Products
Personal Monitor
Record PC users's actions, grab screenshots and passwords
Keylogger
Keystrokes recording software. Keylogger free trial
Hoverwatch
Cell phone and computer spy
Employee Monitor
Access and control the time spent by your workers
Terminal Monitor
Track employee activities on Terminal Server
Free Keylogger
Free keyboard logger keeps track of all typed text

About Webcam Snapshot Function

19 May 2015

In our eighth product line we have added a periodic snapshot creation function. Snapshots are created using a connected webcam, and according to the reviews, our users find it quite helpful.

refog-pm-webcam

There are three major questions in relation to this function, and below we will try to address them.

  1. How do you disable webcam activity indicator?
  2. How do you increase snapshot creation frequency?
  3. How to take a video instead of a snapshot?

More »

Personal Monitor 8.4 Update

14 May 2015

We are happy to announce that we have finally launched an update of our Refog Personal Monitor software, which, once again, has a function of user social networks activity interception.

pm-social-1

Based on the requests to our technical support, this function has been anticipated and demanded by the majority of users.

More »

Keyloggers and the Law: Learn from the Mistake of Others

14 May 2015

Yet another story of a criminal case against someone using keyloggers has caused quite a storm; thus, we would like to discuss whether this program is actually legal or not.

shutterstock_154122851

Also, we want to inform you about a new very important update to our program’s interface that is supposed to help our users avoid innocent infringement.

01

More »

Time-and-attendance applications

5 May 2015

Time-and-attendance applications offer an alternative solution for companies worried about insufficient productivity of their employees.

The way these applications work is rather simple. Most of them save information about the open window (an application or a web-site) at any specific moment, computer’s operating time as well as the time the user was actually being active.

And as is the case with personnel monitoring systems, a mere mention of these programs causes a storm of emotions and opposite opinions.

Very often this is a sign of time-and-attendance applications being used heedlessly, at the wrong place and time or in an unbalanced manner. Instead of improving the situation, all this can potentially make it significantly worse.

Let’s see when using such programs is really justified or whether it will do more harm than good.

More »

Video surveillance systems review

21 April 2015

In our previous reviews on various information security, employee supervision software and hardware monitoring systems for offices we have already stressed that many tools can effectively function only in combination with video surveillance systems.

video-surveillance

Main difficulties associated with these systems are in:

  • them being rather expensive
  • extremely difficult selection of the necessary equipment
  • equipment compatibility

The more requirements are imposed on a ready-for-use video surveillance system, the more difficult the product selection is.

Below we review main surveillance systems classes and take a closer look at modern solutions.

More »

How to find a stolen laptop, tablet or phone with the help of applications?

9 April 2015

Nowadays, we are hearing more and more news of how people are getting back their lost or stolen devices thanks to various software applications capable of disclosing identities and geographical location of thieves.

notebook-thief

And it’s not just the iPhones that we’re talking about. The same happens to numerous Android and other OS devices, as owners of tablets and laptops are successfully getting them back.

Below is a brief overview of “antitheft” functions of different platforms and third-party software.

More »

Network devices with parental control features

7 April 2015

We all want to keep ourselves, our children and our computers safe from Internet threats. And people often pay quite a lot of money for professional antiviruses, firewalls and other intricate information security software. This is of course a proper approach than just ignoring threats or using free or unauthorized software of dubious efficiency.

But neither should you overlook some absolutely free ways to protect your computer from already known dangerous sites, viruses, phishing and adult content.

router

In this article we will take a look at both modern routers’ features and free DNS-filters.

More »

Devices for covert surveillance

3 April 2015

Technology and the human imagination do not stand still. This results in us having, not only modern computers, smart phones, and other consumer devices, but also a huge selection of modern high-tech devices, which are not known to the majority of consumers.

The focus is on hardware devices that are designed to collect (sometimes tacitly), store and transmit information (voice recorders, bugs, hidden cameras), as well as on devices that are designed to protect against such interception (suppressors, detectors).

The aim of the article is not to promote the use of such technology (let’s leave this to special services and detectives), but to inform people about how they can be monitored and how they can protect themselves from spy devices.

More »

Enterprise Product Update: New Graphic Reports

31 March 2015

We’re glad to announce out corporate line of products has got a long-awaited update with brand new features.
Refog Employee Monitor and its terminal system equivalent Refog Terminal Monitor both have been updated to version 8.2.5.2180. This update is completely free for customers with a license for version 8.

The most important new feature of the product is a summary report for user activity. Now you can get a handy overview of user activity for a time period. For example, find out the most frequently visited websites or what applications where used the most:

analytics_programs

Each type of logs recorded by the product now has a graphic form. A table representation is still available.

On top of that there’s a general overview of user activity with day-by-day or hour-by-hour breakdown:

analytics_user_activity

These new graphic reports are easier to review and analyze compared to traditional table representation.
New versions of the product are available for download immediately.

buy download

Configuring a child’s computer for using Refog Personal Monitor

26 March 2015

Part 2. Configuring a computer with Windows 7 installed.

In the first part of this manual we described how to configure a computer running Windows 8.1 OS, so that child’s experience with it was safe (both for a child and a computer).

In this part we are going to configure a computer operating under Windows 7. Although the set of tools for parental control provided in Windows 7 is poorer, the key-principles are the same:

  • Setting a password for a parent account
  • Creating a separate account for a child
  • Activation and configuration of the built-in mechanisms for parental control
  • Installation of third-party software in cases when more advanced child monitoring is needed.

 

It should be noted that the first three principles are actual recommendations given by Microsoft (the Windows OS developer) and can be found in their help system, which we are going to refer to.

More »