| Rating: 1 |
| Total Hits - 65 | Hits Today - 0 | View Ratings | Add Your Rating |
|  |
|
| Perfect Privacy protects your privacy by eliminating your Internet and offline computer usage traces, such as history lists, address bar drop downs, cache, accessed document lists and other tracks that are stored to your computer as you use it. You can eliminate all traces or specify a selection. Cleanup can be done with a single click; it can be also executed automatically at specified intervals and on specified events. Stealth mode available. |
| http://www.blumentals.net/ | Last Updated on 7/2/2008 6:15:00 PM |
| Download | Version 1.0 |
| Rating: 0 |
| Total Hits - 2 | Hits Today - 0 | View Ratings | Add Your Rating |
|  |
|
| Permission Analyzer scans your network and combines NTFS permissions with user and group data from the Active Directory. All data that is stored locally can be retrieved to create overviews of permissions per group or user. You will be able to monitor permissions for entire user groups and receive notifications if undesired permissions are flagged within your network.
Main features
Scanning the network
Configure the directories and LDAP Organizational Units to scan. All directory information and group memberships from LDAP are saved in a local database file. Run the scan whenever you like or schedule an automated scan. Permission Analyzer supports an external database, allowing multiple workstations to share the same information source.
Running your overviews
All information is saved on a database, allowing you to conduct targeted search queries in seconds, instead of scanning the whole network every time you want to apply a new filter. Add filters for specific members, all members of a group or LDAP OU, permissions or folders.
Tracing permissions
The main overview provides an aggregated summary of all permissions found and may contain the permissions of multiple users or groups. The Trace function is part of the overview and shows you the origin of permissions for a specific user or group and folder (via the group membership or parent folder they have been inherited). Use this view to zoom in on your search results.
Creating reports and policies
Save your filters as report and export them to HTML or CSV and e-mail. Use Permission Analyzer to run reports automatically using command-line parameters. Save your filters as policies and receive e-mail notifications if your policy report contains unwanted permissions. |
| http://www.perdemia.com | Last Updated on 8/16/2016 4:08:00 AM |
| Download | Version 2.2.0 |
| Rating: 0 |
| Total Hits - 4 | Hits Today - 0 | View Ratings | Add Your Rating |
|  |
|
| Spyrix Personal Monitor is a powerful multifunctional program for full and detailed monitoring of user activity, including activity on social networks. The program is perfect for parental control and control of employees.
Spyrix Personal Monitor allows detailed recording of all user activities. Spyrix Personal Monitor will help you solve the problem of monitoring your children without being caught. You will always know what you child was doing while using the PC.
Spyrix Personal Monitor is a powerful protection tool from leakage of corporate secrets (DLP - data loss prevention). Nowadays on the market of data loss prevention (DLP) software there are lots of solutions that often cost thousands of dollars and in consequence of which are not available for small and medium companies.
Spyrix Personal Monitor is a reasonably priced but quite effective product for solving problems of secret information leakage and employees activity control that allows small companies protecting themselves from unfair workers and problems with leakage of secret information. |
| http://www.pcacme.com/ | Last Updated on 3/28/2017 10:18:00 AM |
| Download | Version 10.5.0 |
| Rating: 0 |
| Total Hits - 2 | Hits Today - 0 | View Ratings | Add Your Rating |
|  |
|
| PhoneSpying: Mobile Spy Free - Spy Phone App. Include more 25+ features such as: GPS, SMS, Call Recording, WhatsApp, Silent Voice Recording.
Include: GPS Tracker, SMS Tracker, Call Tracker. Undetectable and Silent.
GPS tracker- you can track the location of the target with the help of GPS tracker feature. Every change in the location of the target will be informed to you via a notification. You can know where the suspect is in real time.
SMS spy- you can read all the conversations of the target and can save them over your account immediately. All the hidden conversations are also available to you with the help of the AskSpy app.
Spy call- if you need to spy on someone then having access to their calls can help you a lot. With the help of the spy call feature, you can listen to all the conversations of the suspect secretly. You will be notified soon as the suspect receives a call.
Call recording- in case you miss to listen to a call, you can take the help of the call recording feature. This will record all the calls that the suspect makes over his phone. All the details of the calls will be known to you.
Ambient voice recording- this feature lets you listen to all the surrounding voices of the targeted phone. You can listen to the conversations made be the suspect with others.
Whatsapp spy- the AskSpy app gives you the chance to read all the WhatsApp messages of the target. You can also see the files shared and hidden conversations. Not only WhatsApp, but this app also lets you access the conversations of all the other messaging applications.
Social chats monitoring- you can have access to all the social accounts that the suspect runs over his mobile phone and can read all the social chats carries over by the suspect. |
| http://www.phonespying.com | Last Updated on 4/20/2018 3:54:00 AM |
| Download | Version 1.0 |
| Rating: 3 |
| Total Hits - 1500 | Hits Today - 0 | View Ratings | Add Your Rating |
| PMT 2.54 can save files into any other file(called Mother File).If you select a 24-bit-colored BITMAP image or JPEG image or Flash SWF file as a Mother File,then PMT can insert files into the Mother File,or append files to the Mother File.It won't make any difference to the quality of the Mother File. You can save your important files into a Mother File and set a password to protect them.Meanwhile, You can open or run the files in the Mother File freely and create directories in Mother File.Pls be noted the maximum size of a BMP file is 1600x1200x24bits ,so 2M bytes' room can be used by other files. |
| http://www.zqsoft.com | Last Updated on 7/2/2008 6:15:00 PM |
| Download | Version 2.54 |
| Rating: 0 |
| Total Hits - 0 | Hits Today - 0 | View Ratings | Add Your Rating |
|  |
|
| Mobile phone forensic application examines general information of all Windows based Pocket PC and PDA mobile device. Pocket PC investigation tool shows IMEI, IMSI number and manufacturer name of any PDA mobile phone. Utility shows all read/unread text messages and phonebook details of Windows based Pocket PC. PDA surveillance application displays complete mobile information and generates detailed report in text or HTML format of all examined information. Pocket PC device forensic tool shows phonebook/contact numbers, task and appointment details of PDA mobile phone with correct date and time. PDA investigation tool is compatible with all latest versions of Windows operating system and provides support of graphical user interface (GUI) which assists technical as well as non technical users in operating the software. Application shows hardware configuration and OS registry details of Windows based Pocket PC. PDA investigation utility examines information like stored files, database records and other mobile phone information etc. Pocket PC device forensic tool supports various PDA mobile devices including orange myS-7 Smartphone and orange SPV C500 Smartphone etc.Features:*PDA surveillance utility extracts text files, database records and OS registry details of any Windows based mobile phone.*Pocket PC device forensic tool displays complete mobile information (IMEI, model number, manufacturer name) and generates detailed report in text or HTML format.*Mobile phone forensic software provides support of wizard style GUI interface and efficiently works under all major versions of Windows operating system like windows11, windows10, windows8, windows7 etc. |
| https://www.pdd.mobi | Last Updated on 4/13/2024 1:14:00 AM |
| Download | Version 2.0.3.8 |
| Rating: 1 |
| Total Hits - 14 | Hits Today - 0 | View Ratings | Add Your Rating |
|  |
|
| PDA surveillance utility extracts information such as files, database and OS registry records of any Windows based mobile phone. Pocket PC device forensic tool displays model number, manufacturer name, IMEI number and ICC-ID of any PDA mobile or handheld device. PDA investigation application provides support to all major brands of PDA devices including HP iPAQ, Hitachi, Motorola and Benq etc. Pocket PC examination utility allows you to view all data (files, folders, images, songs, movies) stored on any Windows based mobile, PDA phone, or Pocket PC. Software examines all information like software/hardware configuration, OS registry records, phone and other general information etc. Pocket PC device forensic application enables user to view text messages, contact numbers and other data saved on any Windows based mobile phone. Application is compatible with all latest versions of Windows operating system such as XP, Vista etc and has an interactive graphical user interface (GUI) which assists technical as well as non technical users to work easily with the software. Pocket PC investigator supports all latest PDA devices including Pantech PH-S8000T smartphone, Samsung SCH-i600 and Sharp W-Zero3 PocketPC Phone etc.
Features:
* Pocket PC device forensic tool shows information including model number, manufacturer name, IMEI and IMSI number etc.
* PDA surveillance utility allows user to display all information stored on Windows based mobile device or Pocket PC.
* Pocket PC investigation software generates report of all extracted information in text or HTML format and saves at user specified location.
* Pocket PC forensic application examines information like audio files, video clippings and other related data stored on PDA mobile device.
|
| http://www.pdd.mobi | Last Updated on 2/27/2009 7:10:00 AM |
| Download | Version 2.0.1.5 |
| Rating: 1 |
| Total Hits - 14 | Hits Today - 0 | View Ratings | Add Your Rating |
| Pocket PC surveillance software generates an effective forensic report on your PDA device that helps to know what OS type, memory, software and hardware is used in mobile phone. Program pull out IMSI number from Pocket PC phone and provides facility to generate report in html or text format for printing purpose. PDA surveillance tool is fully windows Vista compatible and through using help manual any normal user can easily operate this software. |
| http://www.datadoctor.org | Last Updated on 10/23/2008 2:01:00 AM |
| Download | Version 2.0.1.5 |
| Rating: 1 |
| Total Hits - 18 | Hits Today - 0 | View Ratings | Add Your Rating |
|  |
|
| Power PC Keylogger spy software can secretly record all keystrokes typed on your computer.
It runs completely invisiblely. You can check log reports by simply receiving emails or
opening a web page. Power PC Keylogger is perfect for catching cheaters, monitoring
employees, children or spouse, acquiring others'' passwords and even investigating crimes.
Use hotkey to unhide it from Stealth Mode and protect the program access by password. |
| http://www.ematrixsoft.com | Last Updated on 4/25/2011 12:32:00 PM |
| Download | Version 10.10 |
| Rating: 3 |
| Total Hits - 41 | Hits Today - 0 | View Ratings | Add Your Rating |
|  |
|
| Power PC Keylogger spy software can secretly record all keystrokes typed on your computer. It runs completely
invisiblely. You can check log reports by simply receiving emails or opening a web page. Power PC Keylogger is
perfect for catching cheaters, monitoring employees, children or spouse, acquiring others'' passwords and even
investigating crimes. Use hotkey to unhide it from Stealth Mode and protect the program access by password. |
| http://www.ematrixsoft.com | Last Updated on 3/10/2010 10:20:00 AM |
| Download | Version 9.0 |