Security software from Retina-X Studios, LLC
Net Spy Pro
Net Spy Pro is the ultimate combination network monitoring and remote control software tool. Net Spy Pro monitors activity on your network such as keystrokes, web sites visited and more. The same interface also remotely controls vital client PC functions such as viewing a PCs current desktop, sending a message to a PC, application launching and more. Net Spy Pro even allows you to take complete control of any PC using your keyboard and mouse!
Released:
2006-11-11
Language:
English
Platform:
Win98, WinXP, WinNT 3. x, WinNT 4. x, Windows2000, Windows2003
Price:
49 $
Requirements:
Pentium or Better Class PC, 32MB RAM, TCP/IP Network
AceSpy Spy Software
AceSpy Spy Software makes it easy for you to accurately monitor and block the activities of others using your PC. AceSpy secretly monitors all activity while it is completely hidden from others. AceSpy records and instantly forwards you each email sent or received and BOTH sides of chat conversations. Also records web sites visited, keystrokes, passwords typed and MORE. AceSpy also takes screenshots and features easy log delivery via email.
Released:
2006-10-12
Language:
English
Platform:
Win95, Win98, WinME, WinXP, WinNT 3. x, WinNT 4. x, Windows2000, Windows2003
Price:
34 $
Requirements:
400mhz+ 64MB ram, 10MB hard disk
Net Orbit
Do you suspect employee or student network abuse? Increase productivity by supervising your entire network. Watch employee or student screens simultaneously. Visually pinpoint problem individuals with ease. Send users a message, lock their PC or take FULL control with your mouse and keyboard. Perform various admin commands such as Lock, Reboot or Shut Down PC's. Commands can be performed on some or all workstations. Get their attention fast!
Released:
2006-12-10
Language:
English
Platform:
Win98, WinXP, WinNT 3. x, WinNT 4. x, Windows2000, Windows2003
Price:
59 $
Requirements:
Intel or AMD 433mhz or Better, 64MB RAM, TCP/IP Network
Firewall
A firewall prevents computers on a network from communicating directly with external computer systems. A firewall typically consists of a computer that acts as a barrier through which all information passing between the networks and the external systems must travel. The firewall software analyzes information passing between the two and rejects it if it does not conform to pre-configured rules.
Print this page
- ZIP File
- Worm
- Windows Scripting
- Warm Boot
- Virus Hoaxes
- Virus
- Variant
- Vaccination
- VBS
- Tunneling
- Trojan Horse Program
- Triggered Event
- Timestamp
- Time Bomb
- TSR
- System Boot Record
- Stealth Virus
- Sparse Infector
- Sniffer
- Slow Infector
- Signature
- Shareware
- Shared Drive
- Self-garbling Viruses
- Self-extracting Files
- Self-encrypting Virus
- Sector Viruses
- Scanner
- SMTP
- Resident Virus
- Replication
- Redirect
- Real-time Scanner
- RTF File
- Program Infector
- Polymorphic Virus
- Piggyback
- Payload
- Password Sniffing
- Password Attacks
- PGP
- Overwriting Virus
- Operating System
- On-demand Scanner
- On-access Scanner
- Not In The Wild
- NTFS
- Mutating Virus
- Mutant
- Multipartite Virus
- Memory-resident Virus
- Master Boot Sector Virus
- Master Boot Sector
- Master Boot Record
- Malware
- Malicious Code
- Macro Virus
- Macro
- MS-DOS
- MP3 File
- MBR
- Logic Bomb
- Library File
- Key
- Joke Programs
- JavaScript
- Infection
- Host
- Hole
- Hijacking
- Heuristic Analysis
- Firewall
- File Viruses
- FAT
- Encryption
- Encrypted Virus
- EXE file
- Dropper
- Disinfection
- Direct Action Virus
- Denial Of Service (DoS)
- DOS
- Cookie
- Companion Virus
- Cold Boot
- Cluster Virus
- Checksum
- Boot Sector Infector
- Boot Sector
- Boot Record
- Boot
- Batch files
- Backup
- Background Task
- Background Scanning
- Back Door
- BIOS
- Antivirus Virus
- Anti-virus Software