Products

Record PC users's actions, grab screenshots and passwords
Keystrokes recording software. Keylogger free trial
Access and control the time spent by your workers
Track employee activities on Terminal Server
Unique spy for mobile phones
Control the time your child spends on games and the Internet
Monitor keypresses without any software installation

Testimonials

After using your software for a while I would like to let you know it is the best monitoring software I have used to date. The only thing I didn't like about the version I was using was it didn't pick up on Facebook chat logs. I decided to start using monitoring software as something fishey was going on with my partner and she was caught out using the brilliant software you provided. I would like to get Fre Lifetime Upgrades as I have just moved up to Windows 7 from XP and my current version is playing up. ...

I have used REFOG for a year, i have founded the most friendly spy software i have used. it gave me peace of mine knowing what my kids doing on the net. it gives a real detail of sites visited and every key strokes as well as detailed conversation,it is a real peace of mine tool i highly recommended. specially to concerned parents ...

REFOG Spy Software and Invisible Computer Monitoring

What is Refog Personal Monitor ?

Refog Spy Software is a complex solution for local and remote computer Monitoring of user activities.

You can use it to watch over your children chatting on the net, and control the activities of employees from any part of the world. Its wide functionality is equally fit for professional and private use. Even with scores of office desktops, it's easy to know what people do during their work hours.

What can Refog Spy Software do?

Refog Spy Software integrates several tools to ensure thorough Monitoring of computer systems.

It keeps track of every word or keystroke command entered by a user. It also Monitors the Clipboard and records all pasted items. The program logs active applications and window captions. Every entry in the log has a time stamp so that you can trace user activity minute by minute.

Refog Spy Software is your trusted sentinel in any computer system.

As well as local activities, Refog Spy Software also records the use of the global network. The list of visited sites and pages, supported with key logs, time stamps and screenshots, tells you in full what was being done on the web. Should any wrongdoing occur, screenshots will supply undeniable evidence which can reinforce your argument.

However, the most distinguishing feature of Refog Spy Software is the alarm system that triggers on keywords.

You can program it to notify you by e-mail every time the keyword was used. For example, words like 'sex', 'porn' or 'booze' can tell you that your child is up to mischief. Another possible use of the system is to exclude rude language from work communications.

Spy Software

How does Refog Spy Software work?

The program operates in a visible and a stealth mode. When it works stealthily, neither the process list nor the list of installed applications will show Refog Spy Software. The program starts at system boot and logs user activities into files. After sending a scheduled report, it clears its logs, ready to continue its assignment. Refog Spy Software can operate perfectly all on its own. It does the job of security staff but is free from human faults.

Refog Spy Software offers a wide range of settings to meet your surveillance needs. You can use it to record only certain applications, such as web browsers or MS Office. In a system with several users, it can record only selected users. Screenshots can be taken at custom intervals or on every mouse click. You can easily customize all the Monitoring tools to provide only relevant data.

Reports on user activities are delivered through e-mail or FTP connection. Even miles away from Monitored systems, you can still receive regular updates and emergency notifications. At a time when online subscriptions to music or news is part of everyday life, why not subscribe to surveillance reports too?