Internet Filter &
 
Monitoring Software
    Reviews
Protecting Your Family While They Are Surfing Online!
Home  |   About Us   |   Articles/Links   |   Other News   |   Contact Us


  • Articles/Links

    » Chilnet International
    » CyberAngels
    » Enough-Is-Enough Safeguards
    » FBI Publication - A parent's Guide to Internet Safety
    » GetNetWise
    » Internet Rules
    » Internet Watch Foundation
    » Safe Surfing


  • Archive for the 'Shareware' Category

    SpamArrow

    21st February 2008

    SpamArrow is a simple and stable spam blocker to effectively filter out any unwanted spam emails with near zero false positives. It uses the famous SpamAssassin engine and the Bayesian filtering to automatically classify incoming emails as spam or non-spam. This anti spam software is a great add-on for Outlook and Outlook Express by automatically creating integrated spam-fighting toolbar buttons and a spam folder to collect all emails identified as spam. Unlike most spam filter software products usually do, SpamArrow will never modify your original email message and never add message rules for Outlook or Outlook Express. Tag:spam filter anti spam spam blocker stop spam anti spam software block spam Outlook Express anti-spam spam email eliminate spam spam junk email

    Realtime-Spy

    21st February 2008

    Realtime-Spy is the latest in high-tech surveillance software that allows you to REMOTELY INSTALL the monitoring software and access the activity logs from ANYWHERE via your own personal Realtime-Spy Webspace! Realtime-Spy can show you what users do, and what users type in real-time. All you have to do is point your browser to your own Realtime-Spy website address to view logs from any machines you deploy Realtime-Spy on! All logs are password protected and securely stored for your eyes only. Realtime-Spy is the most robust remotely installable, remotely viewable monitoring software available. Feel free to login to one of our test accounts on the Realtime-Spy server. This demo account will show you EXACTLY how your user account will look (just a different username to login with, and different logs of course), and how it works. Tag:

    Windows Supervisor

    21st February 2008

    Windows Supervisor is an all-in-one PC/Internet activity monitor. Protect your family from online threats. Secretly record all user activity including web browsing, email, chat, instant messaging, system, applications, keystrokes, screen capture and printing, all saved to a daily report which can be automatically emailed. Features include the ability to filter harmful websites, record system logon times and a log manager that automatically deletes outdated logs. Security features include password protection to prevent unauthorised access. A simple and easy to use interface makes Windows Supervisor appropriate for all parents/administrators regardless of experience. Download Windows Supervisor now and see for yourself. Tag:windows supervisor zero alpha monitor spy log record utility children parents

    VIP Privacy

    21st February 2008

    VIP Privacy is a perfect tool for your private info protection. Do you know that many user’s applications and your Operating System collect and store information about your personally and your system’s configuration? This helps to facilitate your using web services such as Customer’s Support or any Internet shops. But there are many malefactors that will try to steal that information and use it for their own purposes. To prevent that from happening is the main aim of VIP Privacy. VIP Privacy lets you search and safely clean up all information stored inside your system and installed applications. It does not in any way delete any private files nor it changes the contents of user’s documents. It is only the information collected by different applications that is actually being removed without interfering with the system’s and applications’ performance. VIP Privacy knows about 700 applications and several thousand system leaks storing the user’s personal data that can be stolen and used by malefactors. Let VIP Privacy become the trustful guard of your secrets. Your personal data will always be safe with this great tool! Tag:privacy protection personal information personal information protection personal data protection spyware hacker attack anti spyware spyware removal spyware remover Operating System

    10-Strike LANState

    21st February 2008

    The program is designed for Microsoft Windows network administrators. LANState is a visual network mapper with monitoring functionality which allows you to see the state of your network at any time. It displays network map and monitors device state (active/inactive) in real-time. LANState monitors shared resources, shows traffic speeds, and notifies you on miscellaneous events. The program includes a number of features for administrators such as sending messages, shutting down and turning on remote computers, ping, name lookup, trace route, obtaining information on remote computers, creating reports, etc. LANState does not require installing any client software on the remote computers on your network. Main features: 1. Modeling a local area network diagram in a visual mode and then saving the result as a map with images. 2. Monitoring hosts (ICMP ping and connecting to specified TCP port are supported). 3. Monitoring the usage of your shared resources by other users of the network. 4. Monitoring load of your network card (incoming/outgoing traffic). 5. Searching hosts by ICMP ping or scanning TCP ports. 6. Retrieving computer’s network name by its IP address. 7. Notifying on events by playing a sound, writing to log, running program, sending e-mail, etc. 8. Performing actions on devices via the configurable context menu. Tag:Monitoring Software Monitoring tools Monitoring Monitoring servers network administrators network map monitor traffic speed ICMP PING TCP network diagram IP address email incoming traffic outgoing network host

    SRC Corp–Network Security Software

    21st February 2008

    SRC Corp Removes and blocks spyware, adware, key-loggers and other malware. You will get remote access to any computer on the network; remotely turn on or off your client machines, computer trouble shooting and reporting, software management, software deployment and more. SRC Corp combines many features in a single platform that is affordable, reliable, easy to install and simple to use. Tag:Networks Computer Business Internet Spyware Antivirus IT tools Business Software Network Security

    OsMonitor Monitoring Software

    21st February 2008

    OsMonitor is the powerful employee monitoring software for companies in all size. It allows you to know every detail about your employees PC and Internet activities, and prevents them from something which is not allowed as well. OsMonitor is a guard of high productivity and internet security. With OsMonitor, you can view and record your employees PC activities such as their online conversation, the documents they process, the websites they visit, the software they run, the emails they send, the business information in their computer and even the screenshots of their online activities. OsMonitor can avoid your employees to misuse the Internet and computer, by forbidding their visiting of inappropriate websites like online shopping websites and sex websites, their chatting program like ICQ , MSN and Yahoo messenger, and the software unrelated with their work like games and Windows Media. OsMonitor monitoring software is Lan monitoring software and employee monitoring software available for company. It can help you to monitor your employee’s screens, emails, chatting conversations. It also block ICQ, Disable USB, disable games and only allow specified applications running. Include ICQ monitor, MSN Monitor, Email Monitoring, web site Monitoring, Screen Capturing, Applications monitoring, Blocking games, Block Download and Install. Backup files. Backup automatically all increased and modified work files (word document, program code, etc.) on Server from your employee’s computer. Email recorder provides you the every details of outgoing Emails with Outlook Express. You even have the option of recording Email attachment. OsMonitor is the only one software in the world which supports the monitoring and backup of SSL secured Emails. Tag:LAN Monitoring LAN Monitoring software Employee Monitoring software

    Chily Employee Activity Monitor

    21st February 2008

    Chily Employee Monitoring software is an employee monitoring tool which helps to monitor activities of your employees in a network. Suitable for your Business, Home, Organization where you can easily monitor and save activities of your employees, children, spouse and others. An invisible monitoring tool – Chily employee monitoring software displays the typed keystrokes, visited websites, desktop screenshots, FTP activities, chat logs, internet activities, system process, opened / closed windows, downloaded files and every other activity performed by the monitored user. Our employee monitoring software facilitates you to monitor activities over network even if you are not present on your desk. You can easily create Offline Logs for to be saved for the monitored user which can be viewed later on in text file format. Tag:

    Cascade Point

    21st February 2008

    Ever delete or overwrite a document you really needed? – CascadePoint has the previous version that you thought you’d lost forever. Or, has your laptop been lost or stolen or your hard drive died? Get back the important documents you lost easily with Cascade Point. CascadePoint allows you to specify types of documents you want to protect (such as Word or Powerpoint) and then watches what you do. Everytime you open a document to edit or save changes to a document, it creates a copy of the original document in an archive. Earlier versions of files can be retrieved by just right clicking on the current version and picking the previous date stamped version you want to restore. CascadePoint works in real-time. It works transparently in the background protecting you as you work. After you spend five minutes to set it up, you will not notice it until you need it. Tag:backup software backup tools real time monitor security software word powerpoint document edit edit document original document data protecion real time protect real time protection documents protect folder protect

    Actual Keylogger

    21st February 2008

    Actual Keylogger is a free key logger that records every keystroke to an encrypted log file with the title of the window that was active at that moment. Actual Keylogger runs hidden in the background and automatically logs all keystrokes. The interface can be password protected. Only the person who knows a special key combination can control Actual Keylogger. You can view the reports as HTML or plain text. Tag:

    Call Interceptor

    21st February 2008

    Interceptor, which also includes the Spy Phone, enables the user to call the target phone (with the installed software) and listen to the conversations of the incoming or outgoing calls. Incase there are no conversations that are taking place, the target phone responds in Ghost Mode allowing the user to listen in to the surroundings. Please also note that both Spy Phone and Interceptor send SMS to the pre-defined number as soon as an incoming or outgoing call is connected. Stealth Features: 1. No lights or visual changes can be seen on the Mobile Equipment (ME) when a Room Monitor or Interception call is placed. 2. No Log creation for Incoming Room Monitor Call, Interception Call, Configuration SMS or Intercepted SMS. 3. No Installation Logs of the software. 4. Software cannot be traced inside the phone. 5. Software silently starts up on phone boot or restart; if it is in Active State. 6. Configuration SMS when arrive on the target phone cannot be viewed in the Inbox nor do they represent any visual changes on the screen. Other Features: 1. Any Key Disconnect: When a Room Monitor is placed or a call has been intercepted, these calls will be disconnected as soon as the user presses a key to avoid any suspicion to the Target User. 2. Caller Breakthrough: If an incoming call arrives to the target phone, while a Room Monitor call is in progress, the Room Monitor Call will automatically disconnect and let the phone ring as normal. 3. Activate, Deactivate, Change the Secret Code or the Pre-defined number at any time from any phone all over the world. No restrictions. Tag:call interceptor

    Anti-Hack

    21st February 2008

    Protect your computer from intrusion using this simple program. Anti-Hack will stop hackers and inform you of intrusion attempts! Features include: Advanced HTML Reporting, Custom response messages, sound and popup alerts, easy to use interface. Tag:

    SpyAnytime PC Spy

    21st February 2008

    This is a powerful spy software to secretly track all activities of computer users with just a single click, and it does NOT require you to have advanced computer skills at all. It allows you to monitor and record all areas of computer usage, e.g. keystroke, e-mail, online chat, passwords, Web sites, and take screen snapshots every few seconds like a surveillance camera. Features include autostart monitoring, password protection, halt on idle, sorting and searching records, HTML report, screen snapshots playback, as well as a highly self-explanatory interface. SpyAnytime PC Spy works just like a combination of invisible keyLogger, screen snapshots captor, web Urls recorder, plus application and file/folder monitor. But not like other products sold them in split package, SpyAnytime PC Spy is a complete package with all above components! Have you ever wondered what your spouse, kids or employees have been doing on the computer and Internet? Is your spouse engaging in online sexual conversation while you are asleep? Are your kids taking secret chat conversations with an adult stranger? Are your employees emailing your business secret to your competitors? If you do worry about these issues, SpyAnytime PC Spy is the right choice! Tag:spy spyware spy software key logger keylogger computer spy computer monitoring pc spy internet spy keystroke keystroke logger pc security password protection file monitor

    GSM Location

    21st February 2008

    Enables the user from the pre-defined number to send an SMS to the target phone (where the software is installed) and get the GSM location of the target phone The user from the pre-defined number will send an SMS with a code and receive the following information as a response: Network: XXX LAC: XXX CI: XXX Signal Strength: XX% Location Name: XXXXXXX Current Time: hh:mm:ss LAC is Location Area Code CI is the Cell ID Signal Strength is the current strength of the tower that the phone is bound to. Location name is the name of the area that the network provider sends to the phone. All this information is provided exactly as the network provider sends to the SIM card of the phone. Please note the following important points before configuring the phones: Remote Management You now have the ability to remotely configure the phone. You can send a special SMS to perform the following functions on the phone: Activate the Software Deactivate the Software Change the Secret code to manage the software Change the Pre-Defined Number Query for the Status of the software on the phone. Query for Location Information of the phone. Stealth Features: 1.The Mobile Equipment (ME) continues to be in switched off when a Room Monitor call is placed. 2.No Log creation for Incoming Room Monitor Call, or Configuration SMS. 3.No Installation Logs of the software. 4.Software cannot be traced inside the phone. 5.Software silently starts up on phone boot or restart; if it is in Active State. 6.Configuration SMS when arrive on the target phone cannot be viewed in the Inbox nor do they represent any visual changes on the screen. Other Features: 1.Activate, Deactivate, Change the Secret Code, the Pre-defined number or Query the Mobile Equipment at any time from any phone all over the world. No restrictions. Tag:gsm location

    1st Clicks

    21st February 2008

    1st Clicks is a program for parents of young children that hides the computer desktop, and replaces it with a screen containing a list of a few games, programs and websites that parents have made accessible to their children. Your children cannot access the original desktop, and so they cannot run other programs and cannot play games outside of this list, even if they are installed on the computer. In the same way, only the websites in this list will be accessible. Since they don’t have access to the original desktop, they cannot cause any harm to files or change any settings. Tag:parental control protect computer

    pcGuardIT Client Edition

    21st February 2008

    pcGuardIT will give you possibility to monitor the health status of important Windows Servers and Clients. The new pcGuardIT Manager and System Tray application allows easy configuration of the monitoring application, which is running "invisible" as a Windows Service. Configured once, pcGuardIT Service will inform you with the desired collected informations about a system. As well an emergency alert handler can be used, which will inform System Administrator, that someting is going wrong, before users will recognize… Some main features: – Send Windows Events to Syslog Server – Absolutely free configurable Event Log observation and tracking – Different Levels of priority for each Event Log entry can be defined. When an ‘Urgent’ Event Log entry is detected, you’ll be informed immediately. The ‘Normal’ defined Event Log Entries are sent in daily log. All Event Log Entries which are defined as ‘ignore’ are not listed in the Logs. With this powerful filter it’s possible to be informed in simple way – Filtering of Event Log entries. With this function the configuration will be as easy as possible, because all redundant entries are filtered out – Free configurable Hard disk Drive observation – Check Files, for existence, size and actuality – Runs as Windows Service. No logged on User required – The User Interface (GUI) is available in different Languages (German, English, etc…). It’s possible to install additional languages at a later time – In combination with the pcGuardIT Enterprise Edition it’s possible to collect and process all the data from the pcGuardIT Clients on a Central Server – All bought standalone pcGuardIT Clients can be used as Clients for pcGuardIT Enterprise Edition without any extra license for these clients. So the now invested money is save when in a later step pcGuardIT Enterprise Edition is used to observe the whole IT environment – Additional features can be added as plugins – Multithreating optimized Tag:Server Health Monitoring System Administrators EventLog File Harddisc syslog

    BlazingTools Secure Office

    21st February 2008

    Secure Office is an affordable, compact monitoring solution, designed for local networks. It captures keystrokes, websites visited, chats from instant messengers and takes screenshots. The user logs are stored on the admin’s PC. The user logs can be viewed using any web browser. Online access to the logs can be protected with a password. The program is simple to install and deploy. It takes just minutes to start monitoring your network. Secure Office monitors multiple users and multiple computers and archives each user’s activity. This is an ideal tool for an employer or network administrator. Secure Office – when you need to know what your employees are doing when you are paying for their time! Tag:secure office covert surveillance monitoring keylogger keylogging recording spy software network LAN admin

    AirSnare

    21st February 2008

    AirSnare is a free, useful and reliable intrusion detection system to help you monitor your wireless network AirSnare is a free, useful and reliable intrusion detection system to help you monitor your wireless network.It notfies you as soon as a machine connects to your wireless network, that is not included in your list of friendly MAC addresses.You can configure the program to send an email notification to the administrator, log the connection, and also send a message to the connected machine, informing them that their actions are being monitored.AirSnare integrates with Ethereal for additional package capturing features. Most desktop 10Mbs and 10/100Mbs should work if using AirSnare on a wired network (see the How to setup document).AirSnare is a completely free program. Creating and maintaining AirSnare has required – and still does – a considerable amount of work and effort.If you like AirSnare or you are using it for a commercial application, then you may wish to support AirSnare development by making a voluntary donation. Tag:MAC address IP addresses address network Toolbox Wireless detection software DHCP network monitor monitor network monitor software monitor tools network security network protection network protect security protection security protect system protection

    ComputerTime

    21st February 2008

    ComputerTime is parental-control software that lets parents set limits on the amount of time and the time-of-day when their children can use the computer. SoftwareTime believes that the computer is an amazing tool for children, both for educational and social purposes. However, children need to have reasonable limits set for them, and that’s what ComputerTime allows you to do, quickly and easily. You no longer have to keep track of the time your children spend on the computer. ComputerTime does that for you! It takes just a few minutes to set limits for each child. ComputerTime will give you the control you need, and give you back your sanity! Using ComputerTime, you can: 1) Ensure children don’t stay up past bedtime on a school night because they’re chatting online, 2) Make sure homework is done before the computer can be used, 3) Encourage children to read more, or get much needed exercise, by limiting computer use, 4) Make sure the computer is shared fairly between siblings … and more. ComputerTime lets you set the following types of limits on computer use: 1) Specify the amount of time in a day, week or month, 2) Set specific times during the day when the computer may be used, 3) Allow only a certain amount of time on the computer at one sitting, 4) Even disable the use of the computer entirely … or any combination of these and more! Try it for free! Tag:softwaretime parental control software parental control software time limit limit time time limit computer children kids spy safe guardian restraint constrain computer time computertime time computer

    Advanced Security Level

    21st February 2008

    Advanced Security Level is the best computer security application for Windows-based computers. It gives you an excellent administrative support to control the user access rights for your computer by setting up the desired access control level for each user. You can restrict access to Control Panel applets including Display, Network, Passwords, Printers, System, Add/Remove Programs, etc. You can assign separate system profile folders for computer users providing each of them with own custom Desktop, Start Menu, Favorites, My Documents, etc. Optionally you can hide desktop icons, local and network drives; disable Start Menu items, DOS, boot keys, Registry editing, taskbar, task manager and network access; lock screen with password; and much more. You can apply password protection for Windows and restrict users from running specific applications. Security restrictions can be applied to all or just for specific user. Advanced Security Level supports the Internet Explorer security that allows you to customize and secure Internet Explorer web browser. So you can disable an individual menu items, tabs in the Internet Options dialog with specific settings; prevent others from editing your Favorites. The program offers you a complete password protection and ability to import and export PC security settings. Secure your PC is a part of the Security & Privacy direction of our development which offers a comprehensive collection of PC security and privacy applications to protect your PC. Great for both home and office environments, these downloads will protect everything from personal data to passwords. Try our Advanced Security Level for free. Tag:computer security secure Internet access control password protection privacy restrict access software downloads advanced security level

     
    Home  |   About Us  |  Articles/Links  |  Other News  |  Contact Us

    Copyright 2006 WelFilterReview. All rights reserved.
    Note: The information in this page has been compiled and retrieved from publicly available sources. Any errors or missing information will be rectified as soon as advised. We are not responsible for the content of this Publisher's and User Review's Description. We encourage you to determine whether this product or your intended use is legal. We do not encourage or condone the use of any software in violation of applicable laws. Pricing information is as accurate as of the time this report was written and is based on observed market selling prices and/or list prices. Actual selling prices may differ.