Page of 41
First page | Prev | Next | Last page |

Inctrl

Category: Windows Hacking, Desktop Tools, Program Monitoring

Title: Inctrl

Format: Windows 95/NT

Description: InCtrl 3 lets you track system changes made by Windows 95 and Windows NT installation programs. It tracks file additions and deletions as well as changes made to .INI files. In addition, it handles long filenames and tracks changes to the Registry.

Download Now



Process Viewer

Category: Windows Hacking, Desktop Tools, Program Monitoring

Title: Process Viewer

Format: Win9x/Me/NT/2000

Description: Process Viewer - Lets you view/kill any running process, even if you can't kill it using Windows NT Task Manager (NT/2k).

Download Now



Purge-It

Category: Windows Hacking, Desktop Tools, Program Monitoring

Title: Purge-It N\A

Format: Win 9x

Description: Purge-it is a Windows utility that allows the end-user to take a look inside a system, see what programs are running, which ports are open. The user chooses what happens to the system, and can remove various malware such as backdoors, trojans and spyware. Homepage: http://www.Purge-it.com/?p.

Download Now



Remote Task Manager

Category: Windows Hacking, Desktop Tools, Program Monitoring

Title: Remote Task Manager 3.7 Intel

Format: Windows 2000/NT/XP

Description: Remote Task Manager is a system control interface that can be run from any Windows 2000/NT computer. The simple-to-use, tabbed interface separates applications, services, processes, events, shared resources and performance monitor, making each of these very easy to manage. Homepage: http://ntutility.com.

Download Now



System Spy

Category: Windows Hacking, Desktop Tools, Program Monitoring

Title: System Spy

Format:

Description: System Spy is a windows program which will hide on a users computer and record the actions of another user through program title capturing. Captures active window title, time window was opened, time window was closed, and total time window was active. Invisible to user while running, including Task List. Captured data is stored encrypted, in dated files. By Kevin Woodford

Download Now


First page | Prev | Next | Last page |