A+ Stealth WebSite Logger is an invisible, easy to use surveillance application that monitors and records all Web sites visited by a user or computer. All accessed Web sites are recorded in a detailed report that can be viewed in Web format or sent to a specified email address. A+ Stealth WebSite Logger is suited for both office and home use, monitoring one computer or an entire network. Version 3.1 has improved functionalities and a new UI.
What is new in this release:
Version 3.1 has improved functionalities and a new UI.
Windows 2000/XP/2003 Server
Like it? Share with your friends!
Other Windows Software of Developer «Amplusnet»:
Stealth KeyLogger Stealth KeyLogger is an invisible, easy to use surveillance application, designed to monitor and record all activities on a computer. Perfectly suited for both office and home use Stealth KeyLogger offers detailed information on who uses your computer, the
Application Blocker Pro Application Blocker is both an internet parental control software and a monitoring solution that protect your child while surfing the Internet. The application will block inappropriate Web sites, chat application, games, or system folder like Task Manager.
Cyclope Enterprise Printer Monitor Cyclope Enterprise Printer Monitor is an easy to use application that monitors all printers connected to a machine and records all print job details. Cyclope Enterprise Printer Monitor has been developed to help managers and system administrators better as
Cyclope Internet Filtering Proxy Cyclope Internet Filtering Proxy monitors the entire Internet traffic and blocks the access to websites and files according to the chosen filter. The requested web pages are displayed only if they comply with the specified filters. The Internet Filter allo
A+ Printer Monitor Complete printer activity control - user, documents, number of pages, and costs. A+ Printer Monitor is an application that monitors the activity of up to three printers connected to a machine. Suited for small to medium size companies, A+ Printer Monitor i
A+ File Protection A+ File Protection encrypts and hides a file within a BMP image file. A+ File Protection is an easy to use tool that hides a specified file into a password protected BMP file. The carrier file preserves its initial format, allowing access and view mode as
Anonymous Browsing Toolbar Anonymous Browsing Toolbar automatically hides your IP address by providing a list of high-anonymity proxies from various countries. The program is an easy-to-use, online-privacy application designed to protect your online identity. It hides your IP addres
Invisible Browsing Invisible Browsing suits both less experienced users and advanced users, through his manual or automatic mode. The manual mode allows you make all the settings, to choose the proxy and test it, while in the automatic mode all you have to do is a simple cli
Real Time Cleaner Real Time Cleaner is a privacy-protection tool that securely deletes online Internet tracks and program-activity records stored in your browser and other hidden files on your computer. It maintains your online privacy by permanently erasing all your online
removableTrezor removableTrezor is a Windows-based application, a simplified version of our miniTrezor program. It has to be installed onto a removable media, on which it creates a protected, safe store for your sensitive data: files are encrypted and password protected.
The Vault More stable, more flexible, more efficient, more secure, bottom line more piece of mind from Jensen and Brusca Consulting Group. The Vault is back with new and improved features. A more flexible file repository, stronger AES encryption that's faster than p
Free Folder Hider Almost every computer user keeps files that are personal, private and confidential, or important to be preserved as undeletable. You may have files that are inappropriate for kids or other family members, or files with valuable information that can be stol
Advanced File Hash Portable Advanced File Hash is a free security tool to calculate and check files integrity with most common hash functions (MD5, SHA-1, SHA256, SHA384, SHA512, CRC32). Simply add your files, choose the hash type you prefer, then copy the values to the clipboard.
MAXA Key Exchanger MAXA Key Exchanger uses a cryptographic protocol Diffie-Hellman key exchange that allows two parties that do not know each other to jointly establish a shared, secret key, over an insecure communications channel (like email or instant messaging). This key
QuickCrypt QuickCrypt is an application to mount or unmount files. Features include load TrueCrypt image fast, save setting, and open mounted device.
Chaos MD5 Chaos MD5 is a free MD5 generator for Windows. Input any file into this free program and it will generate a MD5 checksum for that file. That simply means it generates a unique signature for each and every file. Chaos MD5 does not require installation; simp
Virtual Encrypted Disk VE-Disk is a small, compact program for creating encrypted virtual disks. It helps you keep your sensitive and vulnerable data and documents, or anything else you may consider private, secure from unauthorized access. With VE-Disk, you can create new virtu
EncryptDrop Free Edition EncryptDrop Free Edition is completely free streamlined file encryption software for Windows. The drag and drop program interface allows fast encryption and decryption. EncryptDrop Free Edition supports AES encryption algorithm, and includes such features
Secure Shield Secure Shield lets you password protect any program or folder. Simply drag and drop any office documents, software, personal finance records, e-mail attachments, or virtually any other sensitive data and Secure Shield takes care of the rest. Secure Shield
Supported Operating Systems:
Windows 2000 |
Windows XP |
Comments on Stealth WebSite Logger:
Comments not found
Windows Software - Free Windows Downloads, Apps, Games, Freeware, Skype, Media Player, Antivirus, Gimp, Live, Starter for Windows XP, Vista, 7, 8, 10