home  ·  download  ·  order  ·  support  ·  links  ·  spyware  ·  affiliate
English   Spanish   French   Italian   German   Russian  

Introducing award winning spyware and anti-spyware utilities.

Bookmark this page (press Ctrl+D).
Sound Snooper
This tiny software records all sound activity around computer via microphone. You can install an adapter and record phone calls, too. more info >>
Stealth Storage
Stealth Storage is a small and powerful file encryption tool. It encrypts files on-the-fly using well-known strong ciphers like BLOWFISH, RIJNDAEL etc. It is totaly invisible when installed. Nobody will even notice there are encrypted files on a computer. more info >>
Protoport Personal Firewall
Personal firewall software that passes or blocks network packets according to rules specified by user. Anti-hacker algorythms are build-in. more info >>
Modem Spy Stealth Mode Setup Manager
When you run Modem Spy under Windows 2000 or Windows XP, modemspy.exe process will appear in Task Manager (Press Ctrl+Shift+Esc and select Processes tab). This small tool will hide Modem Spy. Nobody will notice there is Modem Spy software installed on your system!   Download >>

Records Registry
With Records Registry you will be able to check out the following: adoptions & birth parents, ancestry archives, arrest records, background checks, bankruptcy files, birth records, birth certificates, childcare & nanny screening, drivers license, correctional files, county court records, court records, courthouse searches, credit reports, criminal records, criminal indictments, dead beat parents, death records, death certificates, district court files , divorce records, dmv records, driving records, dui and mvr files, dwi records, email address locator, estate records, family history detective, fbi files, federal court dockets, felony records, find lost people / classmates, fraud / scams / identity theft & alias files, genealogy detective, identity theft records, incarceration & felony arrests, inmates locator, immigration records, judgment files, legal resources, juvenile files, lien records, marriage records, marriage certificates, medical search, military records, missing people, naturalization records, navy/army/air force records, obituaries, offender records, parole records, personal information, people search, plaintiff defendants, police records, prison files, probate files, property records, public records, real property ownership records, rental screening, reverse address / phone # search, sentencing files, sex offenders, skip tracing, small claims records, state / country indictments, social security # search, state court records, superior court records, tax records, trademarks, unclaimed / hidden assets, unlisted home & cell phone numbers, vital records, warrant files, and much more! more info >>
NetVizor Network Surveillance
NetVizor is a powerful, award-winning, monitoring and supervising solution for the corporate or personal network. NetVizor allows the administrator to monitor their entire network from one CENTRAL location, with NetVizor's intuitive 'point and click' interface. Once NetVizor is deployed over your network you can remotely view logs and change the remote PC's settings all from the central location. more info >>
SpyBuddy is the ultimate solution for monitoring spouses, children, co-workers, or anyone else! SpyBuddy allows you to monitor all areas of your PC, tracking every action down the last keystroke pressed. SpyBuddy has the ability to log all AOL/ICQ/MSN/AIM chat conversations, all websites visited, all windows opened and interacted with, every application executed, every document printed, all text and images sent to the clipboard, and even every keystroke, including system keys! SpyBuddy also allows for screen capturing for visual surveillance! Recorded data can either be viewed using built in log viewers, or can be e-mailed to your e-mail address for remote viewing. more info >>
SpyAgent is a powerful monitoring and surveillance tool that is useful on all Windows platforms. SpyAgent allows you to monitor and record all system keystrokes, websites visited, windows viewed, applications ran, internet connections, passwords used, internet chats (icq/aim/msn/yahoo), and even take snapshots of the desktop. SpyAgent allows you to see how long websites and programs have been used, as well as the username of the user using them. SpyAgent allows you to get an accurate picture of who is using your PC, when, how, and what for. SpyAgent also has built in content filtering so you can keep others from running specified applications and websites! more info >>
WebMail Spy
WebMail Spy is the award-winning software package by ExploreAnywhere Software which will record all* web based e-mail! WebMail Spy records all of the web mail for services such as MSN HotMail, Yahoo! Mail, AOL WebMail, and many more! Other features include automatically filtering out e-mail, managing ruleset lists, an AutoUpdate feature, and more! WebMail Spy can also be configured to run in complete and total STEALTH mode! With WebMail Spy, you can easily moderate and view all web based e-mail that is viewed on your PC. more info >>
STARR PC & Internet Monitor
STARR PRO allows companies and individuals to track the use / abuse of PCs easily and invisibly. It logs keystrokes, user names, passwords, path names, access times, windows titles, BOTH sides of a CHAT conversation for most popular chat software, AOL content and visited websites into a password protected encrypted file. The encrypted log file can be converted to interactive log file, spreadsheet (e. g. Excel) format or plain text to fit different evaluation needs In the stealth mode STARR does NOT show up in the system tray, task bar or task list. For remote surveillance of (internet-) networked PCs STARR can (invisibly) email the log file to another PC via any standard email account or save the log directly to the server. Contains installation wizard for extremely easy setup and use. more info >>
PassBuddy is your #1 solution when it comes to storing your passwords in a safe and secure environment. PassBuddy utilizes a tough encryption algorithm, and lets you choose a password to protect your files on top of encryption. PassBuddy supports exporting to today's hottest business applications, such as Microsoft Word documents, Microsoft Excel Spreadsheets, HTML documents, and more. PassBuddy also includes PassBuddy Console Application 1.0, which allows you to create, edit, and store your password lists in a complete DOS environment. Other features in PassBuddy include the Password Assistant which makes dragging/dropping passwords easier than ever, password masking, auto idle detection for hiding your lists, a Password Generator for creating hard-to-crack passwords, and so much more! more info >>
Ever want to monitor your home PC from work? Want to monitor PC's across your corporate network from your web-browser? Do you want the ability to remote control, administrate, and monitor remote computers? SpyAnywhere is your solution! SpyAnywhere provides the power to remotely control computer's with SpyAnywhere installed - all from your favorite web-browser! SpyAnywhere allows many powerful controls for remote control, and also allows you to remotely monitor other computers. more info >>
AntiSpy eliminates the traces of your work on computer. It includes the features: Clear Cookies, Delete History, Delete Temporary Internet Files, Clear Cache, Clear Run history, Clear Find History, Clear Recent Documents List. more info >>
NETObserve is a powerful, discrete remote web based surveillance and administration suite. It includes the ability to monitor Internet chat conversations, websites visited, windows, applications ran, clipboard activity, printed documents, and more. It can also take screen shot shots at set intervals, as well as take pictures from external video devices such as a web cam. All logs are viewable securely from a remote location through a web browser. All logs can also be exported into four different formats, such as HTML, Excel spreadsheets, plain text, or CSV. Remote web based administration features include: file browsing/sharing, favorite place management, file searching, basic Windows configuration, viewing active Internet connections and open ports with the option to perform an instant WhoIs Lookup on any remote host, view IE image cache, take screen shots/web cam pictures, and more - all available from the convenience of your web browser - anywhere in the world! more info >>
Evidence Terminator
EVIDENCE TERMINATOR can DEEP CLEAN your computer system and protect you from prying eyes! Once Evidence Terminator is installed, you can forget about it as it clears out damning evidence every time you start your system! more info >>
Spytech Shadow is a unique monitoring solution that relies on visual logging to show you what is happening on your machine. Shadow uses built in screenshot playback to allow you to see what the users seen - as if you were seeing through their very eyes! more info >>
FileSpy allows users connected to a network with Novell Netware to see all the users who are using a specific file. It also allows viewing of the user's rights to the file/directory, how the file was opened, the user's network address, and the date and time the user logged in to the network. FileSpy can also be used to monitor files. See the date and time a user accessed a file and the date and time the user released the file (stored in a log file). FileSpy can be configured to alert you when a specified file is released by a user or notify you when a specific file is opened by a user. more info >>
SpySentry finds spy programs such keyloggers designed specifically to record your screen, email, passwords and much more! SpySentry will detect the spy, tell you when it was installed, and optionally disable it! more info >>
SpyLock is a secure desktop lockdown system that allows you to quickly and securely lock your PC down while you are away. SpyLock logs away messages from visiting users, invalid access attempts, and has a variety of access restrictions for your use! Also secure Windows security settings with SpyLock! more info >>
Quite often problems can arise with hard disk drives that cannot be solved without a technically advanced disk editor. Such problems that require immediate attention include: back up, copying, and/or recovery of boot sectors and other important data areas of a hard drive; search and/or extraction of information that was removed by accident or lost due to failures, or through the destruction from an erroneous computer virus. For these and a host of other problems, the professional Acronis DiskEditor software will help you solves and repair issues associated with your hard disk drives. more info >>
ProofEraser Deluxe
Acronis ProofEraser allows you to comprehensively remove data from a hard disk drive without the possibility of recovery. more info >>
KeySpy's main feature is its abilty to capture (log) what someone has typed on a PC keyboard. It can send recorded keys in an encrypted and compressed format to your email or save them in a hidden disk file. Then, you simply copy and paste the the text into the decryptor window to see what has been typed! more info >>
SecurityWorks is a complete set of nine different security utilities for personal and corporate use. The included utilities include password storage, secure encryption, secure deletion, desktop lockdown, powerful action surveillance and monitoring, application password protection, trojan removal and scanning, cover your tracks secure deletion, and port security scans. more info >>
HackerWacker Personal Edition 2 is a new update to our popular HWPE software. HWPE 2 monitors and logs URLS, keystrokes, Open Windows, and File and Shell Activity. An optional Filtering feature allows you to log to a fifth log for words and strings you define. All logs and data are encrypted for maximum security, and automatically decrypted when viewed. Other features include stealth mode option, hot key access, Email logs, Network Monitoring (with add-on). more info >>
Hide Folders Pro
Hide Folders is an access control utility that allows you to hide your sensitive folders out from users and applications. You need only to select folder(s) you wish to hide from prying eyes and click a button to hide these folders. more info >>
Lock My PC
Lock My PC allows you to lock your computer with a password while you leave it for a time. It shows a lock screen, disables Windows hotkeys and mouse. You can use a hotkey or the system tray to lock your PC. To unlock the computer you must enter correct password only. The program can log invalid entry attempts and has option to keep your PC locked even if power failure occurs or someone switch it off and on. more info >>
InThePicture encrypts files & messages into redundant parts of Windows BMP imagefiles. Provide extra security for e-mail attachments with up to 100 user-defined keys. Supports 16-color, 256-color & 24-bit BMP files, and the user interface supports drag & drop. Fully compatible with Windows95, WindowsNT & Windows98. more info >>
Anti-keylogger for Microsoft Windows is the FIRST product of its kind in the world that can provide every computer with virtual protection against all types of keystroke monitoring programs, both KNOWN and UNKNOWN. more info >>
Invisible Files Pro
Invisible Files 2000 Pro (IF2000Pro)is the program for Windows 95/98 that allows to hide any file or folder on the local hard drives of personal computers. The files are not physically deleted but they are invisible (even in Windows safe mode or DOS session). File systems FAT16 and FAT32 are supported. IF2000Pro also supports long filenames. more info >>
Stealth Keyboard Interceptor
Invisible in Task Manager, Saves the time of user logon and the name of current user. Intercepts all keystrokes, including special keys, mouse movement and clicks. Logs websites visited. more info >>
AlertMobile is a special software for computer security incidents responce. It monitors all attempts of unauthorized computer activity, sends SMS alerts to mobile device, receives and handles responce commands. AlertMobile can be used by security administrators for control of the corporate security policy, by parents for monitoring of their children computer activity, or by anyone else. more info >>
Jammer's powerful protection gives you peace of mind. Its unrivaled multi-barrier system blocks every step an intruder takes with sophisticated counter-measures that protect the Registry, monitor applications and inspect both incoming and outgoing connections by using its amended firewall. As a potent protection device, Jammer is like a cyber fortress defending you from attackers. Dangerous software such as Trojans, Backdoors, Ad-ware and Spy-ware can't get through Jammer's multiple walls. Its system monitor shows clearly and simply what processes are taking place at any moment and every connection made to and from your computer. It is designed so even novice users can easily control its powerful engines. more info >>
Outpost Firewall
Outpost Firewall is the most feature-packed Personal Firewall for Windows in the world. It gives peace of mind from any threats by Cookies, Ads, E-mail viruses, Backdoors, Spyware, Crackers, Adware and virtually every other Internet danger. Outpost keeps your computer in stealth mode, making it invisible to potential attackers. It even lets you browse the Internet without annoying advertisements. No lengthy configuration is needed. Outpost starts protecting against all kinds of internal and external attacks as soon as it's installed. It's the perfect choice for protecting yourself and increasing the connection speed for home and office use. PLUS Outpost is the first personal firewall developed with Open Architecture so anyone can create his or her own plug-ins! more info >>
Stealth Activity Monitor
Stealth Activity Monitor is a new, award-winning tool to monitor the use / abuse of PCs: It logs all keystrokes, user names, passwords, path names, access times and windows titles of the active applications The information is stored in a password protected encrypted textfile. A customizing wizard lets you easily choose between several options: logfile encryption, autostart and an open or stealth operating mode, logfile backdating and more. In the stealth mode SAM does NOT show up in the system tray, task bar or task list! more info >>

home  ·  download  ·  order  ·  support  ·  links  ·  spyware  ·  affiliate

Links to partner projects:

Copyright © 1999-2020 SoftCab Inc. All Rights Reserved