Code-it Software, Inc.

All available only via Free Sofeware CD-ROM
Can't Hide v2.0

Can't Hide! v2.0 is an application that shows all programs that are running (at time of activation) on your system, all active windows and threads used, as well as all software set to run at Windows startup. This little program is very useful to check for "Trojans", key loggers, or hidden applications ("Spy Ware") that may be used to record the user's activities.

Screen shots of the application (click for larger view) ...

active_ss.JPG (190318 bytes)  active_win_ss.JPG (171870 bytes)  startup_ss.JPG (168985 bytes)

Benefits...

  • Will show (list) all programs running even if they are not visible by the means of Windows© "current applications running" function activated by the "Ctrl + Alt + Delete" keys. This is very useful to find any "Trojans", key loggers, or "Spy" type software running in the background of the system! 

  • Lists all windows and threads being used.

  • Lists all software set to activate at Windows startup.

  • Option (right click menu) to unconditionally terminate the activation of any program or delete entry to activate at Windows startup.

  • Gives the "path" of all listings so that you may delete or further investigate the purpose of the file.

Min. system requirements...
PC with Windows© 95, 98, 98SE, ME, 2000, NT 4+, or XP

WARNING: this software contains some VERY POWERFUL tools to alter the Windows registry. Use at your own risk! In other words.. if you are unsure of what you are about to do then seek expert advise before taking action. Code-it Software will in no way be responsible for your use or misuse of this software.

 

Port Scanster v1.8

Port Scanster v1.8 is an application that scans the local or a remote system to check for ports that may be open to attack by "Trojans" or crackers trying to access the system.

Chick the image to view full screenshot >>>

* What Will This Scanner Tell Me?
A scanner might reveal certain inherent weaknesses within the target host. These might be key factors in implementing an actual compromise of the target's security. In order to reap this benefit, however, you must know how to recognize the hole.

* Why Are Scanners Important to Internet Security?
Scanners are important to Internet security because they reveal weaknesses in the network. Whether this information is used by hackers or crackers is immaterial. If used by system administrators, scanners help strengthen security in the immediate sense. If employed by crackers, scanners also help strengthen security. This is because once a hole has been exploited, that exploitation will ultimately be discovered. Some system administrators argue that scanners work against Internet security when in the hands of crackers. This is not true. If a system administrator fails to adequately secure his or her network (by running a scanner against it), his or her negligence will come to light in the form of a network security breach.

* Are Scanners Legal?
Yes/No. Scanners are most often designed, written, and distributed by security personnel and developers. These tools are usually given away, via public domain, so that system administrators can check their own systems for weaknesses. However, although scanners are not illegal to possess or use, employing one if you are not a system administrator would meet with brutal opposition from the target host's administrator. Moreover, certain scanners are so intrusive in their probing of remote services that the unauthorized use of them may violate federal or state statutes regarding unauthorized entry of computer networks. This is a matter of some dispute and one not yet settled in law. Therefore, be forewarned.

* WARNING: Do not take scanning activity lightly. If you intend to scan wide ranges of domains, check the laws in your state. Certain states have extremely particular legislation. The wording of such statutes is (more often than not) liberally construed in favor of the prosecution. For example, the state of Washington has provisions for computer trespass. (Wash. Rev. Code Sec. 9A.52 110-120.) If you deploy a scanner that attempts to steal the passwd file (a password file on the UNIX platform located in the directory /ETC), you might actually have committed an offense.

* = copied from http://desperado.port5.com/text/scanners.txt

First, please take a moment to read this important notice before considering installing!

Please be notified that "Port Scanster v1.8" is furnished as a tool to be used by authorized system personnel or system owners. In NO way is the release intended to be used in a un-constructive way or manner!

We are not "crackers" (commonly and mistakenly referred to as "hackers"). By installing this setup program you are agreeing that this software is to be used in a constructive and legal manner and that you agree to the following terms.

Terms of use...
I affirm that I am the legal owner or authorized to access information of all systems this software will be installed on or used to explore. I have the legal right to access all data, information, passwords, and files therein. I further attest that this software, nor the returned data , will not be used for any illegal purpose. I further attest that by Customized Computer Software providing this software that they are not participating in any illegal activity.

If you do not agree with these terms; please DO NOT install this software! 

 

UC_it 2.7

So you want system monitoring software but you don't really need to capture all the key strokes. Would you rather just see a "snapshot" of the active window that the user activated? Then this application is for you! At intervals you specify, a screen shot of the desktop is taken and saved in your "Snap Shot" directory. The application is completely hidden from the user and the option to activate at startup is included.

This application was developed as a tool for parental control, system administrators, corporate environments, or anywhere that it would be beneficial to have a log of what the user was doing on the computer system. Basically, the software is  hidden from the user and records and saves a snapshot of the active system desktop at the intervals you select for later viewing.


Below is a screen shot of the application activated to visible by the use of the "visible" hotkey combination. Otherwise the application is not visible to the user!

Click for larger view>>>

Below are actual images (snapshots) that were taken by the software and being viewed within the program's "SnapShot Viewer". Click to enlarge >>>

Benefits...

  • Is hidden from user's view including from the "Current Applications Running" that is activated via the "Ctrl + Alt + Delete" keys.
  • Is programmed to record and save the screen shot of the active system desktop at the intervals you select. (i.e. e-mail software, MS Excel, MS Access, MS Word, MS Notepad, word processors, web searches...).
  • Administrator has the option of having the program activate at Windows "Startup". This function is NOT displayed in the "startup" folder of Windows but rather is accomplished via the Windows registry.
  • Records the date / time the software is activated. The date and time are part of the file name given (i.e. the snapshot is named and saved as "11_18_14_34.jpg" which would mean that the snapshot was taken November 18 at 2:34 PM {11= 11th month, 18= 18th day, 14= 14:00 military time, 34= 34 minutes after the hour}).
  • Saves the snap shots in compressed ".jpg" format
  • Option to view and/ or print any of the snapshots by the means of the "Snap Shot Viewer".
  • Option to print the image loaded into the "Snap Shot Viewer".
  • Option to delete selected or all saved Snap Shots.
  • Option to change entry password. Default password is "password" until changed.
  • Exit of the software is password protected.
  • By the use of the hotkey combo of "Ctrl + Shift + U" will make the application visible so as to set the attributes (see above screen shot).

Min. system requirements...
PC with Windows© 95, 98, ME, 2000, NT or XP 


Terms of use...
I affirm that I am the legal owner or authorized to monitor activity of all systems this software will be installed on. I have the legal right to access all data, information, passwords, and files therein. I further attest that this software, nor the recovered data (recorded snapshots files), will not be used for any illegal purpose. I further attest that by Code-it Software providing this software that they are not participating in any illegal activity.

 

What's up v1.8

"What's up? v1.8" was developed as a tool for parental control, system administrators, corporate environments, or anywhere that it would be beneficial to have a log of what the user was doing on the computer system. Basically, the software is hidden from the user and records when and what software applications were activated.

Below is a screen shot of the application activated to visible by the use of the "visible" hotkey combination. Otherwise the application is not visible to the user!

Click for larger view>>>

Benefits...


  • Is hidden from user's view (including from the "Current Applications Running" function of Windows that is activated via the "Ctrl + Alt + Delete" keys.
  •  
  • Records all applications opened to a list box and a log file if selected.
  •  
  • Administrator can change the path and file the recording session goes to (or not at all).
  •  
  • Administrator can select how many entries to show in the list box before clearing.
  •  
  • Administrator has the option of having the program activate at Windows "Startup" or not. This function is NOT displayed in the "StartUp" folder of Windows but rather is accomplished via the Windows registry.
  •  
  • Records the date/time the software is activated and if the log file was viewed.
  •  
  • Option to view, edit delete the recording log.
  •  
  • HotKey combo of "Ctrl + Shift + W" will make the application visible so as to set the attributes (see above screen shot).
  •  
  • Very SIMPLE interface that just gets the job done without being confusing to operate.

Min. system requirements...
PC with Windows© 95, 98, ME
32 Mb RAM

Terms of use...
I affirm that I am the legal owner or authorized to monitor activity of all systems this software will be installed on. I have the legal right to access all data, information, and files therein. I further attest that this software, nor the recovered data (log files), will not be used for any illegal purpose. I further attest that by Customized Computer Software providing this software that they are not participating in any illegal activity.