Covert Surveillance software downloads

CrossTec Secure 2.0
CrossTec Secure is designed for IT managers who would like to protect their Windows operating systems from unwanted or malicious activity in their schools or businesses.
 
2

Demo
USB CopyNotify 1.3.3
Stop the DATA leak. Advancement of USB technology Now enables us to store gigabytes of data on a USB removable device that can be easily concealed in the palm of your hand. Anyone could discreetly insert this USB device into any of your PCs on your
 
2

Free to try
Microsoft Forefront Security for SharePo 10.1.0802.0
Forefront Security for SharePoint helps businesses protect their Microsoft Office SharePoint Portal Server 2007 and Windows SharePoint Services 3.
 
2

Freeware
Microsoft Netmon Protocol Parsing Vulner MS00-083
Microsoft has released a patch that eliminates a security vulnerability in Microsoft Windows NT?? and Windows 2000 server products and Systems Management Server. The vulnerability could allow a malicious user to gain control of an affected server.
 
2

Freeware
UniKey Software Protection 2.11
SecuTech Unikey copy Protection products were augmented by the introduction of driverless UniKey Dongles that maintained the same high level of security by means of a small hardware key that fitted into the user's USB port.
 
2

Freeware
ListPermissionsUP for SharePoint 1.0
ListPermissionsUP for SharePoint extends the capabilities of permissions management in SharePoint lists.
 
2

Free to try
Smart Computer Locker 1.0
SMART Computer Locker is a computer locker, it can help you to Lock the computer.
 
2

Free to try
LyncRMS File Encryption 4.3
The LyncRMS Encryption module enables organizations to encrypt selected files copied to removable media devices.
 
2

Free to try
Outpost Network Security 3.0.220.9817
Outpost Network Security proactively protects small and medium-sized businesses from inbound and outbound threats, safeguarding the network and keeping workstations healthy.
 
2

Free to try
Cisco Video Surveillance Virtual Matrix 6.3.2
Cisco Video Surveillance Virtual Matrix Software enables an operator or application to control and display video on any number of local or remote physical and virtual monitors.
 
2

Demo
Campro Professional Controller 1.3.3.54185
The CamPro Professional is AirLive’s intelligent video surveillance recording application that is designed to meet most demands for professional installations.
 
2

Demo
Supreme Spy 4.01
Supreme Spy is a computer monitor/keylogger that records all activity on your computer, capturing keystrokes, programs, internet explorer websites and screenshots.
 
1

Demo
SC-KeyLog PRO 3.2
Is your spouse engaging in online sexual conversations while you are away? Are you afraid that your kids visit adult web sites? Do your employees spend hours sending personal e-mail messages and surfing the web? If you worry about these issues, you
 
1

Demo
Personal Inspector 6.20
Personal Inspector is an employee monitoring/parental control tool that monitors all computer activity and Internet use.
 
1

Free to try
IMSurfSentinel 2005.5
IMSurfSentinel spy software is the perfect Internet Monitoring solution. It enables you to secretly monitor and control Intenet and computer use. With this spy software, you can monitor and log instant messenger activity, browser activity and
 
1

Free to try
PC Tattletale 7.9.2
New parental control software and Internet monitoring software captures everything your child does online; what they see, where they go and even who they talk to.
 
1

Demo
IM-Snif 2.2.35
IM-Snif allows a system administrator to view and log all Instant Messages passing through a LAN, including popular networks such as MSN Messenger, AOL Instant Messenger and ICQ Messenger.
 
1

Free to try
EagleEyeOS 2.0.3
File Lifecycle Tracking (FLT) Who did what and when did it with the file? Where and under what name can the file be found? FLT is a specially developed feature to trace what kind of operations happened with the file since its creation. This function
 
1

Free to try
EagleEyeOS One 3.0.1
Quick and easy-to-manage data protection solution to prevent data leakage. Documents are protected from the unauthorized accesses efficiently and up to date. It generates alerts about portable devices connected illegally to the computer. Access
 
1

Free to try
Inside Keylogger 4.7
Inside Keylogger records all activities performed on a remote computer and sends reports to a specified email address.
 
1

Free to try