A program for tracking the inclusion of a computer. Spyware rating

Spyware is used to monitor the computer equipment of office workers and employees of enterprises. It is also a good solution for monitoring children while parents are not at home.

Spyware for your computer has nothing to do with malicious software. Mostly installed with the permission of the PC administrator and do not cause any harm. Viruses operate on a different principle, they are installed without the administrator's permission, deliberately spying on the user, collecting confidential information and transferring it to third parties. The management of companies and enterprises inform their employees about the established programs for controlling the production process.

Spyware for computer

- This spyware is a universal tool for monitoring user actions on a personal computer. Several are available installation options: admin and hidden. With a hidden installation, processes are not displayed in the task manager. The program is used to monitor children at home and monitor the actions of employees at the enterprise. Neospy software shareware, you can purchase the paid version at a price of 1990 rubles on the official website.

NeoSpay features:

  • interception keystrokes;
  • possibility of creating screenshots;
  • collection data on system events;
  • tracking using instant messengers and recording voice / video calls;
  • report about computer operation.

Advantages:

  • russian-language interface;
  • functionality;
  • real-time computer monitoring;
  • hidden installation.

Disadvantages:

Is a universal English-language spy program. The main feature of this software is that it not only tracks user actions, but also blocks certain operations on the computer. When creating an account, users can add a ban on certain actions on the PC. To use the full functionality, you will need purchase a paid version at a price of $ 40.

Capabilities:

  • monitoring typed text from the keyboard;
  • report about system events;
  • creature multiple accounts.

Advantages:

  • creating a policy of prohibitions on the execution of certain actions on a PC;
  • work in a semi-concealed mode.

Disadvantages:


- used as keylogger, while it has additional functionality:

  • control over the contents of the clipboard;
  • the ability to take screenshots of the screen;
  • spying on visited sites.

The program has no special advantages, it contains quite standard functions for such software. Of the shortcomings it can be noted that when using the keystroke tracking module, only English text is recorded correctly.

SpyGo

This computer tracking software is for home use only. SpyGo can also be used to track employees of offices and enterprises. Program shareware, you can purchase the full version at a price of 990 to 2990 rubles, depending on the set of options.

Capabilities:

  • keyboard spy;
  • recording system events on the PC (launching applications, working with files, etc.);
  • control visits to web resources;
  • receiving images from the user's screen in real time;
  • obtaining information about the contents of the clipboard;
  • opportunity to receive microphone recording (if connected).

Advantages:

  • work in covert surveillance mode;
  • computer reports;
  • tracking search queries and the time of visiting Internet sites.

Disadvantages:


Snitch

Snitch is an easy-to-use spy program that allows you to monitor user activity on your PC.

Capabilities:

  • monitoring keyboard, clipboard and system events;
  • tracking user actions on the Internet and in messengers;
  • drawing up summary reports about computer operation.

Advantages:

  • blocking forced termination of the process in the task manager;

Disadvantages:

  • there is no hidden mode of operation;
  • conflicts with antivirus software.

- the utility is a keylogger that allows you to save data entered in the windows of any programs, browsers, instant messengers, etc. Also provides detailed report in the work of the PC. The program works in hidden mode, does not appear in the task manager and does not create shortcuts on the desktop or in the Start menu. The program can purchase by price 49$.

Capabilities:

  • reading typed texts from all filling forms;
  • hidden operating mode;
  • receiving screen data user in real time;
  • sound microphone recording.

Advantages:

  • functionality;
  • provision of summary reports;
  • hidden mode of operation.

Disadvantages:


Expert Home

Expert Home is a free computer activity tracking software that allows track and record all user actions. This software is used primarily for parental control.

Capabilities:

  • interception keystrokes;
  • creature pictures screen;
  • blocking certain actions on the computer;
  • providing reports about system events on the PC.

Advantages:

  • hidden mode of operation;
  • convenient navigation;
  • undemanding to resources.

Disadvantages:


SC-KeyLog

Free software designed to track keystrokes. Additionally, SC-KeyLog has the ability to collect data on mouse clicks.

Capabilities:

  • data collection entered from the keyboard;
  • tracking sites visited;
  • hidden mode work;
  • report with information about the actions performed from the PC.

Advantages:

  • distributed free of charge;
  • collection of data on all actions on the PC (launching applications, working with files).

Disadvantages:


- completely free keylogger for Windows 7/8/10 that allows detailed monitoring of user activity. Ideal for parental control.

Capabilities:

  • invisibility in the task manager;
  • collection entered data from the keyboard;
  • tracking websites visited.

Advantages:

  • free distribution;
  • functionality;
  • user-friendly interface.

No flaws were found in the program.

Winspy

- this spyware program is used as a means of parental control and monitoring of employee activity on computers.

Capabilities:

  • remote installation;
  • interception text information from the keyboard;
  • hidden operating mode.

Advantages:

  • undemanding to the resources of the operating system;
  • functionality.

Disadvantages:


Vkurse for Android

Vkurse - spyware for devices running Android OS... Allows real-time tracking of user actions on a phone or tablet.

Capabilities:

  • simultaneous control for all instant messengers running on the device;
  • allows to take a photo screen;
  • tracking entered text information from the Android keyboard;
  • detection using GPS;
  • recording incoming and outgoing calls.

Advantages:

  • hidden mode of operation without an active window;
  • the ability to install without root;
  • does not boot the system.

Disadvantages:

  • the ability to detect the application through the "Task Manager" (task manager).

How to detect spyware on your computer

If the spyware runs in stealth mode, it can be difficult to detect. Our review used only legal softwarewhich is not malicious, but at the same time it can be detected by antivirus software. It is recommended to add such software to exceptions. If you do not need to uninstall the program, but you only need to disguise your actions on the PC from it, you will use anti-espionage tools that will block the interception of keyboard presses.

Instructions

The need to control actions user can be caused by a variety of reasons. For example, you want to track your subordinates or check what your child is doing while working on the PC. Most often, interest is attracted by the addresses of the visited websites, launched during the program's operation, and information entered from the keyboard.

It is very easy to track the visited Internet resources, for this it is enough to view the history (log) folder in the browser. You will see all the sites the user has visited. True, experienced users, having worked on, can clear the visit log or remove individual entries from it.

The most reliable way to control user is to install a tracking program on your computer. For example, you can use the free KGB Key Logger software. It will allow you to keep abreast of everything that the user is doing on the computer. Has a visible and invisible mode, monitors keystrokes, keeps track of visited sites, can screenshots (screenshots). The intercepted information can be sent to the mailbox. At the same time, the program is absolutely legal, as it is installed on the computer by its owner.

The ExtraSpy Employee Monitor program has similar functions, created to ensure control of the management of enterprises of their employees. By installing this program on your computer, you will always be aware of what the person working on it is doing.

For remote administration of a computer, you can use the Radmin program. Having installed its server part on the computer, the work on which you want to control, you can connect to it via the Internet at any time. The screen of the remote computer, which is updated in the current time mode, appears in the program window, you will see everything actions user... In addition, you can view any folders and files, copy and delete information, start and close programs. This program is legal, you can download it from the manufacturer's website: http://www.radmin.ru/.

Related article

If a child spends most of his free time at the computer, parents may wonder what websites he visits, what games he plays and what films he watches. Sometimes vigilant spouses, in the name of preserving the family and peace of mind, are also not averse to checking what their dear half is doing on the Internet.

Instructions

You can purchase a hardware keylogger, a device that monitors keystrokes on your keyboard. Depending on the model, it plugs into the USB connector or plugs into the keyboard. Reports can be written to a special folder or sent over the Internet to another computer. The price of the device depends on the range of its functions and the amount of memory.

You can use a keylogger software such as Elite Keylogger. The developers claim that the program runs at the kernel level of the operating system and therefore is completely invisible to anti-spyware software. Start the program and select one of the operating modes Visible mode ("Visible") or Unvisible ("Invisible"). It is better to use Visible mode for preview and training.

On the Logs menu, click View logs and enter the password that you will use to view the logs. In the calendar, mark the date that interests you, and click View logs for ... On the left side of the window, you will see the user account, the list of keys pressed, the date and time of the event.

Program every three minutes. To view thumbnails of screens, select the Screenshots menu item. You can call the full-screen view mode by double-clicking on the thumbnail. The Internet Activity section contains a list of visited websites.

The keyboard Eltima Powered Keylogge performs similar functions. This program also monitors keystrokes, takes screenshots at regular intervals and can send logs to a specified e-mail. The program is invisible to anti-spyware and is password protected

These programs are shareware. You can use the Punto Switcher utility, which is fully distributed by the developer. Few people suspect about its spy capabilities, because its main purpose is to switch keyboard layouts and frequently used words with a specific keyboard shortcut.

Install the program on your computer and right-click on its icon. In the drop-down menu, select the "Settings" section and in the left part of the settings window check the "Diary" item. Select the checkboxes "Keep a diary", "Automatically save the contents of the clipboard ...", "Keep a diary in exception programs".

Click the "Set Password ..." button and enter a combination of numbers and symbols. Use the "Apply" and OK buttons to confirm. To view the entries, select "Settings" in the context menu, then "Open diary".

Related Videos

note

It will not be possible to hide the spy functions of Punto Switcher - everyone who guesses to check its settings in the drop-down menu will know about them. However, only those who know the password can read the contents of the diary.

Working in internet, the user can visually monitor the network connection by the connection icon in the system tray. But in the event that the connection icon is active even when the computer is idle, there is a need for more complete control over traffic.

Instructions

Uncontrolled network activity of a computer may indicate both a malware infection of the system and its incorrect configuration. Therefore, first open Control Panel and disable automatic Windows updates. Then, after checking your computer, you turn it on again.

Open the autorun folder: "Start" - "Run", the msconfig command, the "Startup" tab, remove the checkboxes from all programs you do not need. Many installed programs register themselves in autorun, which slows down the loading and operation of the computer.

After completing the previous steps, check the operation of the computer. If the traffic continues to be used uncontrollably, open a command prompt: Start - All Programs - Standard - Command Prompt. Type netstat –aon and see the list of current connections - they will be marked Established. On the right side of the window, you will see a list of process identifiers - PIDs.

Enter the tasklist command in the same window. You will see a list of running processes, in the second column their identifiers will be indicated. By matching the PIDs from the connection list with the process list IDs, you can figure out which processes are using your internet connection.

If you cannot determine by the name of the process which program it belongs to, use the AnVir Task Manager utility. Run it, find the one that interests you in the list of processes. The information on it will indicate both the executable file and the autorun key in the registry. The AnVir Task Manager utility also shows the current connections, it is very convenient to use it for system diagnostics.

If you need full control over, install and run the BWMeter program. Open the Details tab and click Start in the Control panel. All connections with ip-addresses will be indicated in the program window. Additional windows of the program will give you complete information about the traffic. You can enable logging; all information about the traffic used will be saved in a text file.

note

This article will be especially useful for those users who use tariff plans for connecting to the Internet, which imply restrictions on Internet traffic. Let's first understand what Internet traffic is. Internet traffic is information that you receive and send when you surf the Internet (incoming and outgoing traffic).

Helpful advice

Sources:

  • how to track internet traffic

Have you ever felt anxiety about the safety of confidential data on your computer? Do not rush to answer that you do not have confidential information. If you think you have "nothing to steal," you are most likely wrong. If you have made a purchase in an online store at least once using a credit card or electronic money, then your computer is already a bait for a potential thief. The problem exists, and the ideal solution has not yet been invented. Of course, there are various ways to protect confidential data, for example, restricting access rights in the system, anti-virus software, firewalls, etc. We have repeatedly talked about many of them on the pages of 3dnews. However, relying entirely on antivirus and password protection would be somewhat presumptuous. In addition to the danger of a virus attack, there is a threat of a completely different kind, due to the human factor. What happens when you are away from work? Maybe while you finish your coffee in the buffet during your lunch break at work, someone is reading your e-mail?

Having received someone else's computer at his disposal, even for a few minutes, an experienced user can easily find out all the information he is interested in - the history of negotiations via ICQ and e-mail, a list of passwords used in the system, links to resources that the user has viewed, not to mention access to documents on disk. The utilities that help spyware will be discussed in this review. Such programs can be used both at work to control the working hours of employees, and at home as a parental control tool or as a tool for obtaining information about the personal life of your half. Note that due to the nature of the operation of spyware, antiviruses and firewalls are often very suspicious of them, often mistaking them for malware. Some utility developers even place a notice on their sites. However, in most cases, it is sufficient to configure the firewall once, and it will no longer respond to spyware.

Power Spy 2009

Developer: eMatrixSoft
Distribution size: 5 Mb
Spread: shareware Power Spy can be called a universal spy. It is suitable for monitoring the workplaces of employees, and for monitoring the activities of the child at the computer, and in order to find out what the wife is doing on the home PC in your absence. The program can record all keystrokes, save screenshots of the windows opened by the user, record the addresses of visited websites, intercept messages sent by e-mail, as well as through instant messaging systems (MSN Messenger, Windows Live Messenger, ICQ, AOL Messenger, AIM, Yahoo ! Messenger, Windows Messenger and Skype Text Chat). In addition, it is possible to save all windows opened by the user, launched applications, typed passwords and information that is entered into the clipboard.

In hidden mode, Power Spy is completely invisible to the user, it does not appear in the list of running applications, does not show an icon in the system tray, it is not in the list of installed programs and in the Start menu, and in addition, the folder where Power Spy was installed , is also hidden. To interrupt the program or uninstall, you need to enter a password, and you can uninstall the program using its window. The administrator can call the program window with the collected data by pressing a certain key combination. Information about computer activity is presented in a convenient form: screenshots can be viewed as a slideshow, information about keystrokes is organized chronologically by application and window, the Email tab contains the text of all letters that the user read and sent. In addition, the program stores the content of all documents with which users worked. Moreover, if the file has been opened several times, then Power Spy will save it only once, which allows to reduce the size of the report. In addition, Power Spy can be configured to send reports by email in HTML format or upload them to an FTP server.

Real Spy Monitor 2.89

Developer: ShareStar
Distribution size: 1.4 Mb
Spread: shareware Another utility that will help you keep track of who is doing what and when at the computer. The program supports work with several Windows accounts and, compiling a report, indicates which user performed certain actions. In the process of setting up the program, you can select the accounts, when using which the program will automatically start.

The reports generated by Real Spy Monitor include information about all keystrokes and window titles that were typed; about visited sites (addresses, headers, loading time); about opened windows (title, path to the executable file of the program) and files; about the launched applications with the indication of the start and close times. In addition, the program records messages exchanged between users of IM clients, and can take screenshots at specified intervals. The collected information can be viewed in the program window (called by a keyboard shortcut), and also received in the form of an HTML report. To search for information among a large number of log files, a search is provided, there is a function for automatic cleaning of outdated data.

If you use a program to monitor the actions of children, then appreciate the ability to set filters on the applications that are launched and the sites that open. In the settings of Real Spy Monitor, you can specify the path to executable files that cannot be launched by this or that user. As for sites, you can block certain resources by adding to the "black" list the full address of the resource or the keyword that the program will look for on the page. For young children, you can set more severe restrictions - allow access only to those sites that appear in the "white" list.

Maxapt QuickEye 2.8.8

Developer: STBP "Maxapt"
Distribution size: 5 Mb
Spread: shareware While some of the other programs in this review can be equally successfully used to monitor the actions of company employees and to track users on a home PC, Maxapt QuickEye is primarily aimed at corporate users. It focuses on tools for viewing and analyzing reports. Thanks to this, the boss can quickly find out how long each employee has been actively working at the computer, and what programs they have started. Interestingly, Maxapt QuickEye not only captures open applications, but also takes into account whether there was active work with them. Thus, if the application window was open all day, but the user only worked with it for half an hour, then Maxapt QuickEye will display this in the report.

In the Maxapt QuickEye window, the applications that users work with are grouped by category. Thus, by going to the category "Games" or "Communication via the Internet", you can see on which computer and for how long such programs were active. All data can be presented in the form of a table grouped by computers or by time. In addition, you can see the report in the form of a chart or graph.

The reports provided by Maxapt QuickEye also contain information about the presence of employees in the workplace. The program records the moments of entering the operating system, shutting down the computer, switching it to sleep mode, and then automatically calculates how many hours and minutes the employee spent at the computer. In this case, the time when the computer was in sleep mode is subtracted from the total time when the computer was turned on. With Maxapt QuickEye, you can not only get reports on what employees spend their time on, but also restrict the use of some applications. With the help of the utility, you can create a list of allowed and prohibited programs for each employee, set a working time schedule.

Mipko Employee Monitor 5.0.4

Developer: LLC "Mipko"
Distribution size: 4.8 MB
Spread: shareware Mipko Employee Monitor was previously called KGB Keylogger. The main advantage of this utility over various keyloggers is that it can monitor activity remotely. Even during the installation process, the installer warns about the presence of an antivirus in the system and the need to configure it accordingly by adding Mipko Employee Monitor to the list of trusted applications or exceptions.

The program is very flexible to work with multiple users, in this sense Mipko Employee Monitor is an indispensable tool for a system administrator. You can set different monitoring options for each of the users whose computers you want to monitor. So, for example, for one user you can set tracking only for the typed text, for another - track only visited websites, for a third - keep statistics of running programs, etc. The program can work using the alarm mode. This means that when the user types certain words, Mipko Employee Monitor marks the user's activity with an alarm icon, and, with appropriate program settings, sends a warning message to the administrator by e-mail or uploads to an FTP server. The program is perfectly disguised; its monitor cannot be detected either in the list of running processes or in the list of services. To show or hide Mipko Employee Monitor, you need to type runmipko in the Windows command line or use the keyboard shortcut. Mipko Employee Monitor allows you to use tracking filters. So, you can make a list of programs whose activity you want to monitor, while tracking the rest of the running applications will not be performed. The size of the log for each of the monitored users can be strictly limited. By default, the program stores records about user activities for up to 90 days, if necessary, this period can be increased or decreased.

The information about user activity that this program collects would be incomplete if it were not for the ability to create screenshots. A snapshot can be taken only for the active window or for the entire working area of \u200b\u200bthe screen. By the way, screenshots can also be taken on configurations with multiple monitors. When capturing the entire working area, the image is obtained in the form of two combined screenshots - the first and second monitors. Screen capture is performed either at regular intervals or when a new window is opened. In the absence of any activity, the creation of screenshots is automatically stopped so as not to generate the same and useless pictures. Mipko Employee Monitor intercepts messages in all popular instant messaging programs - ICQ, Yahoo! Messenger, AIM, Windows Live Messenger, Miranda IM, Skype, Google Talk, Mail.Ru Agent, Qip.

Actual Spy 3.0

Developer: Keylogger Actual Spy Software
Distribution size: 1.6 MB
Spread: shareware With this program you can get information about different types of active use of your computer. So, it monitors the contents of the clipboard, saves information about the time of launching and closing applications, takes screenshots of the desktop at regular intervals, keeps track of the time of turning on / off and restarting the computer. Actual Spy monitors the keys pressed and the sites visited, as well as monitors documents sent to print. The program saves changes to files and directories, records any links used by the browser.

The program is hidden with a keyboard shortcut and after that it is not visible either in the tray or in the list of running applications. Despite this "disguise" Actual Spy pretends to be by adding a corresponding entry to the list of programs in the Start menu, so if you decide to use this keylogger, do not forget to delete the folder of the same name from the menu. User activity report can be saved in text or HTML format, on one or several pages. When viewing the report generated by Actual Spy, the program's drawback immediately catches the eye - it perceives keystrokes only in the English layout. Therefore, if it is necessary to read, say, the text of an e-mail in Russian, the reading will turn into solving a puzzle. However, the Russian text copied to the clipboard is displayed correctly. We draw your attention to the fact that the demo version of the program can perform its functions within forty minutes. Sometimes this is enough to protect your work computer during your lunch break.

NeoSpy 3.0

Developer: MC-Soft Software
Distribution size: 2.7 MB
Spread: shareware

The most important thing for a spy program is not to give yourself away. NeoSpy developers have made sure that after installation the program is invisible on the computer. By installing the utility, you can choose an administrator or hidden installation. In the latter case, shortcuts will not be created in the Start menu and on the desktop, the program folder will be hidden, it will not be visible in the list of installed applications. To run NeoSpy, the administrator will need to use the Start\u003e Run command. NeoSpy is able to intercept messages sent using various IM clients. It is gratifying that not only clients that are popular among English-speaking users are supported, but also those that are installed by most Russians. We are talking about Qip, Miranda and Mail.ru Agent. In addition, NeoSpy copes with intercepting messages sent using & RQ, ICQ, SIM and other programs.

Using NeoSpy, you can collect information about all applications that run on your computer. The program saves the start and start time, the path to the executable file, the window title. In addition, the report will indicate whether a screenshot was taken for each of the programs. Screenshots can be viewed in the built-in utility with easy navigation. The module for viewing screenshots has a special timeline, so if you want to know what the user was doing at the computer at a certain time, just move the slider on this scale to the desired position. Using NeoSpy, you can monitor Internet activity on your computer. The program not only saves the addresses of the sites visited, but also records when the Internet was connected and disconnected (of course, if the connection is not permanent), monitors the amount of incoming and outgoing Internet traffic. Basically, NeoSpy makes it possible to track all the actions that were performed on the computer. So, the program saves everything that was typed on the keyboard, stores data that was entered into the clipboard, monitors changes in files, the creation of new files and their deletion. In addition, if necessary, you can save a complete list of applications installed on your computer.

Modem Spy 4.0

Developer: SoftCab
Distribution size: 380 kb
Spread: shareware This program offers a completely different method of "spying" - telephone. If a modem is connected to the computer, then using a small utility called Modem Spy, you can record all telephone conversations. A very handy feature, especially if your desk phone doesn't have this capability. Telephone conversations can be recorded automatically, while the program will keep statistics of telephone conversations in a special call log. During recording, the sound of the interlocutor will not sound too quiet, since the program uses automatic signal gain control.

Audio recordings can be saved in any sound formats - MP3, WAV, etc. Recorded telephone conversations can be played back through a sound card or played directly into a telephone line. Modem Spy can record conversations even using those modem models that only support data modem transmission. To do this, you need to connect the modem and the line-in of the sound card using a special adapter. You can also use the Super Spy mode, in which calls will be recorded invisibly to the user. Another feature of the program is recording from a microphone in dictaphone mode. Recordings can be sent directly from Modem Spy by e-mail. If the technical characteristics of the modem allow, the program can identify the caller's number. You can record conversations without the knowledge of the remote subscriber, or with his prior notification, by turning on the appropriate program setting. Modem Spy has many parameters that allow you to fine-tune the modem to work with a telephone line - to correctly detect a busy signal, detect silence in a conversation and cut it to receive a file with a smaller size, enable recording after a certain call, etc.

WillingWebcam 4.7

Developer: Willing Software
Distribution size: 4.6 MB
Spread: shareware When it comes to telephone espionage, we cannot fail to mention video surveillance. It can be carried out using a webcam connected to a computer. This simple device, which many are accustomed to using to communicate with friends, may well be a real spy. You can turn your webcam into a spy device, for example, using the WillingWebcam program. Using it, you can remotely monitor what is happening near the computer next to which the webcam is installed. WillingWebcam can take pictures continuously at regular intervals or only when motion is noticed in the frame. Received photos can be sent by e-mail or uploaded to FTP server. In addition, WillingWebcam can notify the user about new images in other ways: by sending an SMS, launching another application, and playing an audio file.

The video recorded with the program and the pictures taken can be accompanied by text captions, as well as an indication of the recording time. In addition, there are many effects available that can improve image quality, such as sharpening. WillingWebcam has a built-in module for viewing images and videos, organized like an Explorer. In it you can view thumbnails of images, play saved video, select different modes of viewing the file list. If desired, images can be viewed in full screen mode. WillingWebcam can work in stealth mode. In this case, it will not be visible either on the taskbar or in the system tray. To exit the program from this mode, the default key combination is used, but you can change it to another.

Elite Keylogger 4.1

Developer: WideStep Security Software
Distribution size: 5.3 MB
Spread: shareware WideStep Security Software releases three versions of its keyloggers at once - Family Quick Keylogger, Perfect Handy Keylogger and Elite Keylogger. The last option is the most functional and has the most features. For example, the Elite version is absolutely not detected by antiviruses, while Perfect Handy Keylogger is detected, but not by all antivirus packages, and Family Quick Keylogger is detected by any antivirus program. Due to the fact that the keylogger works at a low level of the system kernel, Windows does not slow down and provides good "compatibility" with antivirus programs. However, when Elite Keylogger was launched for the first time, the Kaspersky Internet Security 2009 package was suspicious of the new object and recommended that it be quarantined.

The appearance of Elite Keylogger suggests that it is intended not just for tracking the user, but for continuous monitoring of activity for a long time. You can view activity statistics in the program by day using the built-in calendar. Elite Keylogger allows you to define lists of Windows users that should or, conversely, should not be monitored.

Elite Keylogger monitors the operation of Internet pagers ICQ, MSN, AIM, AOL and Yahoo, monitors e-mail, application activity and printed documents. The program can send the monitoring result by e-mail, upload it to an FTP server, or copy it to a specified folder on a network drive. In the program, you can set a time period after which all logs of user activity will be automatically deleted. You can also set the maximum size of the activity report, as well as set the size of the log file, upon reaching which it will be sent by e-mail. We draw your attention to one detail - if you want to remove this keylogger, you will not be able to do this either with the standard Add or remove programs tool, or even with the help of special utilities that control Windows startup. To uninstall Elite Keylogger, go to the Options section and use the Uninstall keylogger button in the utility's interface.

Conclusion

Those who want to try the utility for monitoring user activity may notice that the choice here is quite large. The demand for such software is consistently high. First of all, such applications are in demand by organizations and firms where strict discipline reigns, and strict requirements are imposed on employees regarding what they do in their workplaces. If until recently the term "keylogger" meant a utility that recorded keystrokes, today such applications make it possible to control almost any type of activity - mouse clicks, launching programs, changing system settings, etc. Moreover, using the programs described in this article , control can be carried out remotely, tracking in real time what the user is doing, which window he has active, what text he is typing, and even with whom he is talking on the phone. Those who are concerned about privacy issues can be advised to use comprehensive protection (for example, antivirus suite and activity monitoring utility) and rely mainly on themselves. Because, unfortunately, the thief has a master key for every lock.

Online tracking and remote control

How can you track a child if you are not around? Easily. There are programs that allow you to view the screen over the Internet by linking to your account. Moreover, in addition to the tracking function, each of these programs has a lot of additional functions. Let's take a look at the most popular tracking and remote control software.

NeoSpy is a program for remote monitoring of a user's PC with the function of online screen viewing via the Internet (linked to an account). With this software product, you can always view the screen of your home or work PC, not only from another computer, but even from a phone or tablet via the Internet. The program is easy to install: you download the installation wizard from the official website, which downloads the program itself and installs (by the way, there are no advertising and intrusive toolbars, which even large software companies have been sinning lately). Further, after installation, go to the settings and bind the program to the account, after which the function of viewing the screen online will be available.

NeoSpy spy program


In addition to the usual viewing, you can choose what to watch: windows that open, text typed on the keyboard, sites visited by the user, as well as correspondence in messengers installed on the user's PC.

As you can see from the screenshot of the settings, the program provides a lot of possibilities, which everyone chooses for themselves, based on their goals and objectives.

Linking an account is a snap. We select the item "View via the Internet", enter the username and password, click "Connect". Turn on tracking.

Now go to the program website, enter your username and password, go to the "Account" tab and click on "Your computers".


Online tracking in your account


In addition to viewing the screen itself, you can connect to your webcam, which will help you observe not only the actions on the computer, but also around it. You can track if your child is doing their homework.

If the program is on a portable device, the program shows the geographic location of your device on the map at the time of use.

It should be noted that of the considered programs of this kind, it is NeoSpy that makes it possible to conduct hidden online tracking and allows you to save video from the screen in your account. It is also possible to skip rather than watch the entire video. Unlike NeoSpy, other programs do not save video, and tracking requires you to be constantly connected to the screen.

An important difference between NeoSpy and other programs presented is completely covert surveillance, that is, the user does not see the message about your connection on his screen, as, for example, in TeamViewer and other programs, thanks to this your child will not know about the surveillance.

What else can be done with NeoSpy?

Traffic encryption. All data transmitted through the server is securely encrypted. They are almost impossible to decipher. NeoSpy uses AES encryption of data transmitted over the network (image screen, motion pointer, keyboard signals, etc.). Double password protection. The first is the online account: the password that is used to log into the online system. This only allows you to view the list of computers previously added to the online system, but does not allow you to contact them. The second (and most important) password is the access password, which allows you to connect to your computer and see confidential data.


Main window interface


Remote access notifications

When using the "Messages" option, you can notify the user about something. Other safety features:
The user cannot remove or close the tracking module even through the task manager.

Remote Desktop

When controlling a remote PC, the screen of that computer (over the Internet or LAN) is displayed on your own monitor. That is, you can see everything on the remote PC as if you were sitting in front of it, regardless of the distance between the PCs.

The program allows you to work with various remote PCs simultaneously, from anywhere in the world.

How does Remote Desktop in NeoSpy differ from other programs?

The main advantages of NeoSpy remote monitoring software are:
- Built-in keylogger;
- High speed and performance;
- Internet gateway allows you to connect to a remote PC behind a firewall or when there is no routing IP address or the IP address changes dynamically - this is a unique feature of the program!
- Low load on the network, due to the optimized data compression algorithm. The encryption algorithm makes using the program absolutely safe;
- Multiple simultaneous connections. With this function, the network administrator can efficiently view different remote computers at the same time;
- The graphical interface is convenient and intuitive;
- Remote desktop is easy to install. You don't need to be a computer expert to set up and operate this software.

UltraVNC - This program is powerful and simple, and just as importantly, it's free. It displays the desktop of the remote PC (via the Internet or LAN) on your computer screen. The program allows you to use your mouse and keyboard to control the remote computer to which you are connected. You can control this computer like your own. For technical support workers, this program will be especially useful because will help you quickly access the client's PC and carry out the necessary operations, wherever the client is. The program does not require particularly complex actions from the client and is launched from a file. UltraVNC works fine under almost all operating systems (Windows: from Windows 95 to Windows8, Linux, Mac OS) x32 and x64. With the built-in viewer, you can exchange files between computers.


UltraVNC interface


Who will benefit from UltraVNC - For those who need support for remote Windows users. The products have been specially designed to meet the needs of:

  • Help desk;
  • IT departments;
  • Users who want to help their family and friends, or access their home PCs from work or internet cafes.

DameWare Mini Remote Control

Powerful remote control software for PCs that run on Windows, Linux and Mac OS. DameWare Mini Remote Control (MRC) is one of the best remote control software. DameWare Mini Remote Control is available from the DameWare central server and administration console for advanced management. MRC is licensed for the number of equipment in your organization. The program was created more than 10 years ago and since then thousands of IT administrators have gotten perfect connection to remote servers, PCs and laptops thanks to DameWare Mini Remote Control. DameWare MRC provides remote control for Mac OS X, Windows and Linux systems and includes many great features for remote PC control.

Intuitive management interface. You can receive information from remote computers that can be located anywhere: in the same building, on the other side of the city, or around the world. DameWare MRC makes remote desktop use incredibly fast.

DameWare Mini Remote Control advantages:

  • Remote control of Windows, Mac OS X and Linux systems. Connection via MRK, RDP or VNC from one console. A separate screen is created for each user for easy remote troubleshooting. Possibility of transferring files during remote control sessions Mini Remote Control can be deployed from DameWare's central server and administration console, which provide enhanced control from a single center. You can restart your computer and turn on sleeping computers, remotely edit BIOS settings, create Mount ISO images on remote PCs. It is possible to install or reinstall the OS remotely.

    With the chat feature in DameWare MRC, you can chat online with remote users to customize their computer. DameWare MRC allows you to define rules for accessing remote PCs for different types of users: require non - administrators to get permission for remote connections; allow administrators to connect without permission; manage access rights using Group Policy. Automatically deploy remote control: DameWare MSI Builder is included in the MRC, which allows you to create an MSI package for installing MRC client service agent, including with any custom settings. DameWare Mini Remote Control supports identification and remote connection using a smart card. MRC is part of the DameWare Remote Support System (DRS) administration tool. In addition to RTOs, the DRS software package includes DameWare Mobile, Windows administration, Active Directory, management, configuration and export tools. However, please note that to download the trial version, you will need to fill out a registration form.

Radmin 3 is a program for remote control of your Windows PC. The program makes it possible to work on several computers at once quite fully, simply by connecting to the desktop of a remote PC. The software allows you to use many languages, exchange files. The ability to work in Telnet mode makes it possible to manage a large organization remotely without problems.


Remote control Radmin


Program features:
- The program is compatible with all versions of Windows.
- Excellent working speed.
- Secure connection.
- Supports Intel ® AMT features.
- Works under Windows 8 x86 and x64.
- Support for multi-user chats, both text and voice.
- Working with multiple monitors.
- Easy and simple to install.
- File transfer is protected.
- Doesn't require a lot of system resources.
- Supports multiple connections at the same time.
- Technical support is free.
Additional features:

Choice of screen color rendering mode: from 2 thousand to 16 million colors.
- Mouse wheel support.
- Support for keyboard shortcuts.
- There is no limitation on the screen resolution of the remote PC.
- The viewer is compatible with Wine (works under Linux OS).
- Clipboard support.
- Unlimited address book.
- Built-in search for Radmin servers.
- Great help.
- Work in TelNet mode.
- Ability to remotely shutdown the PC.
- Logging of all connections.



Another program that allows you to easily connect to any computer that has Internet access is TeamViewer. You only need an ID and a password, because the program can run even without installation. TeamViewer is a program for managing a PC, showing a specific window from your screen to other users, which helps to conduct employee training, hold meetings, listen to employee reports and simply discuss and plan work without leaving the computer.


Remote control via TeamViewer


You can create an account on the program's website and add any computer to your address book. Lists inside the book are supported, which will allow you to connect to the desired computer in just two clicks, simply by selecting the desired PC name from the list. For persistent connections, you can set a permanent password and save it in the address book. This will allow you to quickly connect to the desired computer without entering a password. TeamViewer advantages: The program has a conference mode (but there is a limitation of 25 participants). There is support for mobile devices. You can take screenshots in real time. TeamViewer guarantees a secure connection. The program is shareware and has free usage restrictions. Paid options are more suitable for large companies. However, there are some connectivity issues between different versions. A user with version 9 will no longer be able to connect to a user with version 4.



Anyplace Control is a remote control program. The program displays the remote desktop of the client's computer on your screen and allows you to control it remotely using your own mouse and keyboard. Some of the popular software applications include remote support within a corporate environment or simply work from home with remote access to office computers.

Transfer files between PCs Anyplace Control provides a simple and secure option for transferring files between PCs using an interface that is similar to Windows XP Explorer. Anyplace Control file transfer software is very fast and reliable. Even in the event of a network failure, it will resume transmission at the point where the failure occurred. Thus, there is no need to start the procedure again. No need to configure a router or firewall. You can connect to the remote desktop in three different ways: "Connection IP", "Account-Connection" and "Computer Connection ID" Anyplace Control provides access to remote PCs over the Internet that do not have external IP addresses. You can easily connect to other PCs with dynamic IP addresses or internal (192.168.xx) addresses without any additional network configurations. You will be able to easily connect to your PC over the Internet even if it is behind a router, firewall or proxy server. No need to open firewall ports or configure your router.


Anyplace Control interface


You can connect to your client in a few clicks. Anyplace Control does not require any special computer skills. If the standard installation of the host module is too complex, then the remote user can manually download the software by clicking on a special link that has a pre-configured host module (does not require installation or any additional configuration).

Summing up, we can say that most programs support the most necessary functions - direct control of a remote PC. Some are free of charge, some will have to be purchased. Some programs support the creation of accounts, which further greatly simplifies remote management. Often, you can simply view the screen of a remote computer without taking control of the latter. However, not all programs are multiplatform. Some people work exclusively under the control of only one operating system, which is not very convenient in a large organization. For such purposes, it is much more expedient to use paid global products that support the creation of accounts and lists of PCs, save passwords, run under most of the most popular operating systems, and which are easily integrated into a large organization. If you just need to periodically monitor the screen of your home PC remotely, there is no point in buying expensive software, most of the functions of which you will not need. It is also worth paying attention to the program's operation itself: some clearly show your remote presence on the computer, and some do not manifest themselves in any way, which will be very useful for covert monitoring of the computer.

Programs that might interest you

- a program for tracking your computer.

- Checking the loyalty of the spouses;
- Control of children on the Internet;
- Calculation of careless employees at work.

NeoSpy intercepts and sends you email all correspondence, screenshots, visited sites and passwords.

PasswordSpy - program for recovering saved passwords from browsers and email programs.

- Recover lost passwords;
- Support for more than 100 programs (ie, chrome, opera, firefox, outlook, the bat! And others);
- The portable version can be run from a USB stick.

Browsers, email programs, instant messaging programs store information about the passwords you use and PasswordSpy can recover them.

VoiceSpy - a program for the hidden recording of Skype conversations.

- Fast installation and permanent recording of all conversations;
- Completely hidden mode of operation;
- Sending recorded conversations in mp3 to e-mail.

Internet Sheriff - a program for blocking unwanted sites.

- Protecting the child from harmful and corrupting information;
- Blocking entertainment and social networks for employees;
- Ready-made lists of porn sites, social networks, entertainment sites.

Reprinting of materials from the site site is allowed only if all indexed links are saved, including links to the program page in the site directory

Spyware for your computer will help you find out what your child or employee is doing on the computer, as well as clarify which sites they visit, with whom they communicate, what they are writing to and to whom.

For this, there are spyware - a special type of software that collects information about all of his actions without the user noticing.

Spyware for your computer will solve this problem.

Spyware for a computer should not be confused with a Trojan: the first is absolutely legitimate and is installed with the consent of the administrator, the second gets on the PC illegally and carries out hidden malicious activity.

Although, cybercriminals can also use legitimate tracking programs.

Spy apps are most often installed by business executives and system administrators to monitor employees, parents to spy on children, jealous spouses, etc.

In this case, the "victim" may know that she is being monitored, but more often than not, he does not know.

Review and Comparison of Five Popular Spyware

NeoSpy

NeoSpy is a universal spy program for keyboard, screen and user actions. NeoSpy works invisibly and can hide its presence during installation.

The user who installs the program has the opportunity to choose one of two installation modes - administrator and hidden.

In the first mode, the program is put open - it creates a shortcut on the desktop and a folder in the Program Files directory, in the second it is hidden.

Program processes do not appear in Windows Task Manager and third-party task managers.

The functionality of NeoSpy is quite wide and the program can be used both as home tracking and in offices to control employees.

Real Spy Monitor

The next spy is Real Spy Monitor. This English-language program has not only tracking functions, but can also block certain actions on.

Therefore, it is often used as a parental control tool.

For each account in the Real Spy Monitor settings, you can create your own, for example, to visit certain sites.

Actual Spy is positioned by developers as a keylogger (keylogger), although the program can do more than just record keystrokes.

It monitors the contents of the clipboard, takes screenshots of the screen, monitors site visits, and so on, which is part of the main set of spies we reviewed.

When installed, Actual Spy creates a shortcut in the Start menu, so it can be noticed by the user.

The launch also takes place openly - to hide the program window, you must press certain keys.

The possibilities of Actual Spy are not much different from those of competitors. Among the shortcomings, users noted that it correctly records keystrokes only in the English layout.

Did you like the article? To share with friends: