<?xml version="1.0" ?>
<XML_DIZ_INFO>
	<MASTER_PAD_VERSION_INFO>
		<MASTER_PAD_VERSION>3.01</MASTER_PAD_VERSION>
		<MASTER_PAD_EDITOR>PADGen 3.0.1.38 http://www.padgen.org</MASTER_PAD_EDITOR>
		<MASTER_PAD_INFO>Portable Application Description, or PAD for short, is a data set that is used by shareware authors to disseminate information to anyone interested in their software products. To find out more go to http://www.asp-shareware.org/pad</MASTER_PAD_INFO>
	</MASTER_PAD_VERSION_INFO>
	<Company_Info>
		<Company_Name>Email cracking</Company_Name>
		<Address_1>lane</Address_1>
		<Address_2>co-lane</Address_2>
		<City_Town>town</City_Town>
		<State_Province>province</State_Province>
		<Zip_Postal_Code>20001</Zip_Postal_Code>
		<Country>United States</Country>
		<Company_WebSite_URL>http://www.emailcracking.net</Company_WebSite_URL>
		<Contact_Info>
			<Author_First_Name>Email</Author_First_Name>
			<Author_Last_Name>Cracking</Author_Last_Name>
			<Author_Email>emlpwd@emailcracking.net</Author_Email>
			<Contact_First_Name>Email</Contact_First_Name>
			<Contact_Last_Name>Cracking</Contact_Last_Name>
			<Contact_Email>emlpwd@emailcracking.net</Contact_Email>
		</Contact_Info>
		<Support_Info>
			<Sales_Email>emlpwd@emailcracking.net</Sales_Email>
			<Support_Email>emlpwd@emailcracking.net</Support_Email>
			<General_Email>emlpwd@emailcracking.net</General_Email>
			<Sales_Phone>001-9811111111</Sales_Phone>
			<Support_Phone>001-9811111111</Support_Phone>
			<General_Phone>001-9811111111</General_Phone>
			<Fax_Phone>001-9811111111</Fax_Phone>
		</Support_Info>
	</Company_Info>
	<Program_Info>
		<Program_Name>Undetectable Keylogger</Program_Name>
		<Program_Version>4.0.1.5</Program_Version>
		<Program_Release_Month>12</Program_Release_Month>
		<Program_Release_Day>09</Program_Release_Day>
		<Program_Release_Year>2008</Program_Release_Year>
		<Program_Cost_Dollars>49</Program_Cost_Dollars>
		<Program_Cost_Other_Code>INR</Program_Cost_Other_Code>
		<Program_Cost_Other>2419</Program_Cost_Other>
		<Program_Type>Shareware</Program_Type>
		<Program_Release_Status>Major Update</Program_Release_Status>
		<Program_Install_Support>Install and Uninstall</Program_Install_Support>
		<Program_OS_Support>Win98,WinME,WinNT 3.x,WinNT 4.x,Windows2000,WinXP,Windows2003,Windows Vista Starter,Windows Vista Home Basic,Windows Vista Home Premium,Windows Vista Business,Windows Vista Enterprise,Windows Vista Ultimate</Program_OS_Support>
		<Program_Language>English</Program_Language>
		<Program_Change_Info>Added support for clipboard minitoring</Program_Change_Info>
		<Program_Specific_Category>Utilities</Program_Specific_Category>
		<Program_Category_Class>Security &amp; Privacy::Covert Surveillance</Program_Category_Class>
		<Program_System_Requirements>128MB RAM, 10MB Disk Space for installation</Program_System_Requirements>
		<File_Info>
			<File_Size_Bytes>1793064</File_Size_Bytes>
			<File_Size_K>1751</File_Size_K>
			<File_Size_MB>1.71</File_Size_MB>
		</File_Info>
		<Expire_Info>
			<Has_Expire_Info>Y</Has_Expire_Info>
			<Expire_Count>30</Expire_Count>
			<Expire_Based_On>Days</Expire_Based_On>
			<Expire_Other_Info />
			<Expire_Month />
			<Expire_Day />
			<Expire_Year />
		</Expire_Info>
	</Program_Info>
	<Program_Descriptions>
		<English>
			<Keywords>Keylogger, recording, utility, monitor, keystrokes, undetectable, program, capture, user, invisible, typed, characters, pressed, log, files, secret, data, detect, software, save, hidden, visited, WebPages, screenshots, recorder, keyboard, activities</Keywords>
			<Char_Desc_45>Keylogger tool monitor PC activity in absence</Char_Desc_45>
			<Char_Desc_80>Undetectable keylogger tool track all typed keystrokes online laptop activities</Char_Desc_80>
			<Char_Desc_250>Advance keylogger software secretly monitors all computer activities of friends, children and spouse which are performed in your absence. Undetectable keylogger monitor utility stealthy records all pressed keys with active windows program screenshot.</Char_Desc_250>
			<Char_Desc_450>Undetectable keylogger recorder utility monitors PC activities like instant typed text documents, sent emails, visited WebPages, chat histories etc. Keystrokes monitor software secretly captures opened windows applications, screenshots at regular time interval. Keylogger recording program monitors all offline/online internet activities of your office employees. Keylogger monitor application captures all web and desktop activities of your computer</Char_Desc_450>
			<Char_Desc_2000>Windows keylogger monitoring software covertly capture and record visited web URL, username, chat conversation, passwords, copy or paste operation and all performed activities on your computer when you are gone away or busy. Undetectable keylogger utility is capable to run in hidden mode after this no one track its location on your hard drive. Advance keystroke monitoring program silently records every keystroke of keyboard along with date and time to their performing. Undetectable keylogger recording software can be used at home as well as in office to monitor the online/offline activities of children, spouse, employee and friend.  Advance Keylogger application generates the reports of recorded data in text or html formats and invisibly delivers logs to your mailbox. Keystroke surveillance utility runs invisibly in your system background and records all typed keystrokes such as system keys, functional keys, alpha numeric keys etc in encrypted or hidden log file. Advance Keylogger recording tool is fully compatible with all platforms of windows operating systems including ME, XP, NT, Vista etc. Undetectable keylogger recording software completely runs in invisible way, hidden in start menu, control panel, add/removal program list and prevent guest user to change configuration settings. Keystroke recorder program is highly interactive Graphical User Interface (GUI) and is very easy to user by IT professional and normal user.
Features:
* keylogger monitor software is completely invisible and undetectable by antivirus software and easily bypasses anti-key loggers.
* Undetectable keystroke recorder utility record every movement of your computer such visited web URL, text chatting, login password, WebPages etc.
* Keylogger tracking program works in two different modes such as standard and hidden mode.
* Undetectable keylogger tool save all captured data into an encrypted log file and send to specified email ID.</Char_Desc_2000>
		</English>
	</Program_Descriptions>
	<Web_Info>
		<Application_URLs>
			<Application_Info_URL>http://www.emailcracking.net</Application_Info_URL>
			<Application_Order_URL>http://www.emailcracking.net</Application_Order_URL>
			<Application_Screenshot_URL>http://www.emailcracking.net/ecracking-adklg-screen.jpg</Application_Screenshot_URL>
			<Application_Icon_URL>http://www.emailcracking.net/ecracking-adklg-icon.jpg</Application_Icon_URL>
			<Application_XML_File_URL>http://www.emailcracking.net/ecracking-adklg.xml</Application_XML_File_URL>
		</Application_URLs>
		<Download_URLs>
			<Primary_Download_URL>http://www.emailcracking.net/downloads/drpu-pcdm-adv-demo.exe</Primary_Download_URL>
			<Secondary_Download_URL>http://www.emailcracking.net/downloads/drpu-pcdm-adv-demo.zip</Secondary_Download_URL>
			<Additional_Download_URL_1 />
			<Additional_Download_URL_2 />
		</Download_URLs>
	</Web_Info>
	<Permissions>
		<Distribution_Permissions>The LICENCOR grants you a non-exclusive, non-transferable licence to install and use the Software conditional upon the following limitations:- You may: 1) Use one copy of the software on a single computer or install and use the Software on the specific Central Processing Unit(s) identified on the purchase order or other documentation relating to this Licence Agreement 2) Copy the software onto the hard disk of the computer and retain the original for archival purposes only. You may not: 1) Use the Software for purposes other than as authorized in this Licence Agreement or knowingly permit anyone else to do so 2) Disclose any part of the Product to anyone or make any part of the Software, documentation or other material you may receive from emailcracking.net relating to the Product available to anyone 3) Install the software on the network 4) Sell, transfer, sublicence, lend, rent, lease or give the product to any third party or allow any third party to use the product unless you are an Authorised Reseller or have written permission from emailcracking.net. 5) Transfer this to another person or allow another person to use such other versions 6) Reverse engineer, de-compile, disassemble, modify, translate, and attempt to discover the source code of the Software or permit others to do so.</Distribution_Permissions>
		<EULA>You may 1) Use one copy of the software on a single computer or install and use the Software on the specific Central Processing Units identified on the purchase order or other documentation relating to this Licence Agreement 2) Copy the software onto the hard disk of the computer and retain the original for archival purposes only. You may not 1) Use the Software for purposes other than as authorized in this Licence Agreement or knowingly permit anyone else to do so 2) Disclose any part of the Product to anyone or make any part of the Software, documentation or other material you may receive from emailcracking.net relating to the Product available to anyone 3) Install the software on the network 4) Sell, transfer, sublicence, lend, rent, lease or give the product to any third party or allow any third party to use the product unless you are an Authorised Reseller or have written permission from emailcracking.net. 5) Transfer this to another person or allow another person to use such other versions 6) Reverse engineer, de-compile, disassemble, modify, translate, and attempt to discover the source code of the Software or permit others to do so.</EULA>
	</Permissions>
</XML_DIZ_INFO>
