REFOG Keylogger
REFOG Keylogger works like a tape recorder running in hidden mode. It captures all the typed data, username, passwords, emails, chats etc. once the computer turns on. REFOG Keylogger is highly flexible, allowing you to configure multiple alerts on harmful or offensive keystrokes sent or received on their computer. Set your alarms, and get notified instantly with real-time alerts if a per-defined event happens on their PC.
Screenshots
Features
Keystroke recording
This function captures all data that has been entered by your children or an employee using a keyboard, including chats, usernames, passwords, emails, search queries and other content.
Web history logging
Even if users delete their browser's history, the information is retained in Refog's log database and always available via the reports function.
Screenshot history
This ensures that the log of what is being typed by the user is backed up with visual evidence of exactly what they are doing. With screenshot history, it is always possible to gather evidence if an employee is wasting the company's time.
Invisible mode and password protection
You may not want to disclose the act of PC monitoring, so Refog can work in special stealth mode, making it completely invisible even to a skilled PC user. It cannot be found in the program folder, control panel or tray.
Application monitoring and file tracking
Refog is able to record all programs executed on your PC, so it is possible to establish if your kid is playing games instead of doing his homework, an employee is wasting time offline (e.g. playing solitaire instead of working).
IM monitoring
Refog is also compatible with all major instant messaging software (e.g. AIM, Facebook®,Yahoo! messenger, Skype, ICQ, Google Talk, MSN).
Email reports
It is not necessary to gain physical access to monitored computers in order to view their logs. All reports can be delivered via email, and can be read anywhere.
Comprehensive settings and reports
It is possible to set the control levels of monitoring, enable/disable monitoring for given users, setup alert keywords and reports delivery, easily filter log files and much more.
Comments
Post a Comment