Products
Personal Monitor
Record PC users's actions, grab screenshots and passwords
Keylogger
Keystrokes recording software. Keylogger free trial
Hoverwatch
Cell phone and computer spy
Employee Monitor
Access and control the time spent by your workers
Terminal Monitor
Track employee activities on Terminal Server
Free Keylogger
Free keyboard logger keeps track of all typed text

Configuring a child’s computer for using Refog with Windows 8.1

20 February 2015

Part 1. Configuring a computer with Windows 8.1 installed.

These days, children start using the computer as early as at four. However, most home computers do not have any means of protection from potential online threats.

Not only do parents ignore specialized programs, but don’t even use integrated (free) OS tools.

Moreover, even the relatively simple user access permissions mechanism of Windows is used extremely rarely, and the only user of most home computers has full admin rights. And this is not just a security vulnerability, but a real chance of inadvertently losing your computer for a long time.

So, let’s start with the built-in capabilities of the Windows 8.1 OS that can make your children’s interaction with the computer comfortable and safe.

More »

TOP 5 spyware scandals

3 December 2014

1. A built-in keylogger in Windows 10.

1-windowsMicrosoft has confirmed that Windows 10 Developer Preview contains an integrated keylogger that captures everything that users type on their keyboards and sends these logs to the corporation.

Moreover, even voice commands and dictation results are logged in the same way.

The company explained that the collection of this information helps improve the operating system’s word autocompletion feature and the build-in spellchecker.

Particular concerns among some users were raised by the fact that the license agreement (terms and conditions of the Insider Program) states that the user agrees with the disclosure of keyboard logs both to Microsoft and undefined third parties.

2. Keyloggers found in new Samsung laptops.

2-samsungResearchers have found a software keylogger installed on Samsung laptops purchased online.

The program discreetly collected information about key presses, made screenshots and sent them to an unidentified recipient.

An anonymous consultant explained that the purpose of installing this spyware was the collection of data for improving future device control features.

Although Samsung has initiated a lengthy internal investigation, it has not officially admitted its role in this scandal and voiced an assumption that the programs had been installed by store employees.

3. A scandal around the Carrier IQ app installed on 140 million phones.

3-phoneAn app called Carrier IQ was found on a huge number of devices from all major manufacturers, from Apple and Google to Nokia and HTC.

Its official purpose was the collection of phone parameters and general usage details. However, the researchers have found out that the program is also capable of accessing multiple types of users’ data, such as the lists of visited websites and sent text messages.

Apple completely removed the application only in the latest version of iOS. Other manufacturers explained the presence of the program on their devices by a mistake made by wireless service providers during phone localization.

4. Spying computers available for purchase by installments.

Several chains of stores were offering an installment plan for computers with a program called “PC Rental Agent” included in the standard software bundle.

The program was initially intended for monitoring computers sold by installments – that is, computers that still belonged to the stores.
4-shop
However, store employees did not inform customers about the purpose of these programs. They could be used for remotely installing any other software on customers’ systems.

Such software could include tools capable of making screenshots, activating the webcam, recording key presses or locating the system using the nearest Wi-Fi networks.

The investigation revealed multiple cases of abusive behavior by store employees. Some of them were spying on customers for fun, and some of them continued to do so even after the last installment was paid.

The store owners were forced to pay ample compensations to affected customers.

5. Skype – an illusion of privacy.

5-skypeSkype, a popular communications program for text, audio and video chats, has been in the center of spy scandals surprisingly often.

Even before the company was acquired by Microsoft, it was rumored to be a part of “Project Chess”, a secret initiative aimed at making users’ data available to secret agencies.

After Edward Snowden’s revelatory publications, Skype appeared on the list of companies cooperating with PRISM, a monitoring system created by the U.S. National Security Agency.

This information, however, remained a mystery. Which is probably the way it’s supposed to be in spy stories.

 

New online service from Refog. Track any device online. Just install the spy phone. And Information from your phones and computers will reflect in your online Hoverwatch account.

Internet and children: parental monitoring software

13 November 2014

We are used to being calm and relaxed when our children are at home. We rightfully assume that they are safe here, away from the dangers of city streets, away from maniacs and crooks… They are in their room, browsing the web, learning new things… educating themselves.
However, this is exactly the type of situation when your child can be in danger. And it’s not about their slouching or bad eyesight. Things can get much worse.

What do we know about the Internet?
And what do we not know about the ways of protecting our children.

Statistics:

Every fourth child has seen porn on the web.
An innocent search query like “red pussy” can bring up results that have nothing to do with pets.

Every third has been psychologically humiliated online, and only 10% of them have told their parents about it.
Social networks are formed by a group of people, and its virtual nature does not make it completely harmless. Teenage media moved from school corridors to the vast spans of social networks long ago, so abusive messages and mocking can result in serious psychological problems and even catastrophic tragedies.

Eight out of ten children are ready to provide private information in exchange for products, services or access to information.
Fraudsters’ sites have learned to work with children. In exchange for products or services, they can fill out questionnaires with very personal questions, up to their parents’ credit card details.

child-security

HOW CAN WE protect our children?

More »

China says no to Kaspersky and Symantec anti-virus software

13 August 2014

ChinaThe Chinese government has removed Kaspersky and Symantec programs from its list of trusted anti-virus software. Both anti-virus companies were also removed from the vendor lists of the state procurement agency.

Local media believe that this is related to attempts by the government to restrict use of foreign technologies by citizens.

The current list of trusted anti-virus developers includes five Chinese companies: Qihoo 360 Technology Co, Venustech, CAJinchen, Beijing Jiangmin and Rising.

A Kaspersky Lab press representative said that the company is currently in talks with Chinese authorities, but claimed that it would be “too premature to go into any additional details at this time”.

Disgruntled Ex-Employees: By the Numbers

13 August 2014

A report from ESET and FutureToday contains eye-opening data for corporate managers.

In a survey of over 500 people working at over 50 companies, it was found that approximately 38% of those surveyed had, at least once, illegally copied, destroyed, or disclosed confidential data concerning a former employer.

  • 17% had intentionally deleted documents, messages or applications important for the employer prior to termination.
  • 13% had taken working materials (client databases, plans, reports, etc.) with them to sell to competitors or for other use.
  • 4% had used their knowledge of loopholes to gain access to internal systems and resources when no longer working at a company.
  • 4% had deliberately gained revenge by posting internal documents publicly.

The most interesting coincidence found by the study concerns the number 38%, which is encountered twice. 38% of respondents had caused harm to their former employers in one way or another. And the same percentage of companies, based on research, do not pay enough attention to IT security.

Internet and children. Online threats.

29 July 2014

childThe young audience of the Internet is currently estimated at 130 millions children under 14. More than 85% of teenagers over 12 years old use the Internet, and the number is growing. Today, children first go online at the age of 4.

  • According to numerous researches and surveys, over a half (52%) of Internet users under 14 have visited sites that are not intended for children.
  • More than 45% of children have seen (both intentionally and inadvertently) porn online.
  • Slightly fewer children (40%) have encountered pedophilic activities on the web.
  • Around 15% of the questioned children reported that strangers tried to arrange a personal meeting with them.
  • One-third of them agreed to meet or somehow disclosed their personal details.

Besides, the list of things that children regularly face online includes violence, gambling, drugs and alcohol, extremist materials, sects and nationalistic propaganda. Many suffer from online fraud and computer viruses.
Many parents are aware of the potential online threats and do their best to protect their children.

In 63% of cases, this is limited to child control and monitoring; 25% use special software like filters and security add-ons; 12% use built-in parental control tools integrated into the operating system.

How do keyloggers work and how to use them?

25 July 2014

Keylogging. What is it?

The malicious programs that are used to record keystrokes are called keyloggers. Today they are utilized to steal any valuable information. Usually, it secret information that is tracked by the programs.

There are two main varieties of keyloggers. Hardware keylogger that is plugged between a keyboard and your computer and that is potentially detectable just by looking at the keyboard. And there is a software keylogger which is more difficult to detect.

Frankly speaking, keylogger software is more frequently used in comparison with any kind of keylogging hardware.

keyloggers

These malicious programs are usually used either to steal passwords, details of people’s credit cards or to simply monitor computer activity. It is not simple to detect them as they work secretly.

In most of the cases they are hidden from the persons they are targeting. You may not even suspect that your private data is known to other people.

There are a lot of antivirus programs that people use to identify and remove the malicious tools from their machines.

More »

Updating Refog programs to version 8

7 February 2014

We are glad to announce that we have finished working on version 8 of Refog Personal Monitor and Refog Employee Monitor.

Personal Monitor Personal Monitor

The new versions of the programs can be downloaded from corresponding pages.

The following new features were added:

  • Periodical capturing of images from an integrated or external webcam connected to the computer.
  • Recording of all Skype calls.
  • Full support of Windows 8 and Windows 8.1.
  • In Employee Monitor, we added a possibility to install agents on the network using MSI packages.

Below is detailed information on new features, configuration and licensing.  More »

Best Phone Tracker App

9 November 2013

Phone tracking is something that is usually used by the officials for getting some proofs regarding any investigation. It is also possible for you to do the same with any phones that you own and have given to your kids. Most of the parents use this so that they can be sure that their kids are really going on the right track. It is possible for you to make use of Hoverwatch which is the finest kind of the app that is available there tracking the phone.

What Does Hoverwatch Offer You?

Hoverwatch can be regarded as the finest available phone tracker app which so that you can record the incoming as well as outgoing calls from a remote location. This app has to be installed on the phone which you want to track and then you can synchronize that so that all the recorded things that include both messages as well as calls can be stored in the online account. This can even be used by you so that you record the conversations you have related with your business or work. It is possible for you to do recordings from user panel that is there in any device which has got internet connection.

Track all sent and received SMS and MMS

Track all sent and received SMS and MMS

How to Install Hoverwatch

This is the app that can be used for free so that you can get all your solution for recording done without actually spending much money on it. The first thing that you need to do is to singup with the Hoverwatch account online. It is possible for you to get an account with the email address that you own and also ensure that you set a password to this account.

More »

RoboRoach: Controllable cockroaches

8 November 2013

tarakan-300x225In exactly two months a special device called RoboRoach will be on sale in the U.S. that allows people to control cockroaches from their smartphones. The set will cost about $90.

The Blaberus giant cockroach is not included, but is easily found in pet stores and from breeders: this variety is a popular food for exotic animals.

A tiny microcontroller is attached to the back of a live cockroach so that it touches its antennae. The smartphone is connected via BlueTooth. An app that directs the microcontroller lets you set the amplitude and type of impulses sent to the cockroach’s antennae.

RoboRoach, by Backyard Brains, is an educational project for studying the fundamentals of neurobiological experiments.

Earlier this summer a similar project was conducted at the University of North Carolina, although this didn’t focus on education, but rather more practical applications — search operations, for example.