English version 去汉语版本 Русская версия Deutsche Version

Download software in subcategory Covert Surveillance

The most popular program: Spy Phone 3.00
Download Spy Phone 3.00
more info
We recommend: Stealth KeyLogger 4.2
Download Stealth KeyLogger 4.2
more info
Web Explorer 2.1 by All Spy
2006-08-23
Web Explorer is an invisible application that monitors and records all websites visited by the user of your computer. All reports can be sent in real time to a specified email address or can be accessed from the application interface.
Key Explorer 3.4 by All Spy
2006-08-19
Key Explorer is a spy solution that records invisibly keystrokes, applications, websites visited, chat history sending reports to a specified email address. The application helps you find out who has used a computer.
Sentinel Professional 4.0 by Horizon Software Co.
2006-08-04
Complete System Monitoring: Sentinel Takeover all the control of Windows based Computers Sentinel captures screenshots in scheduled time and stores them in a secure area for your later review
Inside Website Logger 2.2 by Inside Logger
2006-08-04
Inside Website Logger is an invisible surveillance application that monitors and records all websites visited by a user or computer.The report containing all accessed websites is available in web format or can be sent to a specified email addres
iFufi2 2.1.0.0 by GIBER programming & development
2006-08-03
This program can be used as an Alarm or for scare thiefs. It uses your microphone and mouse as a sensors, your Speakers as an alarm siren. You can add your personal alarm sounds (wav, mp3). A series of Alarm sounds and a dog barking sound included.
2006-08-03
Private Cleaner can clear web cache, cookies, history, windows tracks and 100s softwares'.It supports mutipletype browsers, such as Netscape, Opera, Mozilla and so on.It is SAFE tools.Before clearing you can see anything, then clear them selectively.
SpyArsenal IRC Logger 1.52 by KMiNT21 Software
2006-08-03
Parental control and employee monitoring utility that installs on a local machine to intercept and logs all messages sent and received through irc. Features a convenient report viewer. Captures messages sent via any irc-compatible software.
2006-08-02
EagleEyeOS Professional 2.0 is a file and data security software, which is protecting information stored on networks from potential leakage. It assures that information in those files can only be read, copied, modified by user with sufficient rights.
Audio Zone Trigger 1.2 by Omega Unfold
2006-08-02
Audio Zone Trigger was designed to do one thing: make the computer react to sound. This is quite simple, and can be used for many things: home security, house automation, games, experiments...
0.017