Install keylogger on your computer. Computer spyware - what is it? Tracking ICQ

Who among us didn't want to feel like a cool hacker at least once and break at least something? :) Even if not, then how great it would be to get a password from mail / social. the network of a friend, wife / husband, roommate thought at least once everyone. :) And you have to start somewhere, after all! A significant part of attacks (hacks) involves infecting the victim's computer with so-called keyloggers (spyware).

So, in today's article we'll talk about what are free software for tracking computers on windows based , where you can download their full versions, how to infect the victim's computer with them, and what are the features of their use.

But first, a little introduction.

What is and why are keyloggers needed?

About what it is, I think you guessed it yourself. As a rule, they are a kind of program that is hidden (although this is not always the case) installed on the victim's computer, after which it records absolutely all keystrokes on the given node. At the same time, in addition to the pressing themselves, the following is usually recorded: the date-time of pressing (action) and the program in which these actions were performed (browser, including the site address (hurray, we immediately see what the passwords are from!); Local application; system services (including passwords for logging into windows), etc.).

One of the problems is immediately visible from here: I get access to my neighbor's computer for a couple of minutes and I want to get her VK password! I installed a miracle program and returned the computer. How can I then look at passwords? Looking for a way to take the computer away from her again? The good news is: usually not. Most keyloggers are able not only to store the entire accumulated base of actions locally, but also send it remotely. There are a lot of options for sending logs:

  • Fixed e-mail (there may be several) is the most convenient option;
  • FTP server (who has it);
  • SMB server (exotic, and not very convenient).
  • Fixed flash drive (insert it into the USB port of the victim's computer, and all logs are copied there automatically in invisible mode!).

Why is all this necessary? I think the answer is obvious. In addition to the banal stealing of passwords, some keyloggers can also do a number of nice things:

  • Logging of correspondence in the specified social. networks or messengers (for example, Skype).
  • Capture screenshots of the screen.
  • Viewing / capturing data from a webcam (which can be very interesting).

How to use keyloggers?

And this is not an easy question. You have to understand that just finding a convenient functional good keylogger is not enough.

So, what is needed for the successful operation of the spyware:

  • Administrator access to a remote computer.
    Moreover, it is not at all necessary just physical access. You can easily go there via RDP (Remote Desktop Service); TeamViewer; AmmyAdmin, etc.
    As a rule, the greatest difficulties are associated with this item. However, I recently wrote an article on how to get administrator rights in Windows.
  • Anonymous e-mail / ftp (by which you will not be calculated).
    Of course, if you break your neighbor Aunt Shura, this point can be safely omitted. As in the case if you have the victim's computer always at hand (ala, find out the passwords of the brother / sister).
  • Lack of working antiviruses / internal systems Windows protection.
    Most public keyloggers (which will be discussed below) are known to the overwhelming majority of antivirus software (although there are logging viruses that are embedded in the OS kernel or system driver, and antiviruses can no longer detect or destroy them, even if they are found). In view of the above, antivirus software, if any, will have to be mercilessly destroyed. In addition to antiviruses, systems such as Windows Defender (those first appeared in Windows 7 and beyond). They catch suspicious activity of the software running on the computer. How to get rid of them can be easily found in Google.

Here, perhaps, are all the necessary and sufficient conditions for your success in the field of stealing other people's passwords / correspondence / photos or what else you want to encroach on.

What types of spyware are there and where to download them?

So, let's start an overview of the main keyloggers that I happened to use in my daily practice with links to download them for free. full versions (i.e. all versions are the latest at the moment (for which it is realistic to find a cure) and with already working and tested cracks).

0. The Rat!

Ratings (out of 10):

  • Stealth: 10
  • Convenience / usability: 9
  • Functionality: 8

This is just a bomb, not a keylogger! In working order it takes 15-20 KB. No wonder: it is entirely written in assembly language (veteran programmers shed tears) and was written mostly by enthusiastic hackers, due to which the level of its secrecy is simply amazing: it works at the OS kernel level!

In addition, the package includes FileConnector - a mini-program that allows you to glue this keylogger with absolutely any program. As a result, you get a new exe-file of practically the same size, and it works exactly the same as the program with which you glued it! But after the first launch, your keylogger will be automatically installed in invisible mode with the parameters of sending logs that you preset. Convenient, isn't it?

A great opportunity for social engineering (bring a game / presentation file to a friend on a flash drive, or you can even just a Word document (I will tell you about how to create an exe-ik that launches a specific word / excel file in one of my next articles), run, everything is fine and fine, but the friend is invisibly already infected!). Or simply send this file to a friend by mail (it is better to download a link to download it, because modern mail servers prohibit sending exe files). Of course, there is still a risk from antiviruses during installation (but it will not be there after installation).

By the way, with the help of some other tricks, you can glue any distribution of hidden installation (those are in The Rat! And Elite keylogger) not only with exe-files (which still arouse suspicions among a little bit advanced users), but also with ordinary word / excel and even pdf files! Nobody would ever think of a simple pdf, but it wasn’t it! :) How this is done is the topic of a whole separate article. Those who are especially zealous can write me questions via the feedback form. ;)

All in all, The Rat! can be described for a very long time and a lot. It's done much better than me here. There is also a download link.

1. Elite keylogger

Ratings (out of 10):

  • Stealth: 10
  • Convenience / usability: 9
  • Functionality: 8

Probably one of the best keyloggers ever created. Among its features, in addition to the standard set (intercepting all clicks in the context of applications / windows / sites), includes intercepting messages from instant messengers, snapshots from a webcam, and also - which is VERY important! - interception of passwords of the WinLogon service. In other words, it intercepts Windows logon passwords (including domain passwords!). This became possible due to its work at the level of the system driver and launching it at the stage of OS boot. By virtue of the same feature, this program remains completely invisible to Kaspersky and all other anti-malware software. Frankly, I have not met a single keylogger capable of this.

However, do not flatter yourself too much. The installer itself is recognized by antiviruses very easily and to install it, you will need admin rights and disabling all antivirus services and services. Once installed, everything will work perfectly anyway.

In addition, the described feature (work at the OS kernel level) introduces requirements for the OS version on which keyloggers will work. Version 5-5.3 (links to which are given below) supports everything up to Windows 7, inclusive. Win 8/10 as well windows family server (2003/2008/2012) are no longer supported. There is version 6, which functions perfectly, incl. on win 8 and 10, however, it is currently not possible to find a cracked version. It will probably appear in the future. In the meantime, you can download Elite keylogger 5.3 from the link above.

There is no network mode, therefore, for use by employers (to monitor the computers of their employees) or a whole group of people is not suitable.

An important point is the ability to create an installation distribution with predefined settings (for example, with a given mail address, where you will need to send logs). At the same time, at the output you get a distribution kit that, when launched, does not display absolutely any warnings or windows, and after installation it can even destroy itself (if you check the corresponding option).

Several screenshots of the 5th version (to show how beautiful and convenient everything is):

2. All-in-one keylogger.

Ratings (out of 10):

  • Stealth: 3
  • Convenience / usability: 9
  • Functionality: 8

Also a very, very handy thing. The functionality is quite at the level of the Elite keylogger. With secrecy, things are worse. Winlogon passwords are no longer intercepted, it is not a driver, it is not built into the kernel. However, it is installed in the system and hidden AppData directories, which are not so easy to reach for unauthorized users (not those on whose behalf it is installed). Nevertheless, sooner or later antiviruses successfully do this, which makes this thing not particularly reliable and safe when used, for example, at your work to spy on your own bosses. ;) It will not work to glue with something or to encrypt the code to hide from antivirus software.

Works on any version of Win OS (which is nice and practical).

As for the rest, everything is fine: it logs everything (except passwords for logging into Windows), sends it to anywhere (including e-mail, ftp, a fixed USB flash drive). Convenience is also great.

3. Spytech SpyAgent.

Ratings (out of 10):

  • Stealth: 4
  • Convenience / usability: 8
  • Functionality: 10

Also a good keylogger, albeit with dubious stealth. Supported OS versions are also all possible. The functionality is similar to the previous options. There is an interesting self-destruct function after a specified period of time (or upon reaching a predetermined date).

In addition, it is possible to record video from a webcam and sound from a microphone, which can also be in great demand and which the previous two representatives lack.

There is a network mode of operation, which is convenient for monitoring an entire network of computers. By the way, StaffCop also has it (it was not included in the review due to its uselessness for one user - an individual). Perhaps this program is ideal for employers to spy on their employees (although the leader in this field is unconditionally StaffCop and LanAgent - if you are a legal entity, be sure to look in their direction). Or to keep track of your offspring who love to sit watching "adult sites". Those. where no more secrecy is needed, but convenience (including a bunch of beautiful logs, reports, etc.) and the functionality of blocking specified sites / programs (SpyAgent also has it).

4. Spyrix Personal monitor.

Ratings (out of 10):

  • Stealth: 4
  • Convenience / usability: 6
  • Functionality: 10

The functionality is at the level of the previous candidate, but the same problems with stealth. In addition, the functionality includes an interesting thing: copying files from USB drives inserted into the computer, as well as remote viewing of logs through a web account on the Spyrix website (but we are going to download a cracked version, therefore it will not work for us).

5. Spyrix Personal monitor.

Ratings (out of 10):

  • Stealth: 3
  • Convenience / usability: 6
  • Functionality: 8

I will not describe in detail, because this copy does not have anything that one of the previous spies did not have, however, someone may like this keylogger (at least for its interface).

What do we end up with?

The issue of using a keylogger is more ethical than technical, and it strongly depends on your goals.

If you are an employer who wants to control your employees, feel free to put StaffCop, collect written permissions from all employees for such actions (otherwise you may not be weakly attracted for such cases) and it's in the bag. Although I personally know more effective ways improving the efficiency of their employees.

If you are a beginner IT specialist who just wants to test what it is like to break someone and how it works in general, then arm yourself with social engineering methods and test your friends using any of the examples given. Remember, however, that victim exposure is not conducive to friendship and longevity. ;) And you certainly shouldn't check it at your work. Mark my words: I have experience with this. ;)

If your goal is to spy on your friend, husband, neighbor, or maybe even do it regularly and for money, think carefully about whether it's worth it. After all, sooner or later they can attract. And it's not worth it: "rummaging through someone else's dirty linen is not a pleasant pleasure." If you still need to (or maybe you work in the field of investigating computer crimes and such tasks are part of your professional duties), then there are only two options: The Rat! and Elite Keylogger. In the mode of hidden installation distributions, glued with word / excel / pdf. And better, if possible, encrypted with a fresh cryptor. Only in this case it is possible to guarantee less secure operation and real success.

But in any case, it is worth remembering that the competent use of keyloggers is only one small link in achieving the goal (including even a simple attack). Administrative rights are not always available, physical access is not always available and not all users will open, read, and even more so download your attachments / links (hello to social engineering), the antivirus will not always be disabled / your keylogger / cryptor will not always be unknown to him ... All of these and many of the unsaid problems are solvable, but their solution is the topic of a whole series of separate articles.

In a word, you have just begun to plunge into a difficult, dangerous, but insane interesting world information security. :)

Yours faithfully,Lysyak A.S.

Applications and special programs on smartphones are increasingly used by us in everyday life. We get used to making purchases with their help, conducting financial operationschatting with friends around the world. If it becomes necessary to additionally monitor your child's social circle, to listen to the conversations of company employees or family members, you will need a spy program for android or ios, which is easy to download and install on a smartphone. It will be useful for monitoring children, the elderly, household staff or employees.

What is spyware

To use the phone control service, you need personal registration on the program developer's website. When registering, you need to remember your login, password to enter the service, confirm your phone number or email address. Spy programs differ from each other in their control functions, in the types of presentation to you of information "taken" from the controlled apparatus. It can be a screen screen, a table of calls, SMS, call records. The program for spying on the Android phone must be downloaded, installed, activated on the smartphone secretly from the user.

Types of spyware

Remote control programs for smartphones are divided into the following types:

Spy functions

By exercising control over the smartphone, the spy program for Android implements the functions of tracking and logging all actions of the object. After collecting information, depending on the type of functions you have selected, the utility will provide an opportunity to receive data on your smartphone or computer via the Internet:

  • log of incoming, missed, outgoing calls of subscribers with their names, the duration of the conversation;
  • audio recordings of telephone conversations;
  • list and texts of all sms, mms messages with the time they were received or sent;
  • photo and video information taken by the spy camera of the controlled apparatus;
  • the current location of the subscriber from online tracking movements using geolocation on base stations of a GSM operator or GPS navigation;
  • history of visits to smartphone browser pages;
  • accounting of downloaded, installed, used applications;
  • sound control of the environment using remote control microphone.

Spyware for Android

Among the range of spyware on offer there are free utilitieswhich, when analyzed and verified, turn out to be ineffective. To obtain high-quality information, it is necessary to spend funds for collecting, storing photo, video, audio information. After registering on the developer's website, the client receives a personal account with an indication of the connected control functions, collected information.

Paid wiretap program mobile phone for Android is developed with the need to satisfy the most fastidious customers in several ways:

  • ease of installation;
  • invisibility of being on a controlled smartphone;
  • convenience for the customer to receive and store the collected information.

Neospy

One of the simplest spy programs for your computer or smartphone is Neospy. NeoSpy Mobile for Android platform is a legal application that can be downloaded from Google play... While loading new version NeoSpy Mobile v1.9 PRO with installation, downloading the apk archive, settings are possible in which the program will not be displayed in the list google applications Play, will be able to monitor the keyboard of the smartphone, intercept photos from the camera. The cost of using the program depends on the selected functions and will range from 20 to 50 rubles per day.

Talklog

More serious is the spy on Android phone Talklog. Before installing it on your smartphone, you will need to disable the anti-virus software... You will need to allow installation of applications from other sources in your phone's security settings. The Talklog service is a full-fledged spy capable of obtaining almost all information about the activity of a monitored object. The utility has a free trial mode with its capabilities and several basic free functions. The cost will be from 10 to 50 rubles per day, depending on the functionality you need.

Flexispy

The Flexispy spy program for Android includes a huge number of ways to access your smartphone - intercepting SMS, MMS messages, wiretapping your phone, recording telephone conversations, reading dialogs from 14 internal chats (Facebook, WhatsApp, Viber, Skype, WeChat, Telegram, etc.) , call interception in real time, listening to the environment of the phone through the microphone, more than 140 functions. The cost of using the utility is appropriate - the minimum Premium package will cost you 6,000 rubles for 3 months, the maximum Extreme - up to 12,000 rubles for 3 months of use.

Mobile Tool

MobileTool spy app for Android operating system will provide you with information about calls, SMS, MMS, phone location, phone book... It is able to remove its shortcut from the list of applications. You will have access to functions - viewing photos, protecting against theft by locking the device, turning on the siren. All information will be available in personal account on the application site. There is a two-day trial mode of functional testing, discounts depend on the period of use. The average payment for using the utility will be about 30 rubles per day.

Mobile Monitoring

Mobile spy for Android Mobile Monitoring (mobile monitoring) after registration on the site, selection tariff plan and payment will make available the saving of telephone conversations, the function of the voice recorder, saving all SMS-messages, geolocation of the location of the phone, building routes of movement. The program works on smartphones of any mobile operators Russia. The cost when choosing only geolocation will be 800 rubles for 3 months, full functionality - 1550 rubles for 3 months, with a 40% discount when paying for a year.

How to install spyware on your phone

Installation of a mobile spy begins with registration via the Internet on the manufacturer's website, choosing a tariff plan, paying for services. Then a link is provided, which must be entered in the smartphone browser to download the program. Some spy programs for Android are available through Google Play and are downloaded like regular applications. When installing and activating the program, you will need permission to access all the smartphone functions necessary for its operation. You may need permission to use programs that are obtained from unknown sources.

How to detect spyware on Android

Most spyware for Android have functions of masking their location on the smartphone. They can exclude themselves from the list of applications, be inactive during periods of using the phone. This software can be detected by many antivirus software... To protect against spyware and malware, you should make it a habit to run a full phone scan once a week, or set it up to run automatically on a schedule. The main signs of such programs working on the phone may be:

  • braking of the mobile phone;
  • fast battery discharge;
  • unjustified eating up of Internet traffic.

Video

Found a mistake in the text? Select it, press Ctrl + Enter and we'll fix it!

Many PC users running one of Windows often need programs that monitor your computer.

Such people most often become bosses of various levels, who are subordinate to from several people to several dozen or even hundreds of employees, working mainly in offices and shops, jealous husbands or wives (girls or boys), parents of children.

In the modern world, it is rather difficult to keep track of what a person is doing on the Internet on a smartphone, but it is much easier to install tracking of user actions on a PC that several people have access to.

Let's look at seven applications that will help collect data on user activity on a computer under control.

We do not compile the top, do not rate the applications and choose the best, but only suggest that you familiarize yourself with the current spies, which are regularly updated and supported.

Note! Spying on someone's actions on a computer is an interference with a person's personal life, so you should not do this unless absolutely necessary, and if you decide to take such a step, be sure to notify everyone you follow about it.

LightLogger

The app is developed by one person and is updated regularly. Great for home use.

Home is meant to monitor the activity of family members or acquaintances who may come to visit, so that something from your computer to do on the internet.

LightLogger features all the classic spy features. It allows you to monitor keystrokes on the keyboard and display data for each program, which will show what messages a person entered in which application, display all his passwords and logins.

Web page monitoring records the history of site visits over time on the page.

Invisible

An important advantage of an elite spy is absolute secrecy. Not only does it not create shortcuts and is not displayed in the taskbar and tray, but it also hides its process from the Task Manager and does not even place a shortcut in the list of frequently launched ones.

Due to the daily update of the program kernel, it is invisible to all antiviruses and anti-keyloggers.

Keystroke recording

Keylogger monitors every keystroke and click of any mouse button.

With these functions, remaining in the shadows, the utility will intercept all typed messages, message texts, electronic documents, will collect everything search queries and data for authorization in the accounts of various Internet pages.

The program code is based on the use of written in Low-level driver assembler, which starts earlier than the Windows graphical shell, which makes it possible to find out the password for the account.

Retrieving browser history

No popular web browser can hide your navigation history. It is easy to track the Internet activity of children and employees with a time stamp (when they visited the site, how long they spent).

Chat recording

As for instant messengers, Elite Keylogger records messages from each of the programs (ICQ clients,) and mail agents in order to provide you with information about who and through what they are communicating with on your computer.

Remote monitoring

After collecting the data, reports can be sent to the specified e-mail or FTP-server, making it possible to get acquainted with the actions of subordinates, wife or child, being far from the computer where the keylogger is working. This will also help family members be more careful, and employees will spend less time in or playing games.

Methods of receiving reports

The received information can be stored on the hard disk of a computer, sent by e-mail or via FTP, sent by and even secretly copied to a connected or. The size of the logs is not limited.

Other possibilities

The developers did not refuse screenshots, records of all running applications over time, their activity and work in the background. Elite Keylogger's clipboard is also monitored.

It is difficult to choose a clear leader among the reviewed and similar programs. The functionality of most tracking utilities is similar, only a few developers try to bribe the client with the presence of unique functions, increased program secrecy, design and work with reports.

With the help of special utilities, spyware, you can monitor the actions of employees during working hours or children in your absence. They use spyware in businesses and offices, at home to check children or spouses. The user will not notice such a utility, but you will see all his activity. A spy for a computer will show who a person is texting with, on what sites it happens, with whom he is friends.
Spyware has nothing to do with Trojan horse. The first utilities are installed on the computer by the system administrator and are authorized, while the second ones appear illegitimate, act covertly and cause harm. If you are afraid of intruders, know that they can spy on your actions using legitimate software.

Most often, for example, in enterprises, employees do not know that their surfing on the Internet is being monitored special utilities... But there are exceptions: employees are warned about monitoring them.

NeoSpy


NeoSpy is a versatile utility with which you can monitor the user. She spies on the monitor and keyboard, and also controls user actions. It is difficult to detect its presence on a computer if it is installed using a hidden mode. In this case, already during installation, the program will not detect itself. It will not appear in the task manager either. You can also select the administrator mode, but the utility is visible in this case: there is an icon on the desktop and a folder.

The universal spy is functional and designed for a wide range of users: it can be installed both at the enterprise and at home.

There are three versions of NeoSpy spyware: two paid with different features and a free one. For the third version, you can even choose a hidden tracking mode. The only limitation in free program - analysis of reports.

NeoSpy can do the following:

  • watch the keyboard;
  • control internet surfing;
  • follow the user's monitor online and show the results on another computer or mobile device;
  • create and save images of the screen and web-camera;
  • monitor the turning on / off the computer, the duration of downtime, the use of disks and flash drives;
  • copy information from intermediate storage (buffer);
  • collect and analyze statistical data;
  • save information about documents that are sent to print, or copied to disks and flash drives;
  • monitor text messaging programs and save Skype calls;
  • report the location of the laptop (using a wireless network).


Users like the functional parameters of this universal spy, the Russian-language interface, the hidden mode of use, the excellent interception of keystroke events.

Real Spy Monitor


This spyware is often used by adults to monitor their children. Although the program does not have a Russian-language interface, it has more functionality than the previous one. Real Spy Monitor knows how not only to observe the user's work on the computer, but also prohibit certain actions with the given parameters. This is what attracts parents who want to control their children.

In Real Spy Monitor, you can create multiple accounts and manage them in different ways. For example, prohibit some Internet services for the first account, and others for the second. User interface created on graphic thumbnails and, despite the lack of support for the Russian language, it is easy to configure this spyware. There is no free version in this utility. To use a spy, you will have to pay about $ 40.

Real Spy Monitor does the following:

  • intercept keystroke events, information from intermediate storage, enable / disable and the duration of computer downtime, monitor surfing, mail and other messages;
  • work with multiple accounts that can be configured in different ways;
  • observe user actions in the floor hidden mode (the spy shows up in the manager but does not have an active window);
  • run selectively together with the system start for different accounts.
Real Spy Monitor - functional program with great possibilities. The disadvantages include the lack of support for the Russian language and free version, semi-hidden mode with display in active processes.

SpyGo


SpyGo designed for home use, but you can also use this spy to control employees. The utility is easy to operate: the "Start" key starts tracking. Reports can be received by e-mail or via File Transfer Protocol. Software prices vary, and the more features, the more expensive. There are trial version - 25-minute observation per day, but without sending the results.

SpyGo spy can do the following:

  • intercept key press events;
  • control surfing the network by analyzing data about resources, requests in search engines, time spent on the site, history;
  • record everything that the user does with programs, files, monitor installations and uninstallations of applications;
  • record everything that happens on the screen;
  • intercept information from intermediate storage;
  • monitor the power on / off and the duration of computer downtime, for removable media;
  • listen to conversations in an apartment or office (microphone connection is required).
SpyGo has disadvantages: it does not work for everyone windows versions, occasionally does not send the results of observations, can exit the hidden mode. But, despite this, users fell in love with the program for its simple operation and wide functionality.

Snitch


Spyware Snitch has only one version and perfectly knows how to observe users, "knock" on them. The program is very easy to configure, does not load the computer and monitors the user in stealth mode.

The Snitch utility can do the following:

  • intercept keystroke events, information from the intermediate storage, monitor the power on / off and the duration of computer downtime, as well as surfing the network, "read" text messages;
  • control application processes, protecting against actions of intruders, for example, forced termination;
  • monitor user actions even if the computer is not connected to the Internet;
  • analyze events and create detailed reports and graphs;
  • does not require specific network settings.
The only disadvantage of spyware software that is noticed by users is conflict with some antivirus programs.

How to detect a spy on a computer?

A stealthy spy is not easy to spot. Before installing, add to the list of exclusions to avoid conflict with the antivirus. Some programs find viruses that spy on users.

You can deceive a spyware utility using special protection tools. They prevent the spy from intercepting keypress events and screenshots, although he continues to actively monitor the activity. Especially relevant for employees of enterprises who do not want to confidential information (passwords, messages) learned by strangers.

You've probably heard about spyware. Yes, they do exist. Many people confuse such programs with viruses, but they are not. Spyware does not have harmful code, their function is different - to find out what you are doing on your computer and send it "where you need it." Basically, such programs can be applied in the field of business. For example, a company's security service may well install such programs on employees' computers so that they know what they are doing during working hours. Spyware is highly functional. They not only tell the "owner" which applications the employee opened, but also record all keystrokes, keep a list of used files, a list of visited Internet addresses, and even take screenshots of the desktop at a given time interval. Those. all entered logins and passwords, correspondence in QIP, Skype and other messengers, as well as the time spent on Internet sites become available.

If an employer installs such programs on his company's computers to protect commercial information and protect against fraud (with informing employees, of course), then this is quite understandable, but what about protection personal information? After all, such a program can be installed on your home computer, and you will not even guess about it (while your accounts in social networks will not be blocked, for example). Unfortunately, spyware is made in such a way that the user does not know anything about it. The tray icon does not hang, warnings do not pop out, and, moreover, processes do not hang. These programs are usually called only by pressing special hot keys.

Consider several spyware programs.

Real Spy Monitor

This program is perfect for the work of several people on one computer with operating system WindowsXP. The person who installed RealSpyMonitor under their account, will always be aware of what other users were doing on this computer. Time and list of files to start, open windows, actions and visited pages on the Internet. You can also set up taking screenshots at a certain time interval.

This program is ideal for home use, in order to protect children from visiting certain "owner" sites or launching files. The program is in English.

Snitch

Snitch Is easy to use software package, which collects information about the user's actions at the computer, for the purpose of its subsequent analysis.

Almost any spy program provides the collected information in a form that is inconvenient for analysis, as a result of which most users use it only as a keylogger (Russian keylogger). Snitch offers comfortable access to the collected data, providing endless opportunities to study the nature and effectiveness of the user's pastime on the computer on which the Snitch tracking module is installed.

The installation of the Snitch client module is extremely simple and does not cause any difficulties, and its work on a computer does not significantly affect its performance, unlike other programs that monitor a computer. As a result hidden tracking passes at the computer, without any negative consequences that reduce the level of comfort in the applications used.

Mipko

This company has several products for different tasks: PersonalMonitor, EmployeeMonitor and TerminalMonitor. Accordingly, for home computer, to control the computers of company employees and to control the actions of employees on the terminal server.

List functionality generally standard, but there is one useful function - alarm mode. Its action is as follows: the administrator enters words into the program database that will be monitored by the keylogger. If the user whose computer is being monitored types one of the forbidden words, MipkoEmployeeMonitor immediately records this and notifies the administrator with a message e-mail or in another way. Such a function is useful, for example, to prevent leakage of confidential data.

(Visited 2,904 times, 1 visits today)