Asoftech Automation records all operation of mouse and keystrokes and saves them as macros. It can play back the recorded macros to automate recorded tasks any number of times.It is very easy to use and doesn't require any programming experience.
Asoftech Photo Recovery is an easy to use data recovery software available to restore your photos, music and videos from local PC and removable devices. No matter multimedia files have been deleted accidently, or memory card has been formatted.
Ardamax Keylogger is a small, easy-to-use keylogger that captures useractivity and saves it to a logfile. The logfile can be viewed as a text or web page. Use this tool to find out what is happening on your computer while you're away.
Spytector Lite is the most stealth and undetectable keylogger available for Windows platform. Spytector Lite keylogger is undetectable for the most used antivirus products! Official website: www.spytector.com
Ultimate Keylogger monitors all activities on computer systems including applications, keyboard, passwords, clipboard, chat, email, and visited websites. It sends encryptedactivityreports invisibly via Email, FTP or network.
ActiveKeyloggerPro is used to investigate, in stealth mode, all activities of your employees, spouse and kids. Active Keylogger is monitoring all PC activity, from keystrokes to scheduling screenshots at set intervals. See www.activekeylogger.com
With KGB Free Keylogger, you will never lose any of your text, whether it was typed in an e-mail client, a text editor or an on-line form. This free programlogs everything you type. Get your passwords, registration keys and other info safely logger
Spy Patrol is a user-friendly spy software that runs hidden in the background. Spy Patrol records in stealth mode all th keystrokes typed, passwords, websites visited, chats etc. and takes screen shots of the active windows. See www.spy-patrol.com
SpyShelter Firewall monitors susceptible and weak spots in your computer system, in order to ensure that even the most advanced keyloggers and trojans are shut down even before these can launch a single dangerous attack against your computer.