Products
Personal Monitor
Record PC users's actions, grab screenshots and passwords
Keylogger
Keystrokes recording software. Keylogger free trial
Hoverwatch
Cell phone and computer spy
Employee Monitor
Access and control the time spent by your workers
Terminal Monitor
Track employee activities on Terminal Server
Free Keylogger
Free keyboard logger keeps track of all typed text

How to track a cell phone location?

4 April 2015

Have you ever questioned ways to track a mobile phone? Perhaps you worry that someone may be tracking your mobile. With the developments and big strides in cellular innovation, we currently know we are being tracked.

Obviously a cellphone business knows precisely where you are at perpetuities. Well, a minimum of what they know is where your cellphone is. Apple, Inc was inspected by the media for tracking and keeping a record of all iPhone users. Many individuals feared they were being followed on their phone due to that privacy breach by Apple.

Tracking a mobile device is achieved via the use of a global positioning system, or much more often referred to as GPS.

Track cell phone location with GPS and Wi-Fi
Track cell phone location with GPS and Wi-Fi

A GPS or GPRS can easily track any mobile. Phone applications have reached the technological point where GPS tracks your every move. Your phone links straight to the satellite and beams back to you your location. If you want to track a cellular gadget, merely set up the software. The software application is suggested to track a mobile phone that has actually been lost or taken. At the very least, most would call it dishonest.

More »

Devices for covert surveillance

3 April 2015

Technology and the human imagination do not stand still. This results in us having, not only modern computers, smart phones, and other consumer devices, but also a huge selection of modern high-tech devices, which are not known to the majority of consumers.

The focus is on hardware devices that are designed to collect (sometimes tacitly), store and transmit information (voice recorders, bugs, hidden cameras), as well as on devices that are designed to protect against such interception (suppressors, detectors).

The aim of the article is not to promote the use of such technology (let’s leave this to special services and detectives), but to inform people about how they can be monitored and how they can protect themselves from spy devices.

More »

Configuring a child’s computer for using Refog with Windows 7

26 March 2015

Part 2. Configuring a computer with Windows 7 installed.

In the first part of this manual we described how to configure a computer running Windows 8.1 OS, so that child’s experience with it was safe (both for a child and a computer).

In this part we are going to configure a computer operating under Windows 7. Although the set of tools for parental control provided in Windows 7 is poorer, the key-principles are the same:

  • Setting a password for a parent account
  • Creating a separate account for a child
  • Activation and configuration of the built-in mechanisms for parental control
  • Installation of third-party software in cases when more advanced child monitoring is needed.

 

It should be noted that the first three principles are actual recommendations given by Microsoft (the Windows OS developer) and can be found in their help system, which we are going to refer to.

More »

Configuring a child’s computer for using Refog with Windows 8.1

20 February 2015

Part 1. Configuring a computer with Windows 8.1 installed.

These days, children start using the computer as early as at four. However, most home computers do not have any means of protection from potential online threats.

Not only do parents ignore specialized programs, but don’t even use integrated (free) OS tools.

Moreover, even the relatively simple user access permissions mechanism of Windows is used extremely rarely, and the only user of most home computers has full admin rights. And this is not just a security vulnerability, but a real chance of inadvertently losing your computer for a long time.

So, let’s start with the built-in capabilities of the Windows 8.1 OS that can make your children’s interaction with the computer comfortable and safe.

More »

Internet and children. Online threats.

29 July 2014

childThe young audience of the Internet is currently estimated at 130 millions children under 14. More than 85% of teenagers over 12 years old use the Internet, and the number is growing. Today, children first go online at the age of 4.

  • According to numerous researches and surveys, over a half (52%) of Internet users under 14 have visited sites that are not intended for children.
  • More than 45% of children have seen (both intentionally and inadvertently) porn online.
  • Slightly fewer children (40%) have encountered pedophilic activities on the web.
  • Around 15% of the questioned children reported that strangers tried to arrange a personal meeting with them.
  • One-third of them agreed to meet or somehow disclosed their personal details.

Besides, the list of things that children regularly face online includes violence, gambling, drugs and alcohol, extremist materials, sects and nationalistic propaganda. Many suffer from online fraud and computer viruses.
Many parents are aware of the potential online threats and do their best to protect their children.

In 63% of cases, this is limited to child control and monitoring; 25% use special software like filters and security add-ons; 12% use built-in parental control tools integrated into the operating system.

How do keyloggers work and how to use them?

25 July 2014

Keylogging. What is it?

The malicious programs that are used to record keystrokes are called keyloggers. Today they are utilized to steal any valuable information. Usually, it secret information that is tracked by the programs.

There are two main varieties of keyloggers. Hardware keylogger that is plugged between a keyboard and your computer and that is potentially detectable just by looking at the keyboard. And there is a software keylogger which is more difficult to detect.

Frankly speaking, keylogger software is more frequently used in comparison with any kind of keylogging hardware.

keyloggers

These malicious programs are usually used either to steal passwords, details of people’s credit cards or to simply monitor computer activity. It is not simple to detect them as they work secretly.

In most of the cases they are hidden from the persons they are targeting. You may not even suspect that your private data is known to other people.

There are a lot of antivirus programs that people use to identify and remove the malicious tools from their machines.

More »

Best Phone Tracker App

9 November 2013

Phone tracking is something that is usually used by the officials for getting some proofs regarding any investigation. It is also possible for you to do the same with any phones that you own and have given to your kids. Most of the parents use this so that they can be sure that their kids are really going on the right track. It is possible for you to make use of Hoverwatch which is the finest kind of the app that is available there tracking the phone.

What Does Hoverwatch Offer You?

Hoverwatch can be regarded as the finest available phone tracker app which so that you can record the incoming as well as outgoing calls from a remote location. This app has to be installed on the phone which you want to track and then you can synchronize that so that all the recorded things that include both messages as well as calls can be stored in the online account. This can even be used by you so that you record the conversations you have related with your business or work. It is possible for you to do recordings from user panel that is there in any device which has got internet connection.

Track all sent and received SMS and MMS

Track all sent and received SMS and MMS

How to Install Hoverwatch

This is the app that can be used for free so that you can get all your solution for recording done without actually spending much money on it. The first thing that you need to do is to singup with the Hoverwatch account online. It is possible for you to get an account with the email address that you own and also ensure that you set a password to this account.

More »

RoboRoach: Controllable cockroaches

8 November 2013

tarakan-300x225In exactly two months a special device called RoboRoach will be on sale in the U.S. that allows people to control cockroaches from their smartphones. The set will cost about $90.

The Blaberus giant cockroach is not included, but is easily found in pet stores and from breeders: this variety is a popular food for exotic animals.

A tiny microcontroller is attached to the back of a live cockroach so that it touches its antennae. The smartphone is connected via BlueTooth. An app that directs the microcontroller lets you set the amplitude and type of impulses sent to the cockroach’s antennae.

RoboRoach, by Backyard Brains, is an educational project for studying the fundamentals of neurobiological experiments.

Earlier this summer a similar project was conducted at the University of North Carolina, although this didn’t focus on education, but rather more practical applications — search operations, for example.

NSA: collection of mobile users’ location data

8 November 2013

Keith Alexander, head of United States National Security Agency, confirmed that in 2010, NSA used experimental equipment to collect information about the location of mobile subscribers.

In 2011, the process was officially suspended, but the agency’s head does not deny the possibility of resuming it in the future: “It may be something that this country might need in the future.“

On the eve of this announcement, senator Ron Wyden inquired about such practices, but Keith replied that their agency has never collected such information and had no plans to do that.

The news caused outrage with the senator — he said that the government kept concealing facts about monitoring all aspects of the citizens’ rights.

Global gas station fraud stopped in Russia

8 October 2013

azsIt would sound like pure madness just a few years ago, but appears to be a reality nowadays. A group of Russian criminals successfully hacked a network of fully automated gas stations with a purpose of unlawful enrichment.

Special modules were found at dozens of gas stations owned by major oil companies that stole a few liters of gas from each client and sent them to a separate tank. This high-tech “bugs” were controlled remotely via devices disguised as regular calculators.

Gas station owners were not involved in this fraud and the police suspect former employees who had access to and knowledge of all hardware and software systems of these stations.

The revenue generated from this scheme is estimated in millions of rubles and was shared between all members of the group. The police believe that similar devices may still be installed at gas stations across the country and is currently conducting a thorough inspection with the help of security services of the oil companies.