Products
Personal Monitor
Record PC users's actions, grab screenshots and passwords
Keylogger
Keystrokes recording software. Keylogger free trial
Hoverwatch
Cell phone and computer spy
Employee Monitor
Access and control the time spent by your workers
Terminal Monitor
Track employee activities on Terminal Server
Free Keylogger
Free keyboard logger keeps track of all typed text

Track cell phone location with GPS and Wi-Fi

22 December 2015
Track cell phone location with GPS and Wi-Fi

Track cell phone location (GPS, Wi-Fi)

Hoverwatch is our new app that can be enabled for cell phone location tracking using GPS and Wi-Fi. This software collects information about a phone’s location data and transmitts the necessary data to where its use may be of significance.

Wi-Fi hotspot signals as well as GPS systems which are close to the target device can be used to collect information regarding the phone location, but GPS signals are usually considered the most accurate. The advantage of using signals received from Wi-Fi hotspots is that less battery power is used and the method is also highly reliable in instances when the user of the targeted device switches the GPS feature off.

Apart from the pinpoint tracking accuracy Hoverwatch offers many other advantages. As many as 5 devices can be tracked at one account and signing up for this service is simple.

Users create a free account online by entering their email and a password of their choice. After having done this, the next process will involve downloading and installing the phone tracker installer that is available from the Hoverwatch account.

From the online account all the recorded data as well as phone geolocation can all be monitored with ease.

More »

Refog Terminal Monitor Release

1 September 2010

Refog Terminal MonitorWe’re finishing up development of a new edition of Refog Employee Monitor designed specifically for terminal servers — Refog Terminal Monitor. Development had started in March 2010 and now we’re finally ready to unveil Terminal Monitor 6.2.0.1100.

Core features include:

  • full support of Windows and Citrix terminal servers;
  • storing all logs in a single encrypted storage;
  • strong 256-bit AES and SHA (HMAC) algorithms are used to protect your data;
  • ability to set log storage location;
  • access restrictions for particular user groups (e.g. allow log access only for network security administrators);
  • new log kinds and report formats including PDF, HTML and JPEG.

We’ve included all the features we had aimed for back in March. The software has passed thorough testing and is already available for purchase.