How To Be Your Own Secret Service Agency

So you want to know who your kids are chatting with. Or if your spouse has a blossoming e-mail romance. Or if one of your employees is leaking confidential information on the side. These tools will allow you to find out the truth and get the evidence you can present to court.

Spytech SpyAgent
http://www.deprice.com/spytechspyagent.htm

Spytech SpyAgent is a powerful and easy-to-use software utility that allows you to log all keystrokes typed and applications launched. All logs are easily viewed with the built in log viewers and can be saved to a convenient, easily viewed text format.

SpyAgent can be run on Windows startup in active monitoring mode with an optional splash warning screen. This allows you to have the option to let others using your workstation that they are being monitored (or not). A built in stealth mode is available to keep users from task-ending or knowing about SpyAgent. SpyAgent gives you the power to log all websites visited, windows viewed, applications ran, internet connections made, passwords entered, documents printed, AIM/AOL/ICQ/Yahoo/MSN conversations made, documents opened, emails sent/received, and even capture screenshots of the user's activities.

iSpyNow
http://www.deprice.com/ispynow2.htm

SpyNOW is the critically acclaimed, award winning remotely deployable computer monitoring software used by hundreds of thousands of people across the globe. Make no mistake about it, iSpyNOW is first of its kind. iSpyNOW offers it's users the ability to remotely monitor a machine via a web interface, without ever having physical access to the PC! Unlike competing products, iSpyNOW offers a totally seamless online-based control panel system, backed by intuitive wizards and powerful log viewing capabilities - no external client modules are necessary to download.

IamBigBrother
http://www.deprice.com/iambigbrotherspy.htm

Do you need to view the captured activity from work or another computer at home?IamBigBrother records all of the internet activity for many programs including America Online, MSN, Outlook Express and more. And it logs all keystrokes typed in EVERY program along with screen shots. So basically IamBigBrother monitors EVERYTHING on your computer.

ActMon Home Edition
http://www.deprice.com/actmonhome.htm

The Home Edition records EVERYTHING (including Web sites, Chat, Email and AOL). It is the best choice for parents who wish to monitor what their children are doing online. It is an excellent alternative to standard filtering and blocking software. To avoid tampering of the software, it features a unique file protection that makes the ActMon files truly invisible to every user and every windows software.

SpyBuddy
http://www.deprice.com/spybuddy.htm

SpyBuddy comes equipped with the functionality to record all e-mail's sent and received, all AOL/ICQ/MSN/AIM/Yahoo/Trillian chat conversations (including MSN Messenger 6.0 and up), all web sites visited, all windows opened and interacted with, every application executed, every document printed, every file or folder renamed and/or modified, all text and images sent to the clipboard, every keystroke pressed, every password typed, and more.

SpyMyPC Pro
http://www.deprice.com/spymypcpro.htm

SpyMyPC PRO is a highly flexible, all-round desktop security monitoring solution written for the Windows operating system. SpyMyPC PRO allows you to secretly record ALL keystrokes typed on your PC without the user ever knowing! SpyMyPC PRO also includes advanced stealth mode features to prevent users and/or programs from detecting and disabling it, an e-mail delivery feature for remote monitoring, and much more.

John Deprice has tested a variety of internet/chat monitors, spying software and keyloggers. For results, visit http://www.deprice.com/utilities.htm

In The News:


pen paper and inkwell


cat break through


The Important Steps To Protect Your Kids on the Internet

Internet is the ocean of knowledge. In this ocean you... Read More

Spyware Attacks! Windows Safe Mode is No Longer Safe

Many of us have run into an annoying and time-consuming... Read More

Lets Talk About Antivirus Software!

Nowadays more and more people are using a computer. A... Read More

Fishing for Fortunes. Scam!

Spelt phishing, but pronounced as above, this despicable act is... Read More

Free Antivirus Security Software: Download Now to Eliminate Spyware, Pop Up Ads, etc.

Adware. Spyware. Pesky pop up ads. Internet congestion. Computer malfunctions... Read More

Phishing - Identity Theft & Credit Card Fraud

What is Phishing? Phishing is a relatively newly coined term... Read More

8 Surefire Ways to Spot an EBAY Scam E-Mail and Protect Yourself from Identity Theft

Ebay is a great site and is used by many... Read More

Network Security 101

As more people are logging onto the Internet everyday, Network... Read More

Email Scams ? Ten Simple Steps To Avoiding Them

According to the Anti-Phishing Working Group (APWG) email scams also... Read More

Are You Surfing Safe?

Ok, you've got a computer, and you get online. You... Read More

How To Give Away Your Personal Information

Identity Theft and Your Personal Information Identity theft is... Read More

Ransom Trojan Uses Cryptography for Malicious Purpose

Every day millions of people go online to find information,... Read More

Top 10 tips for Safe Internet Shopping

Over £5 billion pounds was spent on online shopping in... Read More

Personal Firewalls - Secure Your Computer

There has not been a time in the history of... Read More

Is My PC Vulnerable on the Internet?

No longer are viruses the only threat on the internet.... Read More

Internet Shopping - How Safe Is It?

Millions of people make purchases online, but many people are... Read More

Data Security; Are Your Company Assets Really Secure?

Is your data secure? Think again. Securing data is unlike... Read More

Spyware Protection Software

Spyware protection software is the easiest way of removing spyware... Read More

What is Hacking? Are You a Hacker?

WHAT IS HACKING?Hacking, sometimes known as "computer crime" has only... Read More

Backup and Save your business!

There you are busily typing away on your PC or... Read More

Mail Forwarding - Why Would You Do It?

First of all we need to get some terms stated.... Read More

Another Fine Mess!

I'm in the Anti-Spyware business, and I'm doing a lot... Read More

Internet Small Business and Fraud

Be careful of sites that promise to send you "instant... Read More

Social Engineering: You Have Been A Victim

Monday morning, 6am; the electric rooster is telling you it's... Read More

Identity Theft ? Beware of Phishing Attacks!

"Dear Bank of the West customer", the message begins. I've... Read More

Virus Prevention 101

Blaster, Welchia, Sobig, W32, Backdoor, Trojan, Melissa, Klez, Worm, Loveletter,... Read More

Computer Viruses and Other Nasties: How to Protect Your Computer from These Invaders

Can you protect your computer from all possible viruses and... Read More

The Move to a New Anti-Virus Model

This is the second in a series of articles highlighting... Read More

The Truth About Hiding Your Tracks on the Internet

Ok, ok, I know you've seen them. All those pop... Read More

Protecting Your Identity On The Internet

Afraid that someone is monitoring your PC or installed a... Read More

Website Security - Creating a Bulletproof Site in 5 Easy Steps

When it comes to a secure website and passwords it... Read More

Firewall Protection - Does Your Firewall Do This?

The first thing people think about when defending their computers... Read More

Be Alert! Others Can Catch Your Money Easily!

So called phishers try to catch the information about the... Read More