Remote Spy - Remotely Deployable Spy Software
Realtime Spy is really the most amazing remotely deployable
monitoring software which allows you to remotely monitor a computer
via a web browser, even without physical access to the PC! You can
review all activity logs from anywhere at any time through the Internet!
How does RealTime Spy work?
You must create a remote install module with the configuration
program we offer you, you can name the module as CoolPictures.exe
or FunGame.exe etc, then e-mail the module as an attachment to the
remote PC you wish to monitor. When the user double click on the
attached file, Remote Spy will immediately install itself.**
Of course you can also run the module on the
target computer by yourself to install it if you are able to physically
access the target machine.
Once the module is installed, it will record all activities and
store logs on our server, then you can view logs from anywhere via
the Internet!
|
|
Configuration Program
|
Remote Log Review
Interface
|
What RealTime Spy can do for you:
- Chat
Conversations
Monitor and log both sides of all chat conversations made
on chat clients. Supported clients include the latest versions
of:
AOL/AIM (including 9.0 and Optimized)
AIM Triton
Yahoo Messenger
GoogleTalk
Skype
ICQ
MSN Messenger (including 6.x and 7.x)
Excite Messenger
XFire
- Desktop
Screenshots
Log screenshots of the active window the remote user
is working in and interacting with.
- Real-time
Activity and Keystrokes Viewing
You can see what users do in real-time. It will show
you programs opened and closed, windows viewed, documents opened
or printed, files deleted or created, and websites visited in
real-time, as the user performs the actions. It can also show
you every keystroke users type in real-time.
- Keystrokes
Typed
Log all keystrokes typed by the user. Logs are automatically
pre-formatted from backspaces for easy web viewing via your secure
Remote Spy webspace.
- Email Forwarding (RemoteSpy PLUS
Edition only)
Have all POP3/SMTP emails that a user sends and receives
forwarded to your own private email account for later viewing.
Now you can see all email activity that is going on when you are
not around.
- Events
Timeline Logging
Log all events users performed and view them in an organized
chronically ordered listing. The Events Timeline lets you view
what the events the user performed, in the order they did them.
Events logged include Program Starts/Stops, Website Visits, Document
Viewings and Printings, and more.
- Websites
Visited
Log all website visits performed by the popular browsers
used today. All website visits are logged by website address,
username, and time of the site visit. Remote Spy also logs how
long users visit each website so you can easily see what websites
are visited the longest. Remote Spy supports the latest versions
of the following browsers: Internet Explorer,
Netscape, Opera, Mozilla,
Firefox, Flock,
Google Chrome, and
America Online.
- Internet
Connections
Log all internet connections made and attempted by the
user. Logs include the remote host/port and local host/port.
- Windows
Opened
Log all windows opened and used by the user.
- Applications
Ran
Monitor and log all applications ran by users - Remote Spy
logs when the application was started, stopped, and how long it
was actually used.
- Print
Jobs Executed
Log all print jobs executed by the remote user.
- File
Usage
Log all files and folders created and deleted by the
remote user - including those on portable/removable drives.
- Documents
Viewed
Log all files and documents viewed by the remote user.
- System
Information
Record and monitor system information on the remote machine:
uptime, memory, ram, and more. You can also remotely shutdown,
reboot, restart, logoff, or freeze the remote PC as well!
- System Shutdowns and User changes
- E-mails typed
- Passwords typed
Security Features
- Complete Stealth: Remote Spy is undetectable to all
users once installed. Using minimal PC processing cycles, Remote Spy
is not visible in any way to the user, and records and stores
all logs without any user notification. Remote Spy cloaks
itself to hide from the remote user, so the original file
you deploy can be deleted - yet the PC still stays monitored!
- Remotely Deployable: Remote Spy can be remotely deployed
easily with just a few clicks and minimal user configuration.
- Email Deployment: simply send your configured Remote Spy
module to the remote PC. The user only has to run the attached
file - they do not have to respond or send you any response
to start monitoring - they only have to 'OK' the notice that
states monitoring software is being installed on your computer.
- LAN/Network Deployment: Easily deploy Remote Spy
over a network via network shares or logon scripts. Users
will only have to 'OK' the installation with a single click.
- Secure Password Protection: All your logs are password
protected via secure web encryption. Only YOU can access your
secure log webspace to view logs! Remote Spy does not put your
monitored data at risk - as other remote monitoring tools do -
by allowing direct connections to the remote PC for data retrieval:
all data is securely stored on our servers for viewing ONLY BY
YOU.
- 24/7 Real-time Monitoring: Remote Spy will not stop
monitoring if the user reboots - it will ALWAYS record their activities.
- Basic Remote Administration: Remote Spy allows you to
remotely shutdown, restart, logoff, freeze, and lockdown the remote
PC via your administration area!
Easy-to-Use Features
- Easy to use Web Interface: Remote Spy's web interface
is extremely easy to use - just point and click the logs you want
to view!
- Easy Log Management: Remote Spy's web interface allows
you to clear individual logs, all logs, or entire users from your
webspace in seconds!
- Easy to setup! Remote Spy is extremely easy to setup
and deploy - just enter in your username/password and you are
ready to go!
- Log Archiving: Remote Spy comes with an easy to use archive
utility that allows you to download logs from your webspace for
local log viewing and management.
- Accessible Anywhere! Remote Spy is accessible from any
web-browser, from any location.
- Remote Uninstall: Do not want Remote Spy running anymore?
Remotely uninstall it via your Remote Spy admin area.
- Searchable Logs: Quickly search the activity logs for
keywords!
Other Outstanding Features:
- Logging Access Anytime, Anywhere
24/7 access to the monitored PC, from any location via your
personal website address given to you after you purchase!
Activity logs are updated every half-hour for constant review.
- Centralized, Multiple User Logging
Log and record MULTIPLE PC's from ONE REMOTE LOCATION
without any extra configuration - just click what user names you
want to view logs for! [see
screenshot]
- Real-time Activity and
Keystroke Viewing
As Remote Spy's name implies, it can show you what actions users
do in real-time at the exact instant they perform an action -
from programs being opened and closed, to file activity and website
visits. Remote Spy can also display what users are typing in real-time,
as they type. [see
screenshot]
- Flexible with Internet Connections
Remote Spy can monitor any PC regardless of its Internet connection.
Most other remote deployable monitoring solutions will not work
behind a hardware firewall, router, LAN, or if they are on a dialup
connection - but Remote Spy will! No matter what Internet connection
the remote PC uses, you will be able to view logs from your Remote
Spy web-page.
- Advanced Stealth and Cloaking
Remote Spy runs in COMPLETE STEALTH and cloaks itself
to hide from the remote user! The file you send to the remote
user is able to be discarded and deleted - without affecting Remote
Spy's monitoring process! Please note that Remote Spy does tell
the user that monitoring software is being installed, and they
have the option to cancel the install, but once installed the
software runs invisibly.
- Extremely Small: Extremely small file size for easy
and fast remote deployment (only 104kb! - smaller than an image!)
The filename of the file you send is fully customizable as well!
System Requirements
- Windows all platforms (including Windows 8!)
- 3MB Hard disk space for program files
** To avoid possible abuse, Realtime-Spy requires the
remote user to confirm the installation of RealTime Spy when they
run the file you send them. A window pops up stating monitoring
software will be installed, and if they are not aware of this they
should cancel the installation.
Want to Know More? Click Here!
|