(sometimes we provide two download links because it may happen that the main server / link is overloaded or slow or non responding - the files are identical. Just choose one, save to the Desktop, double click to install)
: to our best knowledge this download comes from a website that is safe
(the last time we checked it, it was), but for your peace of mind (and better safe than sorry) we advise you to run an antivirus
on the downloaded file. Do not rely on MSWindows, Internet explorer, or on the electronic signature: a unsigned download is usually as safe as a signed one, signed just means the author paid Microsoft or Verisign for a stamp, it does not mean verified. Please kindly report us problems with detail (click here to report)
, if any.
Spy software that runs invisible and records how computer has been used. SoftActivity Keylogger records to an encrypted log file Internet history with web page titles, received and sent email (POP3/SMTP), IM chats, typed keystrokes and passwords, programs that user runs and work duration in every application. It can take screenshots of every action, working like video surveillance camera. Captured snapshots can be viewed later as a slide show.
(Spy software that secretly records chat, email, Internet, keystrokes, programs
Spy software that runs invisible and records how your child, spouse or employee uses computer.
SoftActivity Keylogger records to a log file visited Internet sites with web page titles, received and sent email (POP3/SMTP), IM chats, keystrokes in all applications including passwords, programs that user runs and work duration in every application.
It will save screenshot of every opened web page and application using IntelliSnap technology. SoftActivity Keylogger can take screen copies in specified time intervals, working like video surveillance camera. Captured snapshots can be viewed later as a slide show.
Log file from the monitored computer can be emailed to you silently when computer goes online. Log file is securely encrypted. Examine recorded information conveniently in a tabbed viewer. Have Internet, email and every application usage statistics.
Logging Engine runs invisibly and cannot be terminated in Task Manager without Administrator permissions. Logger can be configured to pop up a warning message on start-up and show icon in system tray. Keylogger configuration utility is secured with password.
Protect your child from online threats. Know exactly what they do online.
spying, keylogger, email, chat, parental, control