Ensure your computer's security by monitoring all activity on your computer, capturing keystrokes, programs, websites and screenshots.
Completely invisible and easy to use, all information captured is stored in an encrypted log file. The log file can be sent secretly at scheduled intervals to any specified email address.
All activity in Internet Explorer can be monitored, and webpages are cached for viewing offline.
Screenshots can be taken at given intervals, capturing everything that is currently on the screen.
Monitor your computer while you are away, retrieve lost information, monitor your children's activity, and much more!
NEW: Now compatible with GMail!
Capture programs used
Capture websites in Internet Explorer
Encrypted log file
Secretly email log files
Invisible Stealth Mode
Unique playback mode lets you view captured keystrokes/programs/webpages/screenshots in real time
Run silently at startup
Auto-capture at startup
English, German, Spanish
The demo version is fully functional and can be run for 15 days.
Internet Explorer 4+ for capturing websites.
The branded version of this program requires that you include a paragraph in your EULA on Legal Compliance stating that this software can only be installed on systems that the user owns or has explicit permission from the owner to install on. A generical Legal Compliance paragraph will be created for you automatically, and can be edited to suit your needs.