Home Contact Sitemap

N5 Net Software Repository

Your one-stop for all your software needs.

Search N5 Net Software Repository:

Search Files



Only Freeware

Sponsor:

Browse:

Areas Of Interest

Authors Area

Are you a software author? Take a look at our Author Resource Center where you will find marketing tools, software specifically created for promoting your software and a ton of other helpful resources.

Downloading Power Spy Lite 2.110

Your download will begin in a few seconds. If it does not start you can download directly through one of the mirror sites below.

Download Sites:

Similar Products:

ATS CDR ANALYZER 2.0.0.0

Security & Privacy :: Covert Surveillance
img ATS Call Data Record analyzer can import and analyze CDR/Tower CDR Data from any service provider in India or Other Country and Its generates a comprehensive report of frequency statistics including service provider details and subscriber details.
Windows | Shareware
Read More

STEALTH KEYSTROKER 2.1.36

Security & Privacy :: Covert Surveillance
img Stealth Keystroker is an undetectable keystroke logger (keylogger) which allows you to secretly record all activities of computer users and automatically deliver the logs to you via Email or FTP. Stealth Keystroker records all the system activities, such as email sent and received, websites visited, all keystrokes, passwords, chat convos, and takes screenshots at set intervals just like a surveillance camera. See more at www.key-stroke.com
Windows | Shareware
Read More

NET MONITOR FOR EMPLOYEES PROFESSIONAL 6.4.3

Security & Privacy :: Covert Surveillance
img This employee monitoring software allows you to see live screens of remote computers or show you screen to employees. You can take control of a remote computer by controlling the mouse and keyboard. This way, you can always watch what users are doing on the remote computer. Additionally you can also record employee screens. With this activity monitoring software you can turn off, restart, hibernate.... remote computers with one click.
Windows | Shareware
Read More

CLASSROOM SPY PROFESSIONAL 5.4.3

Security & Privacy :: Covert Surveillance
img A simple and powerful classroom management software that allows you to see live screens of student computers or show you screen to students. You can take control of a remote computer by controlling the mouse and keyboard. Additionally you can also record student's screens. Several tools allow you to turn off, restart, hibernate.... remote computers with one click. Starting program on remote computers is easy.
Windows | Shareware
Read More

POCKET PC FORENSICS TOOL 2.4.5.3

Security & Privacy :: Covert Surveillance
img Pocket PC forensic software describe complete details regarding hardware or software of any PDA, Handheld PC or other branded windows based mobile cell phone.Analysis tool display mobile manufactures name, model number, IMEI number, database, and tasks information with saved contact details, phone numbers, OS registry details and other files, folders details.Application save generated report at user specified location for investigation purpose.
Windows | Shareware
Read More

REAL PC SPY 5.78

Security & Privacy :: Covert Surveillance
img Real PC Spy software is a computer monitoring software. It lets you know exactly what people do on your PC. It secretly records all PC and internet activity, including typed keystrokes (keylogger), chats & IMs, emails, websites visited, Facebook, games, online shopping and searches, video talk, videos watched, documents opened, clipboard text and more. Real PC Spy sends logs to your email or ftp like every 30 minutes.
Windows | Shareware
Read More

ACTIVITY MONITOR 10.5

Security & Privacy :: Covert Surveillance
img This program is for real time monitoring of users activities on network computers and for employees' work time tracking. It monitors usage of all office computers in a network. You can see keystrokes, remote screen, Internet history and used programs. Send instant messages, copy files from a remote PC and control them. It can record every email and IM sent and received. Recordings are securely kept in Central Log Database on the main computer.
Windows | Shareware
Read More

SPYMONITOR 2025

Security & Privacy :: Covert Surveillance
img Software for monitoring a user's activity on a remote computer. Discreet, it is present as an icon in the taskbar or completely invisible to the user. The software records the periods when the user works on his computer. A report of all login periods is sent to an email account via email. International languages.
Windows MAC Linux | Shareware
Read More

CDR ANALYSIS SOFTWARE 1.0.0.0

Security & Privacy :: Covert Surveillance
img CDR Analysis software helps to import CDR and analyze CDR/Tower file from any service and generates a comprehensive report of frequency statistics including service provider details and subscriber details (SDR)* of CDR Numbers. CDR Analysis software supports all type CDR file like as .Txt, .CSV,.XLS & .XLSX from All service providers. Software supports all country service provider & CDR file.
Windows | Shareware
Read More