Software Listing: Process Activity Monitor

SurveilStar Any Employee Monitor is a great computer controlling software which can help you to monitor, record, control and block employees' internet activities. You can monitor the employees’ online activities to keep them doing what they are supposed to be doing and secure company’s commercial secret and intellectual property. This employee monitoring software can easily record all visited web pages with URL link, visiting time, page title, web host and data size, record all incoming and outgoing web emails including sender, receiver, time and detailed contents, record all emails sent and received by email clients including Outlook, Outlook Express, Thunderbird and more, record all downloaded and uploaded data via browsers and support all unencrypted POP3, SMTP and IMAP emails.

  • Platform: Win2000, Win7 x32, Win7 x64, WinOther, WinVista, WinVista x64

Print Explorer is an application that controls all printing activity. This spy solution helps you stay in touch with printer activities even if you are not in your office or at home. You'll get the reports for each user, in case of multiple users on a computer, by e-mail by specifying an e-mail address and the frequency for sending e-mails. Print Explorer allows you to manage printing, audit and log all printing activity, analyze and monitor your printing cost, and a very important thing, to eliminate wasted paper. All of these are possible because using this application you can see the number of printed pages and their cost.

  • Publisher: All Spy
  • Date: 06-11-2012
  • Size: 1065 KB
  • Platform: WinOther

Who Changed My Registry? BDHSoft RegMonitor will tell you. RegMonitor is a utility that monitors all Registry activity on a system. It tell you how applications operate the Registry, and it can trace all operations of the Registry, including querykey, createkey, setvalue and so on. You can use RegMonitor to track down some problems from special application. RegMonitor don't need snapshots and displays real-time activity. You can restore your Registry from activity records. Functionality Start/Stop capture Filtering records Searching the Rrecords Display different records with different text color or background color Attatch to an existing process to monitor Open a new program to monitor Jumping to a key or value in Regedit Export to a csv format file.

  • Platform: WinOther

NexSpy is a useful application that was especially designed to help you record and monitor all the PC activities. The program captures online as well as offline activity, takes screenshots, records keystrokes.

NexSpy allows remote monitoring so you can use your Android device or iPhone to view what's going on on the computer where the application is installed.

NOTE:
You have to create a free account on this page to enjoy the basic features of NexSpy.

.

  • Platform: Win2000, Windows 7, Windows 8, WinOther, WinServer, WinVista

Portmon is an application which monitors and displays all serial and parallel port activity on a system. It has advanced filtering and search capabilities that make it a powerful tool for exploring the way Windows works, seeing how applications use ports, or tracking down problems in system or application configurations.Simply execute the Portmon program file (portmon.exe) and Portmon will immediately start capturing debug output. To run Portmon on Windows 95 you must get the WinSock2 update from Microsoft. Note that if you run Portmon on Windows NT/2K portmon.exe must be located on a non-network drive and you must have administrative privilege.

  • Platform: WinOther

Simple APIs of Profense SDK include powerful functions: multi layer packet filter (transport layer and channel layer), system services monitor (SDT monitor), IDT monitor, GDT monitor, LDT monitor, registry and filesystem access monitor, NT object manager monitor, filesystem filtering interface, executive objects monitor (processes and threads), executable objects monitor (executable images and sections), state-of-art hidden executive objects monitor (SMM based), abnormal activity monitor (SMM based), abnormal activity monitor (VMM based, including VMX SVM interfaces), executive objects manipulation interface (using for hidden objects in-memory heuristic search), Patch Guard manipulation interface (using for internal purposes), interface for search of non-exported symbols in kernel environment, real-time instruction tracer interface...

  • Platform: WinOther, WinVista

Privacy is becoming a major concern for PC users these days and using Security suite may not be enough in most situations. It becomes even more pronounced when you share a PC with others at home or workplace. It is not possible for you to keep a tab on activity of those users at all times, no matter how vigilant you are. However, it is definitely possible to use suitable apps to monitor activity of other users, in your absence. If you want a capable and feature rich PC activity monitoring application that works silently, try PC Monitor Expert. It captures myriads of PC activities silently and runs in a stealthy manner.

  • Publisher: DoGoodSoft
  • Date: 22-09-2014
  • Size: 3178 KB
  • Platform: Win2000, Win7 x32, Win7 x64, Windows 8, Windows Vista, WinOther, WinVista, WinVista x64

The software of Parental Control for your computer recommends lots of features to safe and even checks your employees or family online. For beginners, few spouses can think powerfully that the other is corrupt on them. With definite monitoring software of parental control, you can map out each and every typed word, each and every conversation and also each email. Alternatively, you may wish to stop your family from accidentally or intentionally accessing adult associated material like adult videos and online pornography that are being recommended from several websites for without any cost. Lots of software for parental control can even block other unnecessary content associated to drugs, violence, abuse, guns, bomb making, chat programs, and illegal file sharing web sites.

  • Platform: WinXP, WinVista, Win7 x32, Win2000, Windows 8, Windows 10

Instant Monitor allows you to monitor employee's activities on all network computers, such as email, instant message, keystrokes, FTP file transfer, websites visited, applications used, etc. Instant Monitor also can log file operations on employee's computer, such as copy, delete, create, rename, open, copy file to removable disk, etc. Send alarm to console computer when employee do a file operation on removable disk, add or remove a removable disk, open an unwanted website, send or receive mail, transfer file with FTP protocol, etc. You can also see live screenshots of multi network computers and take a control of a remote computer by controlling it's mouse and keyboard, this is especially useful when you need to assist the person who uses the remote computer, and you can edit file, open file, download file and upload file remotely.

  • Platform: Win2000, Windows Server, Windows Vista, WinOther

It is hard to imagine an office without access to e-mail. Just as hard as finding a large company that does not have irresponsible employees who prefer exchanging e-mail messages with their friends rather than doing their job. If you are a manager, business owner or IT specialist, you have to know that there is a simple, quick and inexpensive way to take control of corporate e-mail system. Mail Access Monitor is a simple tool that analyses mail server logs and shows how much traffic is being used by e-mail, who sends and receives most messages, where the messages are being send to and if e-mail abuse takes place in your office.

  • Platform: Win2000, WinOther

Monitor all running processes and terminate badly behaved processes Advanced Process Controller is a software application thet displays all currnetly running processes on your Windows system and allows you to manage them. You are able to kill selected processes in a snap, which can not be realized by the classic Task Manager. It is an extremely powerful and versatile replacement for the Windows Task Manager. This impressive utility is an absolute power user's delight. Advanced Process Controller Free Version provides an attractive tabbed interface that shows active processes, finished processes, windows, modules, and a statistics panel that features real-time monitoring for memory and CPU usage.

  • Platform: WinOther

Company offers USB data theft protection software that provides tracking for insertion and extraction activities of USB mass storage on client machine over Windows network. Reliable and secure USB drive activity monitoring software runs in hidden mode to track overall activities of USB mass storage device on client system configured on Windows network application. LAN USB drive data security software for Windows network helps to prevent block USB accessing or data theft through USB device in real time by external or unauthorized users. Secure USB drive data leakage protection application enables user to track insertion and extraction of USB mass storage on client system.

  • Platform: Win7 x32, Win7 x64, Windows Server, WinOther, WinVista, WinVista x64

Monitor and track all internet activity via password-protected logs.

KDT Web History Tracker enables the user to track and log internet activity via a professional password-protected interface. The application includes the ability to run discreetly and automatically upon Windows start-up.

The software comes complete with a simple and effective way of delivering log file information; including date and time of website and URLs visited, in addition to offering the ability to view visited websites.

Importantly, KDT Web History Tracker also works when internet cookies, cache and/or history have been deleted in addition to being able to run even when 'private browsing' features are active within a browser.

  • Publisher: KDT Soft.
  • Date: 16-06-2011
  • Size: 2152 KB
  • Platform: Win2000, Win7 x32, Win7 x64, WinOther, WinVista, WinVista x64

WorkTime - Internet monitoring software for companies, home offices, professionals and home users. Automatically monitor Internet related activities by the users: browsing web-sites, chatting, reading and writing emails. Monitor time spent on each activity. Monitor internet usage on company\'s computers, laptops, on your home computer or under Terminal Server, Citrix Server. Companies - Monitor Internet related activities invisibly to the employees. Automatically generate scheduled reports. Find-out the most used Internet resources, employees, spending too much time browsing the Internet, chatting.

  • Platform: Win2000, Win7 x32, Win7 x64, Windows Server, Windows Vista, WinOther, WinVista, WinVista x64

This program is for real time monitoring of users activities on network computers and for employees' work time tracking. It monitors usage of all office computers connected to a network. Managers can see typed keystrokes in real time, take snapshots of the remote screen, view what programs are open, stop inappropriate programs, view visited web sites, send instant messages, copy files from a remote PC and control computers remotely. This program will also record every email and instant message sent and received by users on all computers. Keylogger module records, in addition to English keystrokes, any characters in Asian languages, such as Chinese, Japanese, Korean and recognizes accented characters in such languages as German, Spanish and Portuguese, for example.

  • Platform: WinOther

Protect your family Most children who have a PC at home use the internet for games, education and other recreational purposes. Although it opens a world of increased opportunities for children; it also exposes them to threats and dangers posed by cyber criminals. Take a proactive stance with your children's computer and internet use. ONEXESS helps you monitor and protect your children from online threats. With ONEXESS you can monitor their online activities remotely at any time and from anywhere Protect your business More than 70 percent of the online population has accessed the Internet at work for personal use at least once.

  • Platform: WinOther
  • RUBotted
  • License: Freeware
  • Price: 0.00
  • Rating

Monitor your computer for potential infection and suspicious activities associated with Bots. Upon discovering a potential infection, RUBotted prompts you to scan and clean your computer. Malicious software called Bots can secretly take control of computers and make them participate in networks called 'Botnets.' These networks can harness massive computing power and Internet bandwidth to relay spam, attack web servers, infect more computers, and perform other illicit activities. Security experts believe that millions of computers have already joined Botnets without the knowledge of their owners.

  • Publisher: Trend Micro
  • Date: 08-05-2012
  • Size: 6359 KB
  • Platform: WinOther

It is hard to teach a group of people how to use a PC, or even how to use a specific program on a PC or the internet. Yes, PC or web training isn't easy. For someone who's doing something right, there are probably two others doing it wrong, playing games, checking email, shopping... Classroom Spy lets you see what everyone's doing - without leaving your desk. You can monitor the activity of all the PCs in your classroom remotely. Plus, you can share your screen with your students' PCs, making demos and presentations much easier. Features See live screens of all students' computers Show your screen to students Take a control (mouse & keyboard) over student computer Lock all students' computers to get the attention Record remote computers screens to AVI files Execute several tools like power off, restart, hibernate,...

  • Publisher: EduIQ.com
  • Date: 04-11-2012
  • Size: 11059 KB
  • Platform: WinOther
  • KeyOff
  • License: Freeware
  • Price: 0.00
  • Rating

KeyOff monitors keyboard and mouse and initiates computer shutdown if the there has been no key or mouse activity for a specified length of time. It can be started manually or automatically via the Windows Task Scheduler. The shutdown time and many other parameters can be configured via the configuration screen. It can also be used to shutdown a remote computer. Shutdown has been configured to force all running applications to close. KeyOff is part of the JSutils group of software utilities which have a theme of energy conservation. The program normally runs in the System Tray. Requires a registration code (free for personal non commercial use).

  • Publisher: JSutils
  • Date: 20-11-2012
  • Size: 492 KB
  • Platform: WinOther

OpenBAM is a Business Activity Monitoring(BAM) application for Operations Managers in service organizations who are constantly trying to figure out what's effecting their business by trying to co-relate data from multiple systems..

  • Platform: Linux

Page: 1 | 2 | 3 | 4 | 5 | Freeware

New Reviews


Chicken Invaders

Chicken invaders is a free ware arcade shooter game that hasheavy influence from classic titles like space invaders, or arcanoid. What chicken invaders does to the concept, however is add its own level of humour and gameplay to the mix. For ...


My Paint

Do you own an android phone? Do you find It annoying how there is no visual note storing app (or indeed, any app for storing notes or writing important things down at all)? My paint is a handy downloadable app for the android operating system that ...


End Of Room

End of room is a free ware platformer game with a black and white retro feel to it, like the game shift, except where shift innovated on the concept of a puzzle platformer, end of room does the exact opposite. Firstly though, the premise. In end of ...


Ad-Aware Free Antivirus+

You might have experienced that with some programs, other smaller programs are attached and they get installed silently. Also, many times, these programs, also known as adware or spyware, are downloaded silently or by mistake through internet. ...


Acebyte Utilities

Acebyte Utilities is a modern looking application, designed to help speed up your computer via system optimization and error correction. In the long run, this could help prevent freezes and slow downs, as well as the dreaded blue screen of death ...


AM Browser

AM browser is a freeware browser from 2009, which markets itself allowing you to surf the web in a more comfortable, less confusing way. Once you install and open AM browser, the first thing you will notice is how out dated the look of it is. Most ...


World Domination 2

World domination 2 is a free flash turn based strategy game which has so many complex and realistic additions to the formula in the form of how production, technology and diplomacy between countries work, that it borders on being a realistic war ...


File Finder

File Finder is such a simple and easy program to use to track down and locate files and folders on your system. I think this has to be a fantastic selling point, but maybe also its downfall. It instantly took me back to the retro MS-DOS based ...


Disk Drive Administrator

Disk Drive Administrator is a really simple and easy to use program that lets you deny access to and hide different drives, partitions and network shares on a computer. It also lets you disable AutoRun features.

The main Disk Drive ...



New Downloads

dbForge Query Builder for
MySQL

dbForge Query Builder for
MySQL is a visual tool for
quick queries creation and
extended data management. With
the help ...

PureVPN Mac VPN Software

PureVPN\'s VPN service has a
redesigned Mac VPN client that
comes with hack-proof
encryption and a new protocol:
IPsec. ...

1st Choice Free Clipboard
Manager

1st Choice Clipboard can copy
and store up to 25 different
clips, text or graphic. which
you can sign in to all your
web ...

Easy GIF Animator

Easy GIF Animator is a
powerful yet easy to use app
for creating and editing
animated pictures, banners,
buttons and GIF ...

Mgosoft PCL Converter SDK

Convert PCL (pcl, pxl, px3)
files to PDF, XPS, Text, PS
and dozens of image formats,
such as TIFF, JPEG, PNG, BMP,
PCX, ...

Capsa Network Analyzer
Standard Edition

Packet sniffer (network
analyzer or network sniffer)
for network monitoring and
troubleshooting. It allows you
to monitor ...

Extra Subst

Extra Subst - program designed
to make access to frequently
used folders of your computer
easier. It is also used to ...

File Viewer

File Viewer is an multi
purpose Disk/File Management
Program with functions for
finding, viewing, printing,
email, and ...

Bandwidth Management and
Firewall

BMF is tool for network
administrators who needs to
have control over traffic
shaping, transferred data and
network ...



Related Searches

Process Activity Monitor Process
Pc Activity Monitor Professional
File Activity Monitor
Cd Activity Monitor
Employee Internet Activity Monitor
Data Doctor Usb Activity Monitor Windows Network
Hard Disk Activity Monitor
Activity Monitor Software
Security Activity Monitor
Activity Monitor Freeware
Ftp Activity Monitor
Process Priority Monitor