Описание: Quick Keylogger - Perfect Invisible Family Keystroke Logger for PC surveillance! Quick Keylogger is extremely compact, still being award-winning tool. With Quick Keylogger you can easily record all keystrokes, the time they were made and the application where they were entered. It works in the absolutely stealth mode and is completely undetectable spyware: you will not see it in processes list, registry, Add/Remove Programs utility, anywhere.
Jet Spy Keylogger - Keylogger Spy Software, Secretly record every keystroke! Secretly record all keystrokes and passwords! Works in hidden mode. Undetectable Key Logger, Secret Email Spying Software. Records everything that is entered from the keyboard.
Computer Key Logger - KeyLogger software allows you to find out what other users do on your computer in your absence. It is designed for hidden monitoring of the computer activities. Key logger invisibly logs and is capable of recording keystrokes of each computer user.
Perl Quick Reference - Книга американских авторов, посвященная обзору языка программирования Перл.==Introduction Perl Overview Special Variables Operators Functions Regular Expressions Reference Tables Glossary Credits
Microsoft Access 97 Quick Reference - The Microsoft Access 97 Quick Reference is the latest in a series of comprehensive, task-oriented references and details how to use the features and functionality of
Sumka Quick Launcher: Quick Access to Any File from Any Point on Desktop - Have you ever dreamed of being able to launch any program or open any document without having bring the mouse to the Start button and then having to follow the easy-to-get-lost-inside menu? Now is the time for the dream to come true: Sumka Quick Launcher is that magician that makes that all happen. Briefly, the program allows
Link Logger: Know Your Visitors - The expansion of the Internet has not only improved our performance and information awareness; it has also brought to us new security challenges. From merely intercepting your data flow and through shutting your network down and stealing your companys sensitive data — anything can happen to an unprotected network