(sometimes we provide two download links because it may happen that the main server / link is overloaded or slow or non responding - the files are identical. Just choose one, save to the Desktop, double click to install)
Disclaimer: to our best knowledge this download comes from a website that is
safe (the last time we checked it, it was), but for your peace of mind (and better safe than sorry) we advise you to run an
antivirus on the downloaded file. Do not rely on MSWindows, Internet explorer, or on the electronic signature: a unsigned download is usually as safe as a signed one, signed just means the author paid Microsoft or Verisign for a stamp, it does not mean verified. Please kindly
report us problems with detail (click here to report), if any.
PC Activity Monitor Lite (PC Acme Lite) is an ultimate invisible and undetectable easy-to-use monitoring and surveillance tool for personal PCs. It is professional software that captures all users activity on the PC. It is a powerful management tool for users and companies, which want to increase their productivity and profitability. This is the most remarkable security product for a computer you have seen.
(
Ultimate invisible and undetectable easy-to-use monitoring tool.)
PC Activity Monitor Lite (PC Acme Lite) is designed for monitoring user's PC activity.
PC Acme Lite works under Windows 2000/XP operating systems. All data collected by the monitoring are saved to the encrypted log file located on the user's machine. Monitoring program works in background, transparent for the user, on the level of OS kernel.
PC Acme Lite supports UNICODE, i.e. it is able to record even the languages with hieroglyphic writing. Another strong side of PC Acme Lite is its protection measures. It is completely hidden, and even the experienced user cannot locate, stop or destroy the program.
PC Acme Lite ensures registration of the following events:
typing;
clipboard operation;
application start and termination (from the moment of OS loading);
mouse manipulation;
opening and close of windows.
Additionally, at opening and closing windows the following information is registered:
text in the window;
registration of list elements for the components listbox, combobox, listview, treeview etc.
Each event has its own timestamp. Information from the log file after it has been correspondingly decoded and operated is entered in the database (DB). Reports from the DB are converted to HTML format for more convenient viewing in browser.
security, monitoring, intelligence, access control, parental control, investigation