Sunday, February 10, 2008

Advanced Parental Control (3 PC License)

Are your kids abusing the computer? Advanced Parental Control enables you to control and supervise how they use the PC and Internet. Easily create an allowed schedule for each user. You can also setup a time allowance for each user by day or week. If they reach the specified amount of time then they can no longer login.

Advanced Parental Control can block any application for any user and filter web sites based on keywords YOU specify. You can even record select activities including screenshots, keystrokes typed, web sites visited and more for complete activity monitoring. APC also includes System Restriction Tweaks ideal for limiting a child's access.
Block your kids from accessing inappropriate
web content using keywords you specify.
Control and schedule the amount of time
each user can access the PC and Internet.
Monitor activities for selected users such as
web sites, keystrokes and screenshots.

  • Create and enforce a custom schedule for each child's computer usage.
  • Automatically warn and lock users out when their allowed time is up.
  • Manage how, when and the amount of time they can use the Internet.
  • Block web sites containing any keywords you choose or by site name.
  • Block absolutely any program from being used or create allowed times.
  • Record selected activities, including screenshots, keystrokes and web sites.
  • Provide the safe Internet environment that you want for your family.
  • Perform simple Windows tweaks which help you control their access.
  • Also gain parental features similar to Windows Vista with Windows XP!
  • Only you can access the administration tools - NO workarounds!
  • Have activity reports emailed directly to your email address! NEW!
Computer Time Management
  • Daily Limits and Scheduling
  • Weekly Limits and Scheduling
  • Internet Limits and Scheduling

  • System Restriction Tweaks
  • Start Menu Tweaks
  • Windows Desktop Tweaks
  • Control Panel Tweaks
  • Computer System Tweaks

  • Security Options
  • Customize Log File Location
  • Not Visible in Taskbar
  • Not Visible in System Tray
  • Password Protected
  • Activity Filtering Capabilities
  • Application Restriction
  • Web Site Filtering
  • Keyword Filtering

  • Activity Monitoring Capabilities
  • Screenshot Reporting
  • Web Sites Reporting
  • Keystrokes Reporting
  • Windows Reporting

  • Easy to Use
  • Intuitive Interface
  • Easy Configuration
  • Easy to Read Reports
  • Online and Offline Help

  • Computer Time Management
    The main benefit of APC is its Time Management system. Parents can specify how long and when their child is allowed use the computer OR the Internet itself. Each user can be assigned different times that they are allowed to use either one. Time limits can also be set for each user. So if a user exceeds their limit they will not be able to access at anytime.

    APC now features a two minute logoff warning for users and the ability to allow users to view their time remaining!

  • Daily or Weekly Limits and Scheduling
  • Completely block computer usage for the hours you specify each day. You can also set time limits for users, for example one hour per day or ten hours per week.
  • Internet Time Management
  • You can additionally restrict access to the Internet in a similar manner as the computer itself. This lets your kids use the computer but restricts access to the Internet.
    Activity Filtering Capabilities
    APC provides complete activity and content filtering. These features allow you to completely block applications you choose - or allow them at certain times. You can also block web sites based on the site's name or keywords you specify. For example you can block any page containing "sex" or "myspace" within the page's text or web address.
  • Application Restriction and Scheduling
  • Choose programs you don't want a selected user to have access to. If they try to run the application it will be blocked. You can also create a schedule to allow
  • Web Site Filtering
  • Enter a list of web sites that you do not want a selected user to visit. If a listed site is visited it won't load. It will show a blank screen. Works in Internet Explorer and Firefox.
  • Keyword Filtering
  • Enter specific words or phrases which will trigger a web page to be blocked. For example you can block any page containing the term "sex" or "myspace" within a web page.
    System Restriction Tweaks
    We have compiled groups of system tweaks that you can optionally turn on. These tweaks restrict users from accessing certain parts of Windows or your computer. For example you can disable the Control Panel, Task Manager and/or the Start Menu or specific drives (such as D:). You can perform these for some or all users. The four groups of tweaks are:

    Please note: These tweaks work in Windows XP only.


    Start Menu Tweaks
  • Disable Log Off Icon
  • Disable Shut Down / Restart
  • Disable All Programs List
  • Disable Run Icon
  • Disable Help Icon
  • Disable Search Icon
  • Disable My Pictures Icon
  • Disable My Network Places Icon
  • Disable Network Connections Icon
  • Disable User's Folder Icon
  • Disable User Name Displaying
  • Force Classic Start Menu

  • Control Panel Tweaks
  • Disable Control Panel
  • Disable Folder Options
  • Disable Internet Options
  • Remove Display Icon
  • Remove Add/Remove Programs
  • Windows Desktop Tweaks
  • Disable Start Menu
  • Disable Task Bar
  • Disable All Items on Desktop
  • Disable Mouse Right-Click
  • Disable Windows Clock
  • Disable Taskbar Properties
  • Remove My Documents Icon
  • Remove My Computer Icon
  • Remove Recycle Bin Icon
  • Remove Internet Explorer Icon
  • Remove Network Places Icon
  • Disable Change Wallpaper

  • System Tweaks
  • Disable Any Drive
  • Disable Task Manager
  • Disable Clipboard (Copy/Paste)
  • Disable CD Burning
  • And More!


  • Activity Monitoring Capabilities
    For additional protection you can choose to monitor activity for some or all user. A variety of recordings can be captured to have actual proof - just in case you need it. You can capture actual pictures of the screen as often as every second. You can also record every single keystroke typed, including any type of password. APC also lets you view a list of every window accessed to see how their time is being spent. You can also have activity reports emailed directly to your email address.
  • Screenshot Reporting
  • Record an actual picture of the current window taken as often as once per second. The built-in viewer includes date and time stamp along with the title of the current window.
  • Web Sites Reporting
  • No matter which browser they use you can record a list of every web site URL they visit, along with time and date and an easy way to open any of the recorded URL's.
  • Keystrokes Reporting
  • Also included is the option to record each key typed on your computer's keyboard. You can even monitor for specific applications only. Record passwords with ease.
  • Windows Reporting
  • Record all windows and applications executed during any user's sessions. Do you suspect they are performing unallowed tasks? This will show you what to block.
    Security Options
    While some other programs can be easily disabled, APC has total security in mind. APC's log files can be stored in any location you choose. There are no tray icons and the program does not show up in the taskbar. Only you can access the interface by typing your secret password, keeping your filtering and monitoring 100% secure.

  • Customize APC's Exe File Name

  • Giving you far superior protection, this allows you to adjust the name of the exe file which runs APC's features. You will be able to change this file name to anything you deem appropriate.


  • Customize Log File Location
  • For the highest level protection, all APC log files can be stored in any folder you choose. This gives you the ability to store the logs in a folder that the user will not know about.
  • Not Visible in the Taskbar or System Tray
  • While you are inside the software it acts like a normal program. But when others are using the PC, there are no traces in the Taskbar, Tray or Applications tab in Task Manager.
  • Password Protected
  • You can rest assured that only YOU can access the APC interface. The program is fully protected from unauthorized access by a password which you create and can change anytime.
    Easy To Use
    APC was designed with ease-of-use in mind. It doesn't matter if you know a little or a lot about computers. APC is very easy to use and comes with full instructions and support, including Live Chat and 24 hour priority email support. Also included are free minor updates for life. Not to mention the exclusive 30 day money back guarantee.

    There has never been an easier way to monitor your kids.
  • Intuitive Interface
  • The easy interface helps you to understand the program in no time flat. Each clickable entry has a short explanation of that feature when you move the mouse over it.
  • Easy Configuration
  • Installing and setting up APC is extremely easy. Simply install the program like any other. Then select a user and adjust the restrictions or items you wish for that user.
  • Easy to Read Reports
  • No software is useful if you can't understand or decipher the information presented to you. We went the extra mile to make sure that are screens and reports are easy to read.
  • Online and Offline Help
  • APC includes full support, including an internal help system and priority support for life. We offer live chat support as well as a knowledge base and 24 hour email support.



  • System Requirements

  • APC requires minimal system resources. Below you will find the basic minimum requirements to run APC.


  • Intel or AMD 433mhz or Better, 64MB RAM
  • 25MB of Hard Drive Space Recommended
  • Windows 98/98SE/XP/2000/2003/NT/Vista

  • So what are you waiting for? Purchase APC For $39.97





    Get Updates about new features & important information on Internet safety

    Want to stay updated about new features, new products and important information on Internet Safety? Fill in the form below before you download your free trial. You are not required to submit your information to download the free trial but you may find it useful to receive additional product information, updates and promotions for additional products.


    Thursday, February 07, 2008

    Perfect Keylogger

    Perfect Keylogger's box

    Perfect Keylogger - easy to use stealth solution for PC and Internet surveillance. Discover the Truth now!

    *includes Remote Installation support!



    As seen on Tech TV! Perfect Keylogger was featured on TechTV's 'Call for Help'

    Watch the movie
    (about 6 MB) - free Real Player required.


    Be One Step Ahead with our progressive PC Monitoring and Spy Software!

    Full version with remote monitoring support - $34.95 - Now supports Windows Vista!

    Do you want to know what your buddy or co-workers are doing online? Or perhaps you want to check up on your children or spouse and know what they are doing on the computer? With Perfect Keylogger it is possible in just 2 minutes! This program runs on the installed computer, fully hidden from its users, and logs everything that is typed in a protected file. Install Perfect Keylogger and take total control of the PC!

    Perfect Keylogger is a new generation keylogger which is absolutely undetectable. It was created as an alternative to very expensive commercial products like iSpyNow, Spector Keylogger or E-Blaster. It has the same functionality, but is significantly easier to use. Complex internal mechanisms are hidden from the user behind the friendly interface. You can install Keylogger and immediately use it without changing of its settings.

    Perfect Keylogger is an extremely compact, award-winning tool. It is translated into 20 languages and is increasingly popular around the world! It lets you record all keystrokes, the time they were made and the application where they were entered. It works in the absolutely stealth mode. Stealth mode means that no button or icon is present in the Task Bar, and no process title is visible in the Task Manager list.

    Also, Perfect Keylogger can carry out visual surveillance. It periodically makes screenshots in invisible mode and stores the compressed images on the disk so you can review them later.

    Our keylogger has unique remote installation feature. You can attach keylogger to any other program and send it by e-mail to install on the remote PC in the stealth mode. Then it will send keystrokes, screenshots and websites visited to you by e-mail or FTP. You don't have to worry about the firewall alerts - now our keylogger can be invisible for the firewall program. Our keylogger supports remote installation, update and removal - no physical access required!

    New Smart Rename feature lets you to rename all keylogger's executable files and registry entries using one keyword!

    One of the most powerful features of Perfect Keylogger is its advanced Keyword Detection and Notification. Create a list of "on alert" words or phrases and keylogger will continually monitor keyboard typing, URLs and web pages for these words or phrases. You tell Perfect Keylogger which phrases to watch out for - for example, "sex," "porno", "where do you live," "are your parents home," "is your wife sleeping," "I hate my boss" - whatever you decide to include. When a keyword is detected, Perfect Keylogger makes screenshot and immediately sends email notification to you.

    Perfect Keylogger was the first keylogging software solution which can be absolutely invisible in the Windows NT/2000/XP/Vista Task Manager!

    The program lets you easily view the log file, displaying the title of the window (for example, title: "John (Online) - Message Session" in ICQ), the date and time of the action and the contents of the typed matter itself.

    Unlike some other spy software products, Perfect Keylogger does not send any information to our company. Only you will receive the log files. We guarantee absolute privacy, high quality product and technical support - that's why we have a thousands of satisfied customers.

    You pay once, all updates are free. For example, customers, who bought the first version in 2002, now can get the advanced latest version for free! We are producing the new versions very frequently, so you can be sure that you always will have the most modern spy software!

    We have to tell you, that such a software is very complex and only 2-3 products on the market, including this, have a good quality to use them effectively. Do not use a cheap or a free monitoring software! You can get an important data leaks or the system crashes! We can guarantee your system safety with our product.

    Perfect Keylogger available in three editions: full version, basic edition and free lite version. Choose the functionality you need.

    Comparison of the editions of the product:

    Features Full version Basic edition Lite edition
    Has an intuitive interface and very easy to use, even for beginners
    Absolutely invisible mode
    Remote Installation / Update / Uninstallation

    Logs texts and passwords typed in the every application, including popular instant messengers
    Supports virtually all input languages (Unicode engine), including Japanese, Arabian, Thai, Chinese! (v.1.65)

    Visual surveillance (screenshots)

    Slide show for screenshots

    Captures the passwords behind the asterisks

    Captures button clicks

    Captures screen information on every mouse click

    Logs websites visited

    Captures ICQ, Miranda, Skype, Gooqle Talk, MSN, AIM, AOL, Yahoo, QIP chats!

    Keyword Detection and Notification

    Records contents of password protected web pages, including Web Mail messages (using our additional software)
    Monitors Windows Clipboard

    Sends log by e-mail (in the stealth mode)
    Sends screenshots by e-mail (in the stealth mode)

    Uploads ALL logs into the separate folders by FTP (in the stealth mode)!

    Optional ZIP compression and password protection of the log files before transferring by email or FTP

    Supports renaming of the keylogger's files and registry entries

    Monitors computer activity only when user goes online (option)

    Can be invisible for the firewall program

    Invisible in the Windows startup list

    Monitors all users of the PC, even if you don't know their passwords

    User friendly HTML file format for emailed logs

    Invisible in Windows NT/2000/XP/Vista Task Manager and Windows 9.x/Me Task List
    Records Windows 9.x/Me logon passwords

    Records Windows 2000/XP logon passwords (using our additional software)
    "Quick Install" - configure keylogger on your PC, then just run it on another PC to install

    Intercepts DOS-box and Java-chat keystrokes
    Installation packet fits into 3.5" floppy
    Supports international keyboards
    External log viewer
    Supports printing of the log

    Optimized for Windows XP/Vista
    Strong encryption of the log file
    Records keystrokes in the specified applications
    Exports log to HTML


    More information is available in the Perfect Keylogger online documentation and FAQ.

    If you don't know, how to set it up - just contact us and we will help you immediately!

    Attention: only full version of the keylogger includes all functionality!


    What do you want to do?

    What to do after you have keylogger installed? The next step is to ensure that nobody is spying on you! Download our Personal Antispy and don't worry that someone wathing you! Read more about Personal Antispy...

    Perfect Keylogger Awards:

    Perfect Key logger - BotSpot.com recommends BotSpot.com recommends!
    Perfect Key logger - AgentLand.com award AgentLand.com editor's pick.
    Perfect Keylogger - GlobalShareware Award GlobalShareware.com award.
    Excellent Key Logging Software - RoxySoft Award RoxySoft.com - "After reviewing BlazingTools Perfect Keylogger 1.67 we have found it to be EXCELLENT and we would like to congratulate you for the quality of your product".
    Perfect Keylogger - File Transit 5 stars FileTransit.com award.
    Perfect Keylogger - Sofotex.com user's choice
    Perfect Keylogger - Sofotex.com user's choice
    Sofotext.com user's choice.
    Perfect Keylogger - Clean and safe security software! DownloadSofts.com clean and safe!
    Perfect Keylogger - BlueChillies.com award BlueChillies.com- top rated!
    Perfect Keylogger - ListSoft.com award ListSoft.com - cool software!
    Perfect Keylogger - FileHugry 4.5 stars FileHungry.com award.
    Perfect Keylogger - SoftList.net
    Perfect Keylogger - SoftList 5 stars
    SoftList.net award.
    Perfect Keylogger - Softodrom.ru award Softodrom.ru award.
    Perfect Keylogger - OneKit - 5 stars! OneKit - 5 stars!
    Perfect Keylogger - 1000Files.com award 1000files.com - Users' choice!
    Perfect Keylogger - Download2You.com - Excellent! Download2you.com - 5 stars!
    Perfect Keylogger - ShareUp - 5 stars! ShareUp - 5 stars!
    Perfect Keylogger - MyFolder.net editor's pick MyFolder.net - score 4.5.
    Perfect Keylogger - BrotherSoft.com editor's pick Perfect Keylogger - BrotherSoft.com editor's pick BroherSoft.com - editor's pick!
    Perfect Keylogger - softBase - 5 stars! Perfect Key logger - softBase - 5 stars! Perfect Keylogger - softBase - 5 stars! Perfect Key logger - softBase - 5 stars! Perfect Keylogger - softBase - 5 stars! SoftBase.com - 5 stars!
    Perfect Key logger - FileCart - 5 stars! FileCart - rated 5 stars!
    Perfect Key logger - SmartDownloads.net - winner! SmartDownloads.net - winner!
    Perfect Key logger - WebAttack.com - 5 stars! WebAttack.com - 5 stars!
    Perfect Key logger - DownloadAtoZ.com - 5 stars! DownloadAtoZ.com - 5 stars!
    Perfect Keylogger - 1shareWare.com - 5 stars!Perfect Key logger - 1shareWare.com - 5 stars!Perfect Keylogger - 1shareWare.com - 5 stars!1shareWare.com - 5 stars!1shareWare.com - 5 stars! 1ShareWare.com - 5 stars!
    Perfect Keylogger - PCworldDownload.com 5 stars! PCWorldDownload.com - 5 stars!
    Perfect Keylogger - FileHeaven.com 5 stars! FileHeaven.com - 5 stars and editor's choive!
    Perfect Keylogger - TomDownloads.com 5 stars! TomDownloads.com - 5 stars award!
    Perfect Keylogger - GTDownload.com 5 stars award! GTDownloads.com - 5 stars award!
    Perfect Keylogger - SoftPedia.com Editor's Choice! Perfect Keylogger - SoftPedia.com Best Buy! Perfect Keylogger - SoftPedia.com Pick! SoftPedia.com- Editor's Choice and Best Buy!
    Perfect Keylogger - Soft32.com Editor's Very Good!

    Perfect Keylogger - Soft32.com Clean!
    Soft32.com- Editor's Very Good!
    Perfect Key Logger Spy Software - FileCluster.com highest award! FileCluster.com - secure and high quality software!

    Some applications of the keylogger:

    • Monitoring children's activity for parents
    • Stealth monitoring of your spouse
    • Restore lost information
    • Monitor which programs were opened and when
    • Recall what you wrote some time ago

    Perfect Keylogger runs on the installed computer, being fully hidden from its users. It logs everything that the user types in a protected file, makes screen captures, monitors websites visited and captures copying to the clipboard.

    You can order the full version here. Any payment type!

    Available payment types

    Available payment types


    Now can be delivered on the CD-ROM!

    Screenshot of the CD-ROM shell

    CD-ROM shell. Click to enlarge

    Perfect Keylogger screenshots (click to enlarge):

    Main menu and options window

    Main menu


    Viewing text log

    Viewing text log


    Viewing visual log

    Visual surveillance

    Click here to view all screenshots


    Supported platforms:

    Windows 95, NT4, 98, Me, 2000, XP, 2003, Vista;

    Minimal requirements:

    Pentium 100 / 16 MB RAM, Internet Explorer 5.0;

    Recommended:

    Windows 2000 or later, Internet Explorer 5.0 or later.

    Technorati software blogs