Products

Personal Monitor
Record PC users's actions, grab screenshots and passwords
Keylogger
Keystrokes recording software. Keylogger free trial
Hoverwatch
Cell phone and computer spy
Employee Monitor
Access and control the time spent by your workers
Terminal Monitor
Track employee activities on Terminal Server
Free Keylogger
Free keyboard logger keeps track of all typed text
Time Sheriff
Free parental control software

Compare products

REFOG Spy Software and Invisible Computer Monitoring

What is Refog Personal Monitor?

Refog Spy Software is a complex solution for local and remote computer Monitoring of user activities.

You can use it to watch over your children chatting on the net, and control the activities of employees from any part of the world. Its wide functionality is equally fit for professional and private use. Even with scores of office desktops, it's easy to know what people do during their work hours.

What can Refog Spy Software do?

Refog Spy Software integrates several tools to ensure thorough Monitoring of computer systems.

It keeps track of every word or keystroke command entered by a user. It also Monitors the Clipboard and records all pasted items.

The program logs active applications and window captions. Every entry in the log has a time stamp so that you can trace user activity minute by minute.

Refog Spy Software is your trusted sentinel in any computer system.

As well as local activities, Refog Spy Software also records the use of the global network. The list of visited sites and pages, supported with key logs, time stamps and screenshots, tells you in full what was being done on the web. Should any wrongdoing occur, screenshots will supply undeniable evidence which can reinforce your argument.

However, the most distinguishing feature of Refog Spy Software is the alarm system that triggers on keywords.

You can program it to notify you by e-mail every time the keyword was used. For example, words like 'sex', 'porn' or 'booze' can tell you that your child is up to mischief. Another possible use of the system is to exclude rude language from work communications.

Spy Software

How does Refog Spy Software work?

The program operates in a visible and a stealth mode. When it works stealthily, neither the process list nor the list of installed applications will show Refog Spy Software. The program starts at system boot and logs user activities into files. After sending a scheduled report, it clears its logs, ready to continue its assignment. Refog Spy Software can operate perfectly all on its own. It does the job of security staff but is free from human faults.

Refog Spy Software offers a wide range of settings to meet your surveillance needs. You can use it to record only certain applications, such as web browsers or MS Office. In a system with several users, it can record only selected users. Screenshots can be taken at custom intervals or on every mouse click. You can easily customize all the Monitoring tools to provide only relevant data.

Reports on user activities are delivered through e-mail or FTP connection. Even miles away from Monitored systems, you can still receive regular updates and emergency notifications. At a time when online subscriptions to music or news is part of everyday life, why not subscribe to surveillance reports too?