Asoftech Automation records all operation of mouse and keystrokes and saves them as macros. It can play back the recorded macros to automate recorded tasks any number of times.It is very easy to use and doesn't require any programming experience.
A personalized faxing software can reach thousands of people with no limit. This easy to use product is your ideal communication tool for fax marketing, customer communication, event notification, newsletter publishing and more.
With KGB Free Keylogger, you will never lose any of your text, whether it was typed in an e-mail client, a text editor or an on-line form. This free programlogs everything you type. Get your passwords, registration keys and other info safely logger
Spy Patrol is a user-friendly spy software that runs hidden in the background. Spy Patrol records in stealth mode all th keystrokes typed, passwords, websites visited, chats etc. and takes screen shots of the active windows. See www.spy-patrol.com
Monitor & Troubleshoot with the Most Trusted Tools in Network Management! Once you've experienced Engineer's Toolset, you'll never troubleshoot your network the same way again. It includes a collection of powerful network management tools.
SpyShelter Firewall monitors susceptible and weak spots in your computer system, in order to ensure that even the most advanced keyloggers and trojans are shut down even before these can launch a single dangerous attack against your computer.
I am Joe Pender and as a working dad I realize how essential it really is to have an extra pair of eyes watching over not only your kids, but your whole family too. FREEK KeyloggerFREE does just that, It records everything
Silent Keylogger invisibly records keystrokes, emails conversations, chats, visited websites, passwords, used applications and captures screenshots and sends reports to your e-mail address, FTP or LAN path. Supports silent one-click installation.
SpyShelter Free monitors susceptible and weak spots in your computer system, in order to ensure that even the most advanced keyloggers are shut down even before these can launch a single dangerous attack against your computer.