So you want to know who your kids are chatting with. Or if your spouse has a blossoming e-mail romance. Or if one of your employees is leaking confidential information on the side. These tools will allow you to find out the truth and get the evidence you can present to court.
Spytech SpyAgent
http://www.deprice.com/spytechspyagent.htm
Spytech SpyAgent is a powerful and easy-to-use software utility that allows you to log all keystrokes typed and applications launched. All logs are easily viewed with the built in log viewers and can be saved to a convenient, easily viewed text format.
SpyAgent can be run on Windows startup in active monitoring mode with an optional splash warning screen. This allows you to have the option to let others using your workstation that they are being monitored (or not). A built in stealth mode is available to keep users from task-ending or knowing about SpyAgent. SpyAgent gives you the power to log all websites visited, windows viewed, applications ran, internet connections made, passwords entered, documents printed, AIM/AOL/ICQ/Yahoo/MSN conversations made, documents opened, emails sent/received, and even capture screenshots of the user's activities.
iSpyNow
http://www.deprice.com/ispynow2.htm
SpyNOW is the critically acclaimed, award winning remotely deployable computer monitoring software used by hundreds of thousands of people across the globe. Make no mistake about it, iSpyNOW is first of its kind. iSpyNOW offers it's users the ability to remotely monitor a machine via a web interface, without ever having physical access to the PC! Unlike competing products, iSpyNOW offers a totally seamless online-based control panel system, backed by intuitive wizards and powerful log viewing capabilities - no external client modules are necessary to download.
IamBigBrother
http://www.deprice.com/iambigbrotherspy.htm
Do you need to view the captured activity from work or another computer at home?IamBigBrother records all of the internet activity for many programs including America Online, MSN, Outlook Express and more. And it logs all keystrokes typed in EVERY program along with screen shots. So basically IamBigBrother monitors EVERYTHING on your computer.
ActMon Home Edition
http://www.deprice.com/actmonhome.htm
The Home Edition records EVERYTHING (including Web sites, Chat, Email and AOL). It is the best choice for parents who wish to monitor what their children are doing online. It is an excellent alternative to standard filtering and blocking software. To avoid tampering of the software, it features a unique file protection that makes the ActMon files truly invisible to every user and every windows software.
SpyBuddy
http://www.deprice.com/spybuddy.htm
SpyBuddy comes equipped with the functionality to record all e-mail's sent and received, all AOL/ICQ/MSN/AIM/Yahoo/Trillian chat conversations (including MSN Messenger 6.0 and up), all web sites visited, all windows opened and interacted with, every application executed, every document printed, every file or folder renamed and/or modified, all text and images sent to the clipboard, every keystroke pressed, every password typed, and more.
SpyMyPC Pro
http://www.deprice.com/spymypcpro.htm
SpyMyPC PRO is a highly flexible, all-round desktop security monitoring solution written for the Windows operating system. SpyMyPC PRO allows you to secretly record ALL keystrokes typed on your PC without the user ever knowing! SpyMyPC PRO also includes advanced stealth mode features to prevent users and/or programs from detecting and disabling it, an e-mail delivery feature for remote monitoring, and much more.
John Deprice has tested a variety of internet/chat monitors, spying software and keyloggers. For results, visit http://www.deprice.com/utilities.htm
Internet is the ocean of knowledge. In this ocean you... Read More
Many of us have run into an annoying and time-consuming... Read More
Nowadays more and more people are using a computer. A... Read More
Spelt phishing, but pronounced as above, this despicable act is... Read More
Adware. Spyware. Pesky pop up ads. Internet congestion. Computer malfunctions... Read More
What is Phishing? Phishing is a relatively newly coined term... Read More
Ebay is a great site and is used by many... Read More
As more people are logging onto the Internet everyday, Network... Read More
According to the Anti-Phishing Working Group (APWG) email scams also... Read More
Ok, you've got a computer, and you get online. You... Read More
Identity Theft and Your Personal Information Identity theft is... Read More
Every day millions of people go online to find information,... Read More
Over £5 billion pounds was spent on online shopping in... Read More
There has not been a time in the history of... Read More
No longer are viruses the only threat on the internet.... Read More
Millions of people make purchases online, but many people are... Read More
Is your data secure? Think again. Securing data is unlike... Read More
Spyware protection software is the easiest way of removing spyware... Read More
WHAT IS HACKING?Hacking, sometimes known as "computer crime" has only... Read More
There you are busily typing away on your PC or... Read More
First of all we need to get some terms stated.... Read More
I'm in the Anti-Spyware business, and I'm doing a lot... Read More
Be careful of sites that promise to send you "instant... Read More
Monday morning, 6am; the electric rooster is telling you it's... Read More
"Dear Bank of the West customer", the message begins. I've... Read More
Blaster, Welchia, Sobig, W32, Backdoor, Trojan, Melissa, Klez, Worm, Loveletter,... Read More
Can you protect your computer from all possible viruses and... Read More
This is the second in a series of articles highlighting... Read More
Ok, ok, I know you've seen them. All those pop... Read More
Afraid that someone is monitoring your PC or installed a... Read More
When it comes to a secure website and passwords it... Read More
The first thing people think about when defending their computers... Read More
So called phishers try to catch the information about the... Read More
Someone recently told me, "You would have to be a... Read More
Industrial Espionage. These methodologies are being used on a daily... Read More
Can you protect your computer from all possible viruses and... Read More
Have you ever got an email asking you to confirm... Read More
From the "Ask Booster" column in the June 17, 2005... Read More
Shopping for horse gifts or other gift items on the... Read More
The first thing people think about when defending their computers... Read More
Computer viruses infect millions of computers every day. Viruses can... Read More
Recently I have received email from my bank/credit Card Company,... Read More
Every day millions of people go online to find information,... Read More
These six ways to prevent identity theft offer you valuable... Read More
Security leaks can be a big problem for any site... Read More
High-tech private investigators are becoming the answer for many Internet... Read More
Identity theft is one of the most common criminal acts... Read More
Long gone are the days that we could feel secure... Read More
Saturday, MasterCard blamed a vendor of ALL credit card providers... Read More
NETWORK SECURITIES: IMPORTANCE OF SECURITIESComputers and securities must form a... Read More
Your computer is as slow as molasses. Your mouse freezes... Read More
Spies, spyware, internet parasites are among what they are usually... Read More
In a word, no - an email message has always... Read More
Geek SuperheroGeek Superhero watches your computer for changes, immediately notifying... Read More
First off I should explain what phishing is. Phishing is... Read More
Have you seen the web site, www.freestuff.com? Or have you... Read More
P C. owners are constantly at risk from attacks by... Read More
When you signed up for that ultra-fast DSL or Cable... Read More
Millions of people make purchases online, but many people are... Read More
First, let's do a little recap'. As I stated in... Read More
Chris Simpson, head of Scotland Yard's computer crime unit was... Read More
Scams involving email continue to plague consumers across America, indeed... Read More
In recent days, I was one of the unfortunate persons... Read More
This is the second in a series of articles highlighting... Read More
Every single time you access a website, you leave tracks.... Read More
Sooner or later everyone with an email account will receive... Read More
Internet Security |