Mom Knows Best is an easy way to restrict and monitor usage of your computer. Our logging features, keyword triggers and our manual white/black lists make Mom Knows Best a great solution for home or small business use.
Description: Mom Knows Best is an easy way to restrict and monitor usage of your computer. Our logging features, keyword triggers and our manual white/black lists make Mom Knows Best a great solution for home or small business use. See whats being typed into any program, when its typed and by the user that typed it. Use keyword triggers to restrict a broad range of web sites quickly. Or restrict by domain and file rules. Ability to set time windows for user defined Web sites, set program time frames on when they may be run, password-protect system and control panel applets. Set up Global or per user profiles key logging so you can see when, where and what a user was typing, web site logging so you can see when and where a user was web surfing, file logging so you can see when and what a user opened on the system, password overrides capabilities if you wish to access to a blocked site or file.
PCSnapShot Keylogging Software 4.6 PCSnapShot is a keylogger that records activity on a computer including chats, instant messages, emails, web sites visited, searches, activity on MySpace, the pictures and images
Stealth Parental Control 1.3.4 Stealth Parental Control offers a complete Internet Monitoring and Parental Control Software solution. Stealth Parental Control can secretly record information on your PC and
Kiddie phones have parental controls For better or worse - and some privacy and children's advocates say worse - several companies offer or will soon offer child-oriented mobile phones. These include the two that I'm reviewing this week: Firefly from Firefly Mobile, and TicTalk from Enfora a
AOL Moves Beyond Passwords for Log-Ons Passwords alone won't be enough to get onto America Online under a new, optional log-on service that makes AOL the first major U.S. online business to offer customers a second layer of security.