1.
Invisible Keylogger - Monitor Internet Activity - Monitor Computer ...
Advanced Keylogger invisibly captures keystrokes, logs screenshots, records all passwords within users sessions and monitors Internet and desktop activity.
2.
Virtual COM Port Driver - COM Port Emulator - Create Virtual COM Port
Virtual Serial Port Driver - emulates real serial port connection by creating virtual pairs of COM ports, connected via virtual null-modem cable.
3.
Virtual COM Port Driver - COM Port Emulator - Create Virtual COM Port
Completely new reworked and redesigned Serial Ports Explorer, which helps you get full information about all serial ports used in system new! ...
4.
RS232 to Ethernet - Serial over Ethernet - Serial RS232 over TCP/IP
If your PC is configured as client it will initiate the connection to the ... Thus, all data sent from remote end, will be delivered to local serial port at ...
5.
Virtual COM Port Driver - COM Port Emulator - Create Virtual COM Port
Virtual Serial Port Driver - emulates real serial port connection by creating virtual pairs of COM ports, connected via virtual null-modem cable.
6.
Windows Mobile Software - Mobile Virtual Serial Port - Emulate ...
These ports fully emulate real serial ports (even if they are not present in your mobile device). Virtual Serial Port Driver Mobile allows you to: ...
7.
Virtual COM Port Driver - COM Port Emulator - Create Virtual COM Port
Set/unset line connection break (for Windows NT4/2000/XP/2003/Vista); VSPD provides complete information about current state of virtual serial port ...
8.
Windows Mobile Software - Mobile Virtual Serial Port - Emulate ...
VSPD Mobile Phone Edition creates up to 20 virtual serial ports in your Windows Mobile system.
9.
Virtual Serial Port AX - Virtual Serial Port Component - ActiveX ...
Create virtual serial port pairs in your system and fully control custom virtual serial port directly from your application.
10.
Powered Keylogger - Keylogger Program - Computer Spy Program ...
Runs invisibly at the kernel level of Windows; Absolutely untraceable by a list of firewalls, anti-virus, anti-keyloggers; Invisible keylogger, even capable ...