Advanced Keylogger will monitor various PC activity: keystrokes in all applications, visited websites, Windows logon passwords, clipboard activity. Advanced Keylogger can take screenshots of all activity and you can easily see what was going on.
Eltima Advanced Keylogger 2.0 Advanced Keylogger is an absolutely invisible keylogger that captures keystrokes, chat conversations, emails, clipboard info, Internet and desktop activity to encrypted user-friendly logs. Have it all delivered to any email in clear reports.
EXE Password Protector 1.1 EXE Password Protector lets you password-protect any executable file to disallow its launching by unauthorized users. It can be used to lock email and IM programs, tax/finance software, games and executable files located on local or network drives.
Description: Advanced Keylogger is a profound yet very easy to understand and use. It was developed by Eltima Software and is constantly improved version after version. You can easily monitor keystrokes, typed IM messages, visited websites, sent or received email messages, data copied to clipboard. Advanced Keylogger can also take screenshots of PC activity at the specified interval so that you can later watch them as a slideshow.
All user accounts on your computer can be monitored with Advanced Keylogger. Its logs will be well hidden and encrypted so that only you can find and read them. You don't even have to be at the computer you monitor because Advanced Keylogger can regularly email you the reports of all activity to your email address, and don't you worry - it is very easy to set up, its wizard will fill in the SMTP server automatically for most popular email services.
Advanced Keylogger operates absolutely invisibly for computer users and antivirus programs, so no one but you can detect it is running on your PC. Moreover, you can set Advanced Keylogger to uninstall automatically on a specified date thus increasing its invisibility.
Master Keystroke Logger Pro 11.08.01 This invisible key logger software program records every keystroke that is typed on the computer and sends the log to you. Can email the log to any email address or list of
Police warn on key-logging spam Trojan Police are warning about fake email invoices being used by cyber-criminals to steal online banking details and other information from unsuspecting internet users.