Search results for 'eliminate all hidden evidence activity'. The following words were ignored: 'all'.
569 products found. Showing 14-30 in 10 groups sorted by relevance.
14. nnCron
Display/hide/close/kill/minimize/maximize and hide specified windows to system tray,. Emulate keyboard input and mouse activities,. NnCron can be used as system event monitor: it can keep track of files, flags, windows, processes, mouse activities, periods of idle time, keyboard shortcuts, getting online/off line, insertion of disk in a drive, presence of a host in network (ping), amount of free space on a disk, etc., etc. nnCron understands cron table format (Unix) and is managed with easy-to-edit text crontab files. DetailsDownload trialBuy now ($25.00) Find similar
Platform: Windows 95, Windows NT, Windows 2000, Windows XP, Windows 98, Windows ME
Language: English, German, Portuguese, Spanish, Italian, French, Russian
Vendor: Nicholas Nemtsev
15. PrinterSpy Professional
PrinterSpy's wealth of management features eliminates the need for administrators to walk to a remote server to administer their printers or solve common printer problems. True centralized control of all printing activity on a network of Windows NT/2000/2003 Servers and Windows NT/2000/2003/XP, Windows 95/98 Workstations. DetailsDownload trialBuy now ($40.00) Find similar
Platform: Windows NT, Windows 2000, Windows XP, MS Windows
Vendor: SoftsDev
Securely remove all traces of your computer activity. The program features the ability to load on Windows startup and can work in the hidden mode automatically performing the clean-up at the specified time intervals. As its name implies, Internet Cleaner can easily eliminate all records of your Internet activity kept by various programs each time you surf the Web.
The game is played in rounds in which each player controls his hardy crew of clonks in realtime in order to either mine resources and build up a base or eliminate the opponent's crew. Experience changing weather conditions with rain, snow, thunderstorms, as well as tectonics and hectic animal activity.
19. Internet Cleaner - Site license
The program features the ability to load on Windows startup and can work in the hidden mode automatically performing the clean-up at the specified time intervals. As its name implies, Internet Cleaner can easily eliminate all records of your Internet activity kept by various programs each time you surf the Web. DetailsDownload trialBuy now ($1,200.00) Find similar
Platform: Windows NT, Windows 2000, Windows XP, Windows 98, Windows ME
Vendor: Neoweb Software
20. Advanced Privacy Protector
You can ensure your privacy and keep sensitive information secure by regularly eliminating these tracks that you leave behind. Advanced Privacy Protector is a very useful program for cleaning up the history of your activities on a computer. DetailsDownload trial (Full version: 795.6 KB) Buy now ($21.00) Find similar
Platform: Windows NT, Windows 2000, Windows XP, Windows 98, Windows ME, Windows Server 2003
Vendor: Systweak
PC Activity Monitor Standard (PC Acme Standard) is designed for monitoring user's PC activity. It is completely hidden, and even the experienced user can not locate, stop or destroy the program. Logging other people's keystrokes or breaking into other people's computer without their permission can be considered as an illegal activity by the courts of many countries.
These applications can help you to detect and eliminate (deactivate) threats to the integrity and security of your computer network. Unlike the typical antivirus approach, it does not rely on pattern-matching, so it may work on new or unknown types of activity monitoring programs.
Detection and elimination of known threats Safe'n'Sec detects known malicious code such as viruses, Trojans, and worms and eliminates them, using the antivirus databases from well-known antivirus software vendors. Blocking malicious activities.
Flagship software application Anti- keylogger(TM) for Microsoft® Windows® 95/98/ME/NT/2000/XP is the FIRST product of its kind in the world that can provide every computer with strong protection against most types of unauthorized activity monitoring software, both KNOWN and UNKNOWN. These applications can help you to detect and eliminate (deactivate) threats to the integrity and security of your computer network.