|Torrent Size:||12 mb|
|Category:||Security|Keylogger / Monitoring|
|Developer:||Global Spy Software|
Features: Logs the name, time and duration of every program used. Records a keystroke log of what the user typed into each program. Saves regular screenshot images of the users desktop. Records the title and URL of every web page visited. Keeps a log of all folders and files created, renamed, moved or deleted. View the logs in real-time from another PC. Open and close programs, web sites or documents remotely. Watch a live image of the users desktop without them knowing. Take control of the keyboard and mouse remotely. Download and manage files remotely. Log off, restart or shutdown the PC remotely. Operates in total stealth - no visible windows, icons or processes. Runs as a Windows service - impossible for users to disarm.
Remote Desktop Spy
|Good: 22 Bad: 4|
What is new:
Remote Desktop Spy is a powerful computer surveillance research program that you can use at home, school or office to monitor and record every detail of yourPC online one or the other. Remote Desktop Spy contains several integrated tools which work together at the same time to record all programs used, keystrokes typed, web sites visited, and the screen logger that It can take hundreds of pictures every hour. Surveillance Logs can be viewed in real time from a remote computer, so you can monitor your kids or employees remotely from the comfort of your own workstation. You can even watch or control the users desktop, transfer files, start and stop programs, launch web sites and documents, log off, restart or shut down the computer remotely. Beyond surveillance, Remote Desktop Spy allows you to block access to any program, document, or web site, which is based on the current user. You can simply block together, impose a time limit, or require any collateral for the password list. Remote Desktop Spy contains a high level of security and data protection measures. Access to the program and logs to limit the administrator password, network traffic is encrypted to prevent eavesdropping, and logs are compressed and encrypted before storage. The program runs as a service Windows, making it impossible for users without administrator privileges to disarm or remove.