are busily typing away on your PC or... Read More
If you use emails actively in your communication, you must... Read More
"Male. Obsessed with computers. Lacking a girlfriend. Aged 14 to... Read More
Do you sometimes notice your computer running slower. Is your... Read More
First the basic definition of Spyware: It is a type... Read More
Be careful of sites that promise to send you "instant... Read More
Computer security for most can be described in 2 words,... Read More
A few nights ago I received an email from "2CO"... Read More
When it comes to a secure website and passwords it... Read More
Can you protect your computer from all possible viruses and... Read More
What is Phishing? In a typical Phishing attack, a criminal... Read More
This is not some new fangled techno-speak, it is a... Read More
Computer viruses infect millions of computers every day. Viruses can... Read More
Today,on most internet user's computers, we have the ability to... Read More
Abstract Homogeneous symmetries and congestion control have garnered limited interest... Read More
Despite the current wave of identity theft and corporate security... Read More
Internet Security |