(sometimes we provide two download links because it may happen that the main server / link is overloaded or slow or non responding - the files are identical. Just choose one, save to the Desktop, double click to install)
Disclaimer: to our best knowledge this download comes from a website that is
safe (the last time we checked it, it was), but for your peace of mind (and better safe than sorry) we advise you to run an
antivirus on the downloaded file. Do not rely on MSWindows, Internet explorer, or on the electronic signature: a unsigned download is usually as safe as a signed one, signed just means the author paid Microsoft or Verisign for a stamp, it does not mean verified. Please kindly
report us problems with detail (click here to report), if any.
PC Activity Monitor (PC Acme) is an ultimate invisible and undetectable easy-to-use monitoring and surveillance tool for both networked and personal PCs. It is professional software that captures all users activity on the PC. It is a powerful management tool for users and companies, which want to increase their productivity and profitability. This is the most remarkable security product for a computer you have seen.
(
Ultimate invisible and undetectable easy-to-use monitoring tool.)
PC Activity Monitor (PC Acme) is an ultimate invisible and undetectable easy-to-use monitoring and surveillance tool for both networked and personal PCs. It is professional software that captures all users activity on the PC. All data collected by the monitoring are saved to encrypted log file. It is a powerful management tool for users and companies, which want to increase their productivity and profitability. This is the most remarkable security product for a computer you have seen.
Program works in background, transparent for user, and captures the following events:
- Application start
- Switching between applications/windows. In addition program saves
static text elements and windows edit controls:
- Window content of most chat clients (ICQ, AIM, Yahoo etc.)
- Content of Internet browser window (Internet explorer)
- Mail content, viewed by Microsoft Outlook and Microsoft Outlook Express
- etc.
- Keystrokes
- Pasting text from clipboard
- File operations
- System registry operations
- Application installation/uninstallation
- Putting programs in Startup folder
- Visiting web sites.
Log files are converted to HTML format for more convenient viewing in browser (Internet Explorer 4.0 or higher is recommended).
security, monitoring, intelligence, access control, parental control, investigation