Editor's choice |
Repair MS Backup
Repair MS Backup software to repair damaged or corrupted BKF files
Backup4Sure Lite
Backup4Sure is a an easy to use yet powerful backup program that makes your ...
idoo File Encryption
use idoo file encryption software protection you important files safe
FontSuite
Format plain text to create colorful Text FX, print a list of all your fonts...
CDRoller
A powerful and easy-to-use toolset for CD/DVD/BD/HD-DVD data recovery
File Recovery Vista
File Recovery Vista tool regains accidentally lost files from computer system
Repair Damaged BKF
Damaged BKF Fix Tool to Fix or Repair Damaged BKF File and Extract Data from BKF
|
|
Download tool fast and without troubles. SoftEmpire directory is happy to present a handy diversity of the splendid free programs, utilities, and applications. On this directory you may download trial releases of favorite paid software, and obtain the best freeware for your laptop or cell appliance,gadget. Search an ultimate library of first class recent tools on our library! Recieve trial versions and get recent apps on the computer or digital phone. Meet the recent editions and updates of classical tool, new programs, and notebook tools! Try today!
Computer software utility free download catalog! Pick an app!
System software designed to help examine, configure, perfect, and maintain the computer.
Hard drive utility software to partition, initialize, and maintain neat the disk drives.
Windows utility software tool aggregation to assess, organize, and improve the activities of the computer.
|
Key Logger Spy
|
|
Download
|
Buy now!
|
View screenshots
|
Vendor Price: $ 29
License: Shareware
File Size: 0.62 Mb
Version: 1.0
Release Date:
18 Aug 2004
OS: Win95, Win98, WinME, WinNT 4.x, WinXP, Windows2000, Windows2003
System Requirements:
None
Company: PC Secur
|
Utility to secretly log/spy user activities.
If you want to know what your employee, spouse, child, etc. doing while you are away, you can install this software and let it start automatically with Windows.
Key Logger Spy will then save all the words typed on keyboard and any text copied with the corresponding time stamps for you to review later.
Furthermore you can configure Key Logger Spy to take screenshots every minute or two.
|
More to download:
BlazingTools Perfect Keylogger
Perfect Keylogger helps you to find out what they are doing on their PC. With this key logger you will receive their keytrokes, chats, websites, screenshots and passwords by email. Remote surveillance - as easy as never before!
NetCop System Shield 1.0
NetCop System Shield is a revolutionary new spyware detection and removal application that offers around the clock protection to home and corporate users. NetCop offers maximum strength security and protects your home or netwoked enviroment from ...
User Logger
Logs computer usage information about who used the computer it is installed on, and when. Optionally include all sorts of other useful information, such as what programs were being used and computer ID info. Optional Screen Captures at intervals ...
Blancco - Lite
Blancco - Lite is a 100% secure data erasure solution designed for simple erasure needs. It guarantees a permanent hard disk erasure for PC and laptop computers with unlimited erasure for one IDE hard disk drive per computer
Excel Password Recovery Wizard
Excel Password Recovery Wizard provides you with a friendly interface to recover Excel passwords in a flash. The built-in attack profiles enable rapid password recovery with only one key press. Recovery success is guaranteed.
Master Voyager Business Edition
Encrypt your Compact Disc/Usb Flash Drive. Embedded CD burning module. Simply provide decryption password as work with cd/usb as usual.
|
|
Windows Backup |
Looking for backup software? Try Handy Backup - automatic data backup to DVD, CD, FTP, network, or Online. Client-server enterprise backup software.
|
Top Downloads |
Freeware program to rename files & folders & Multimedia files wi
Hotspot Shield secures your Internet connection from hackers
Protect your computer from viruses and malicious programs.
|
|