PAL PC Spy Protects, Controls and Monitors everything that happens on your PC and online. It is a completely invisible KEY RECORDER and SCREEN CAPTURE utility that secretly captures anything the user sees or types on the keyboard. PAL PC Spy operates in stealth mode. Users are unaware of its existence. Special hotkey and login is necessary to invoke the program. Users are unable to terminate the program. Users are unable to uninstall the program. PAL PC Spy comes with a Screen Capture with idle detect, Key Recorder, Auto E-mailer, Network Monitor, Folder Hider Archive Utility, Clear Trace and Picture Viewer. Monitors any Email, Chat Room or PC.
Free Picture Finder Free Picture Finder is an image finder and image downloader,
It uses internal image searcher and picture downloader to search and download pic on web.
Searching is executed by using keywords, The search possibilities are endless.
PASSPORT PC TO HOST PASSPORT PC TO HOST provides Windows-based TN3270, TN5250, SCO ANSI, VT100 and VT220 telnet terminal emulation for Microsoft Windows Includes Visual Basic and VBscript support, can be deployed using SMS, MSI, Citrix or Microsoft Terminal Server.
Atomic Email Hunter Collecting your potential customers e-mail addresses is a cornerstone of successful e-marketing. This innovative software allows extracting e-mail addresses from your target-audience relevant web sites! Stop wasting money! Download Email Hunter now!
Internet Secure Tunneling Internet Secure Tunneling can forward otherwise insecure TCP traffic through encrypted SSH Secure Shell tunnel. You can secure for example DATABASE, POP3, SMTP and HTTP connections that would otherwise be insecure.
Spy Killer A spyware, malware and adware detection, removal, and prevention internet system security shield. Advanced features include instant kill and blocking. Free software trial version available to download
Entry LE Test the security and robustness of your servers, via remote brute-force attack. Entry is compatible with WWW Basic Authentication, FTP, and POP3 email protocols, HTTP proxy servers, and all popular wordlist formats.