Products
Personal Monitor
Record PC users's actions, grab screenshots and passwords
Keylogger
Keystrokes recording software. Keylogger free trial
Hoverwatch
Cell phone and computer spy
Employee Monitor
Access and control the time spent by your workers
Terminal Monitor
Track employee activities on Terminal Server
Free Keylogger
Free keyboard logger keeps track of all typed text

Video surveillance systems review

21 April 2015

In our previous reviews on various information security, employee supervision software and hardware monitoring systems for offices we have already stressed that many tools can effectively function only in combination with video surveillance systems.

video-surveillance

Main difficulties associated with these systems are in:

  • them being rather expensive
  • extremely difficult selection of the necessary equipment
  • equipment compatibility

The more requirements are imposed on a ready-for-use video surveillance system, the more difficult the product selection is.

Below we review main surveillance systems classes and take a closer look at modern solutions.

More »

How to find a stolen laptop, tablet or phone with the help of applications?

9 April 2015

Nowadays, we are hearing more and more news of how people are getting back their lost or stolen devices thanks to various software applications capable of disclosing identities and geographical location of thieves.

notebook-thief

And it’s not just the iPhones that we’re talking about. The same happens to numerous Android and other OS devices, as owners of tablets and laptops are successfully getting them back.

Below is a brief overview of “antitheft” functions of different platforms and third-party software.

More »

Network devices with parental control features

7 April 2015

We all want to keep ourselves, our children and our computers safe from Internet threats. And people often pay quite a lot of money for professional antiviruses, firewalls and other intricate information security software. This is of course a proper approach than just ignoring threats or using free or unauthorized software of dubious efficiency.

But neither should you overlook some absolutely free ways to protect your computer from already known dangerous sites, viruses, phishing and adult content.

router

In this article we will take a look at both modern routers’ features and free DNS-filters.

More »

Devices for covert surveillance

3 April 2015

Technology and the human imagination do not stand still. This results in us having, not only modern computers, smart phones, and other consumer devices, but also a huge selection of modern high-tech devices, which are not known to the majority of consumers.

The focus is on hardware devices that are designed to collect (sometimes tacitly), store and transmit information (voice recorders, bugs, hidden cameras), as well as on devices that are designed to protect against such interception (suppressors, detectors).

The aim of the article is not to promote the use of such technology (let’s leave this to special services and detectives), but to inform people about how they can be monitored and how they can protect themselves from spy devices.

More »

Enterprise Product Update: New Graphic Reports

31 March 2015

We’re glad to announce out corporate line of products has got a long-awaited update with brand new features.
Refog Employee Monitor and its terminal system equivalent Refog Terminal Monitor both have been updated to version 8.2.5.2180. This update is completely free for customers with a license for version 8.

The most important new feature of the product is a summary report for user activity. Now you can get a handy overview of user activity for a time period. For example, find out the most frequently visited websites or what applications where used the most:

analytics_programs

Each type of logs recorded by the product now has a graphic form. A table representation is still available.

On top of that there’s a general overview of user activity with day-by-day or hour-by-hour breakdown:

analytics_user_activity

These new graphic reports are easier to review and analyze compared to traditional table representation.
New versions of the product are available for download immediately.

buy download

Configuring a child’s computer for using Refog Personal Monitor

26 March 2015

Part 2. Configuring a computer with Windows 7 installed.

In the first part of this manual we described how to configure a computer running Windows 8.1 OS, so that child’s experience with it was safe (both for a child and a computer).

In this part we are going to configure a computer operating under Windows 7. Although the set of tools for parental control provided in Windows 7 is poorer, the key-principles are the same:

  • Setting a password for a parent account
  • Creating a separate account for a child
  • Activation and configuration of the built-in mechanisms for parental control
  • Installation of third-party software in cases when more advanced child monitoring is needed.

 

It should be noted that the first three principles are actual recommendations given by Microsoft (the Windows OS developer) and can be found in their help system, which we are going to refer to.

More »

Configuring a child’s computer for using Refog Personal Monitor

20 February 2015

Part 1. Configuring a computer with Windows 8.1 installed.

These days, children start using the computer as early as at four. However, most home computers do not have any means of protection from potential online threats.

Not only do parents ignore specialized programs, but don’t even use integrated (free) OS tools.

Moreover, even the relatively simple user access permissions mechanism of Windows is used extremely rarely, and the only user of most home computers has full admin rights. And this is not just a security vulnerability, but a real chance of inadvertently losing your computer for a long time.

So, let’s start with the built-in capabilities of the Windows 8.1 OS that can make your children’s interaction with the computer comfortable and safe.

More »

TOP 5 spyware scandals

3 December 2014

1. A built-in keylogger in Windows 10.

1-windowsMicrosoft has confirmed that Windows 10 Developer Preview contains an integrated keylogger that captures everything that users type on their keyboards and sends these logs to the corporation.

Moreover, even voice commands and dictation results are logged in the same way.

The company explained that the collection of this information helps improve the operating system’s word autocompletion feature and the build-in spellchecker.

Particular concerns among some users were raised by the fact that the license agreement (terms and conditions of the Insider Program) states that the user agrees with the disclosure of keyboard logs both to Microsoft and undefined third parties.

2. Keyloggers found in new Samsung laptops.

2-samsungResearchers have found a software keylogger installed on Samsung laptops purchased online.

The program discreetly collected information about key presses, made screenshots and sent them to an unidentified recipient.

An anonymous consultant explained that the purpose of installing this spyware was the collection of data for improving future device control features.

Although Samsung has initiated a lengthy internal investigation, it has not officially admitted its role in this scandal and voiced an assumption that the programs had been installed by store employees.

3. A scandal around the Carrier IQ app installed on 140 million phones.

3-phoneAn app called Carrier IQ was found on a huge number of devices from all major manufacturers, from Apple and Google to Nokia and HTC.

Its official purpose was the collection of phone parameters and general usage details. However, the researchers have found out that the program is also capable of accessing multiple types of users’ data, such as the lists of visited websites and sent text messages.

Apple completely removed the application only in the latest version of iOS. Other manufacturers explained the presence of the program on their devices by a mistake made by wireless service providers during phone localization.

4. Spying computers available for purchase by installments.

Several chains of stores were offering an installment plan for computers with a program called “PC Rental Agent” included in the standard software bundle.

The program was initially intended for monitoring computers sold by installments – that is, computers that still belonged to the stores.
4-shop
However, store employees did not inform customers about the purpose of these programs. They could be used for remotely installing any other software on customers’ systems.

Such software could include tools capable of making screenshots, activating the webcam, recording key presses or locating the system using the nearest Wi-Fi networks.

The investigation revealed multiple cases of abusive behavior by store employees. Some of them were spying on customers for fun, and some of them continued to do so even after the last installment was paid.

The store owners were forced to pay ample compensations to affected customers.

5. Skype – an illusion of privacy.

5-skypeSkype, a popular communications program for text, audio and video chats, has been in the center of spy scandals surprisingly often.

Even before the company was acquired by Microsoft, it was rumored to be a part of “Project Chess”, a secret initiative aimed at making users’ data available to secret agencies.

After Edward Snowden’s revelatory publications, Skype appeared on the list of companies cooperating with PRISM, a monitoring system created by the U.S. National Security Agency.

This information, however, remained a mystery. Which is probably the way it’s supposed to be in spy stories.

Internet and children: parental monitoring software

13 November 2014

We are used to being calm and relaxed when our children are at home. We rightfully assume that they are safe here, away from the dangers of city streets, away from maniacs and crooks… They are in their room, browsing the web, learning new things… educating themselves.
However, this is exactly the type of situation when your child can be in danger. And it’s not about their slouching or bad eyesight. Things can get much worse.

What do we know about the Internet?
And what do we not know about the ways of protecting our children.

Statistics:

Every fourth child has seen porn on the web.
An innocent search query like “red pussy” can bring up results that have nothing to do with pets.

Every third has been psychologically humiliated online, and only 10% of them have told their parents about it.
Social networks are formed by a group of people, and its virtual nature does not make it completely harmless. Teenage media moved from school corridors to the vast spans of social networks long ago, so abusive messages and mocking can result in serious psychological problems and even catastrophic tragedies.

Eight out of ten children are ready to provide private information in exchange for products, services or access to information.
Fraudsters’ sites have learned to work with children. In exchange for products or services, they can fill out questionnaires with very personal questions, up to their parents’ credit card details.

child-security

HOW CAN WE protect our children?

More »

China says no to Kaspersky and Symantec anti-virus software

13 August 2014

ChinaThe Chinese government has removed Kaspersky and Symantec programs from its list of trusted anti-virus software. Both anti-virus companies were also removed from the vendor lists of the state procurement agency.

Local media believe that this is related to attempts by the government to restrict use of foreign technologies by citizens.

The current list of trusted anti-virus developers includes five Chinese companies: Qihoo 360 Technology Co, Venustech, CAJinchen, Beijing Jiangmin and Rising.

A Kaspersky Lab press representative said that the company is currently in talks with Chinese authorities, but claimed that it would be “too premature to go into any additional details at this time”.