No physical Access Needed to the computer you wish to monitor. All you have to do is e-mail a tiny file to the computer you wish to monitor, then connect to the computer via the e-mail address and start to monitor the subjects internet activity. The file looks like a regular e-mail. Read More
Category Description
Programs designed to monitor user activity. They may be used with or without consent. Because it is sold commercially, many anti-virus vendors do not detect them. The most common form of a commercial monitoring tool comes in the form of a keystroke logger, which intercepts keystrokes from the keyboard and records them in a log. This can then be sent to whoever installed the software, or keylogger, onto the machine. Some Commercial Monitoring Software may take screenshots or video and send the information to an outbound connection.