SpectorSoft

Totally stealth. Can't see it in task manager. It buries itself in a randomly 
named folder deep in the windows/system folder. It takes grayscale bmp's that 
are very small so you can set it to shoot every few seconds and never fill the 
hard drive. Completely logs keystrokes, programs...start and stops and logs the 
actual use of many programs..for example IM conversations.  You have to get to 
the box to install it but after that the info can be retrieved remotely.  We 
tagged someone with it that was VERY good with computers, he never knew it was 
there.

http://www.spectorsoft.com/products/spectorPro_windows/



From: Mark Boersma [mailto:[email protected]]
Sent: Tuesday, January 27, 2009 9:13 AM
To: NT System Admin Issues
Subject: Big Brother

I'm looking for a good monitoring package for a workstation.  The typical 
logging of which programs are run and what is used on a machine.  Screenshots 
and such would be good.  I need to know what a particular user is doing on a 
laptop at home over the weekend.

Yes, this is a corporate machine and yes I do have full rights to do this.

It would be on one machine at a time and I don't need central management of any 
kind, it's just for the occasional use.

I know there are a lot of packages out there that do what I want, but I am 
interested in any recommendations from the group of good products you've used.  
I don't have any problem paying for a package because they usually aren't that 
expensive and I'm not going to limit myself to the free only choices.

Thanks,

Mark
-------------------------------------------------
Two rules for success in life:
1. Never tell people everything you know.

Mark Boersma
IT Manager
Triangle Associates, Inc.
[email protected]<mailto:[email protected]>

________________________________
Please consider the environment before printing this email.
________________________________

CONFIDENTIALITY NOTICE: This e-mail message, including any attachments, is for 
the sole use of the intended recipients(s) and may contain confidential and 
privileged information. Any unauthorized review, use, disclosure or 
distribution is prohibited. If you are not the intended recipient, please 
contact the sender by reply e-mail and destroy all copies of the original 
message.






~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~

Reply via email to