SC-KeyLog PRO v.3.2

Is your spouse engaging in online sexual conversations while you are away? Are you afraid that your kids visit adult web sites? Do your employees spend hours sending personal e-mail messages and surfing the web? If you worry about these issues, you need SC-KeyLog PRO. With this amazing spy program installed you can monitor everything that is going on on the computer.SC-KeyLog PRO is a powerful digital surveillance monitor that logs computer activity for later review. Use this keylogger to see what your spouse, child, employees or friends are doing online. It records all typed keystrokes, visited web sites, system logon passwords, clipboard usage, passwords behind asterisks and much more in total stealth. The program can easily be deployed on remote systems. Logfiles can be sent in stealth to your e-mail address, bypassing local firewalls.Key features of SC-KeyLog PRO are:* Captures all keyboard input, mouse clicks, window titles * Captures program startup/shutdown * Captures visited web sites, clipboard usage * Captures passwords behind asterisks * Captures windows 9X/ME/2000/XP/2003 system logon passwords * Install once, monitor forever * Monitor all users of the computer * Remote installation/removal support, no physical access required * Installation package is less than 100 Kb * Automatic uninstalllation after X days option * Configurable icon for the installation package * Logfiles can be delivered to your e-mail address in stealth* SMTP Authentication support * Logfile size limit for sending mail * Logfiles are sent compressed * Automatic discovery of suitable e-mailservers * Access to the software can be password protected * Built-in logfile viewer with filter and search support included * Logfiles can be exported to HTML pages Limitations of the demo: 10 day trial. Invisible monitoring is disabled and only the first 3 characters of passwords are logged.

Is your spouse engaging in online sexual ...

stealth, surveillance, report, remote, keylogger, child, log

 
  • SC-KeyLog PRO
  • 3.2
  • Soft-Central
  • Windows All
  • Demo
  • 965 Kb
  • 223
  • $49.50
 
 

Review SC-KeyLog PRO

  • captcha
 

Other software of Soft-Central
  • SC-DiskInfo Standard Edition  v.1.11SC-DiskInfo is a disk space usage analyzer. This program will track down those folders and files that are using most disk space so you can remove unwanted data and clean up your drive effectively. SC-DiskInfo is very fast and easy to use.
  • SC-KeyLog Free  v.2.25SC-KeyLog is a powerful, invisible keylogger that captures all users activity and saves it to an encrypted logfile. It has mailing capabilities and custom keylogger engines (of only 33 KB!) can be deployed on remote systems with ease.
  • SC-PassUnleash  v.1..0Most applications under Windows allow you to store their passwords. Examples are the passwords of ISP's, the password of your email client or FTP tool. Once the password is stored, it is hidden under a row of "***" asterisks and cannot be read again.

New Encryption software
  • BestCrypt Volume Encryption  v.4.21.0BestCrypt Volume for Disk Encryption protects all data on fixed and removable disks, while also working on RAID, UEFI and GPT partitions. Jetico's encryption software provides protection from physical threats, such as lost computers and USB sticks.
  • Secure IT Encryption Software  v.14.2.5.0Encrypt and compress any type of data on any Windows PC with Secure IT File Encryption Software. Shred any file or folder. Send Secure e-mail. Full command line Support. Zero learning curve.
  • WinGPG  v.1.0.1Free encryption tool with simple and powerful interface to protect your data. Its open source software based on GPG public-key cryptography to encrypt/decrypt files and sign/verify digital signatures. Its free to download and easy to use.
  • Mgosoft PDF Security Command Line  v.9.9.6Mgosoft PDF Security is a simple, stand-alone application that can help you decrypt password-protected pdf files or help your encrypt your pdf files.
  • PasswordZilla  v.1.02PasswordZilla is a powerful password and hash generator for any your projects. It's interface is simple, and easy to comprehend. PasswordZilla allows you to easily generate and store passwords, hash and data in a different formats. It will be helpful ...
  • XorIt  v.1.032Most file encryptors use methods that rely on the theory of computational security, that is difficulty of key factorisation prevents decryption of the file. But this method may not work forever. It used to be considered that a 56 bit key was ...