Spyware rating. Best Computer Monitoring Program Improving the Efficiency of Office Employees

In our library of detection and neutralization examples spyware Quite a lot of articles have already accumulated, and we decided to classify this material.
The classification is based on the subjective assessment of technical specialists from our test laboratory. Since we plan to continue testing popular spyware, we believe that this classification will help users of the COVERT disguiser and visitors to our website better understand the place of each spyware in the mosaic of modern threats.

We give each spy three ratings:
The first is design and functionality.. The higher the score, the more opportunities the program provides for data theft and user tracking.
The second is secrecy within the system. How difficult can it be to detect on a computer? The higher the score, the better the program hides itself.
Third - evaluates the spy’s protection from anti-spyware and the difficulty of neutralizing it. The higher the score, the more diligently the program clings to its existence on the computer and the more steps need to be taken to achieve it. complete removal. Some programs cannot be removed by simply erasing the file folder from the disk.

— RLM: 5 / 5 / 4

VkurSe spy for secretly monitoring all user actions on the computer and sending the collected data to a special server. Allows covert surveillance at the computer online, creates screenshots, intercepts keyboard input, clipboard, and much more.

— RLM: 1 / 1 / 0

Windows Spy Keylogger is a fairly classic example of a keylogger - it takes all input from the keyboard and saves it in log files. It has an invisible mode, consumes virtually no operating system resources, is easy to install and can be installed on a computer without administrator rights.

— RLM: 3 / 6 / 1

Spytector works secretly on your computer, saving passwords entered in browsers and instant messengers Internet Explorer, Google Chrome, Opera, FireFox, Safari, Outlook, GoogleTalk, Windows Live Messenger and other applications. The keylogger can intercept entire chats in popular instant messengers - MSN Messenger, Yahoo Messenger, ICQ, AIM. Spytector Keylogger encrypts the intercepted information and sends it via email or FTP server.

— RLM: 8 / 3 / 2

JETLOGGER allows you to monitor user activity on the computer, collects information about running programs, visited sites and used key combinations, structures the received data and displays them in the form of charts and graphs. You can enable automatic creation of screenshots at certain intervals. Hides the fact that information about activity on the device is collected.

— RLM: 4 / 0 / 1

Yaware.TimeTracker is a system for recording working hours and assessing the efficiency of employees at the computer.

— RLM: 5 / 2 / 3

Award Keylogger is a fairly popular spyware program that is described on many sites as a powerful real-time tracking tool with rich functionality. But we were not able to see all the listed functionality, although we tested the latest fully functional version. The program turned out to be not much better than the average spy.

— RLM: 5 / 0 / 0

Real Spy Monitor is designed to monitor activity on a computer and allows you to save information about launched programs, opened files and windows, take screenshots, monitor which sites users visit, intercept and save keyboard input.

— RLM: 5 / 1 / 1

LightLogger has a fairly standard set of functions: it tracks visited websites, takes screenshots at a given frequency, intercepts keyboard input in applications, browsers and email, remembers all running programs, and copies the contents of the system buffer.

— RLM: 7 / 1 / 0

REFOG Personal Monitor will provide full control over the system, records any keystrokes in a log. In addition, he periodically takes screenshots so that the observer has a complete picture of what is happening on the computer. All reports are sent to the specified email. The spy's work is invisible on the computer: it does not reveal itself in any way and consumes very few system resources.

— RLM: 5 / 3 / 3

TheRat can be installed on your computer using social engineering. In addition to traditional keylogger functions, the program can monitor actions in application windows and respond to words, as well as take screenshots of the screen every time you press the Enter key. A special feature of the keylogger is that it works on the principle of incorporeal viruses.

— RLM: 6 / 2 / 1

Snitch collects data about user activity and transmits it to its server, from which it is sent to the control module and displayed in its interface.

— RLM: 2 / 0 / 0

Hide Trace is a typical screenshotter that monitors user actions, creating a detailed report. open windows by taking screenshots.

— RLM: 6 / 8 / 6

WebWatcher records all activity occurring on the PC: emails, instant messenger messages, information about visited sites, activity on Facebook/MySpace networks and everything that the user types in real time. Takes screenshots and tracks all search queries. All collected information is sent to special servers, where the observer can view the results of surveillance remotely.

— RLM: 6 / 0 / 2

DameWare Mini Remote Control Server allows you to connect and control remote machines via the Internet or local network. Can secretly, unnoticed by the observed, control all his actions.

RLM: 7 / 2 / 2

Kickidler - The program has good functionality, but is easy to detect and remove. There is a function for blocking entry into the COVERT secure platform, which can easily be bypassed using a masker.

— RLM: 3 / 1 / 0

Total Spy - the interface is extremely simple, the program is small in size and does not affect system performance. But the functionality in the program is only basic.

— RLM: 7 / 8 / 5

PC Pandora— hides in the system and controls the entire computer and Internet traffic. Captures screenshots, captures keyboard input, activity on websites visited, email, instant messages messengers and a lot of other information collects about the user’s work. The program does not have a folder in which it stores its data. Everything is loaded into operating system, and each new installation to the same or another computer will be made with new file names.

— RLM: 5 / 7 / 4

Micro Keylogger is a well-hidden spyware program that is not visible in the Start menu, taskbar, control-programs panel, process list, Msconfig startup list, and other places on the computer where it is possible to monitor running applications. It shows no signs of presence and does not affect system performance; it secretly sends a report to email or an FTP server. Its activity is carried out through DLLs.

— RLM: 4 / 0 / 0

Expert Home- a multifunctional program for covert surveillance and detailed recording of all actions performed on a computer with a remote tracking function, which allows you to view reports and screenshots anywhere, from any device, as long as you have Internet access.

— RLM: 7/ 0 / 0

Monitors a remote computer in real time, takes pictures of the user from the computer’s webcam, records sounds in the room where the computer is installed, views file system, remotely downloads files, views and deletes system processes, and other functions standard for spyware.

— RLM: 5 / 1 / 1

System Surveillance Pro provides everything you need to monitor your PC in stealth mode. The utility records text input, instant messages, applications used and sites visited, and also takes screenshots at a specified time interval or by event.

RLM: 3 / 0 / 0

KidLogger PRO, this is a keylogger with open source code, which can record sound from a microphone and take screenshots. Delivery of logs/screenshots is possible by email or to the manufacturer’s website, where they can already be viewed. It can also simply store logs with screenshots locally.

— RLM: 7 / 0 / 0

Remote Manipulator System - remote monitoring and control, allows you to connect to a remote computer and control it as if you were sitting directly in front of its screen.

— RLM: 6 / 2 / 1

NeoSpy spy is a computer tracking program that allows you to conduct hidden monitoring of the system. Tracks all actions performed by users on the monitor screen via the Internet from a computer, smartphone and tablet.

— RLM: 6/5/3

SoftActivity Keylogger tracks and records all user actions on the computer.
It works secretly and unnoticed even by savvy users; not a single process in the task manager, no files can be seen in the system.
The configuration utility and uninstallation option are password protected.

— RLM: 4 / 1 / 0

Snooper is an audio spy designed to record sounds that are picked up by a microphone connected to the computer; in recording mode it is not displayed in the tray, and is not visible in the list of processes in the manager Windows tasks. As long as the microphone does not detect sounds, the spy remains in sleep mode.

— RLM 5/0/0

The Best KeyLogger is a program that allows you to always have full control over your computer.
The program allows you to read the entire history of actions on your computer in your absence.
With this program, you can view chat logs, as well as mail, and see which sites the user has visited.

— RLM: 5 / 1 / 1

SpyAgent is a program for complete control over user actions. Monitors system performance, including recording keystrokes, programs launched, files opened, and much more. Allows you to record all online activity - FTP, HTTP, POP3, Chat and other TCP/UDP communications, including visited websites. Takes screenshots, sends the collected data to the specified e-mail, it is possible remote control program.

— RLM: 6 / 2 / 0

Ardamax Keylogger - takes screenshots, intercepts clipboards and keystrokes on the keyboard. Spy has a hidden mode and is not visible in the task manager. The program creates a log of all actions for subsequent analysis.

— RLM: 8 / 1 / 0

Spyrix Personal Monitor allows you to conduct hidden control over any activity on your computer - on social networks (VKontakte, Odnoklassniki, Facebook, etc.), chats and emails, visiting websites and requests in search engines(Yandex, Google). Spyrix Personal Monitor is designed for centralized monitoring of all user activities.

— RLM: 2 / 6 / 6

All In One Keylogger logs all keystrokes, including language specific characters, conversations and conversation messages, passwords, email, clipboard information, microphone sounds, screenshots, Internet activities. The spyware does not appear in running processes.

— RLM: 8 / 6 / 7

Mipko Personal Monitor - monitors activity on your computer, monitors which sites are visited on the Internet, saves HDD all user actions - keys pressed, sites visited, application launches, screenshots. Not visible when working in hidden mode standard means system and does not appear in the list of processes. It works absolutely unnoticed, like an invisible person, works well with antiviruses and remains undetected in 95% of cases.

— RLM: 3 / 1 / 0

Free Keylogger Remote is capable of intercepting keystrokes and copied text from any application. It can also record names running applications, visited websites, take screenshots after a specified period of time. The spy operates in invisible mode and cannot be accessed. There is a function for remote monitoring and sending daily reports by email.

— RLM: 7 / 1 / 0

SpyGo is a software package for covert monitoring and tracking of user activity on a computer. It is controlled remotely and allows for real-time monitoring. It works in stealth mode and remains invisible during monitoring.

— RLM: 3 / 1 / 0

The hidden agent Actual Spy is capable of monitoring all events occurring in the system: intercepting all keystrokes, detecting case and Russian layout, taking screenshots (screenshots), remembering the launch and closing of programs, monitoring the contents of the clipboard, recording Internet connections, register visited sites and much more.

— RLM: 5 / 1 / 1

Elite Keylogger is designed to secretly monitor all types of user activity. The keylogger's capabilities include tracking all types of correspondence from ICQ to e-mail, websites visited by users, passwords typed and programs used. The spy generates snapshots of the user's desktop screen. Can send a report on user activities to email after a certain fixed period of time.

— RLM: 6 / 0 / 2

Using the Power Spy utility, you can take screenshots from the screen at certain intervals, record keyboard strokes, and Internet pages visited. You can also view email messages that you read while Microsoft help Outlook and Microsoft Outlook Express and documents opened in Word and Notepad. The program, based on the specified parameters, sends a report by E-mail or writes it to a hidden log file.

— RLM: 6 / 5 / 5

The STAKH@NOVETS software package is designed to monitor computer network enterprises. She gives full information about each employee. Surveillance of company personnel can be carried out in a completely hidden mode.

— RLM: 6 / 0 / 3

StaffCop monitors running programs, applications and websites on work PCs. Intercepts messages in ICQ, Skype, e-mail and other instant messengers. Takes screenshots of the monitor screen, records keystrokes and much more that is part of the concept of “computer control”.

(KGB) - RLM: 7 / 1 / 0

KGB SPY is one of the most popular programs designed to spy on users personal computers. It intercepts and stores a detailed log of user actions on the hard drive, takes screenshots, records software launches, etc.

— RLM: 1 / 1 / 0

Punto Switcher, designed to change keyboard layouts in automatic mode on the computer. At the same time, it can be used as a keylogger if you make certain settings changes.

Many PC users running one of Windows often need programs that monitor your computer.

Such people most often are bosses at various levels, who subordinate from several people to several dozen and even hundreds of employees working mainly in offices and stores, jealous husbands or wives (girls or boys), and parents of children.

IN modern world It is quite difficult to monitor what a person is doing on the Internet on a smartphone, but it is much easier to monitor a user’s actions on a PC that is accessed by several people.

Let's look at seven applications that will help collect data about the user's activity on a computer running .

We do not compile a top list, do not evaluate applications and choose the best, but only invite you to familiarize yourself with the current spies, which are regularly updated and supported.

For your information! Spying on someone’s actions on a computer is an interference in a person’s personal life, so you shouldn’t do it unless absolutely necessary, and if you decide to take such a step, be sure to notify everyone you follow about it.

LightLogger

The application is developed by one person and is updated regularly. Great for home use.

By home we mean monitoring the activity of family members or acquaintances who may come to visit, so that something can be done from your computer do it on the Internet.

LightLogger's capabilities include all the classic spy features. It allows you to monitor keystrokes on the keyboard and display data for each program, which will show what messages a person entered in which application, and display all his passwords and logins.

Web monitoring records the history of visiting sites with the time spent on the page.

Invisible

An important advantage of an elite spy is absolute secrecy. Not only does it not create shortcuts and not appear in the taskbar and tray, but it also hides its process from the Task Manager and does not even place the shortcut in the list of frequently launched ones.

Due to the daily update of the program core, it is invisible to all antiviruses and anti-keyloggers.

Keystroke recording

Keylogger monitors every keystroke on your keyboard and every click on your mouse.

With these functions, while remaining in the shadows, the utility will intercept all typed messages, texts of letters, electronic documents, collect all search queries and data for authorization in the accounts of various Internet pages.

The program code is based on the use of Low-level driver assembler, which starts before the Windows graphical shell, which makes it possible to find out the password for the account.

Getting browser history

No popular Internet browser will hide the navigation history from view. It’s easy to track the Internet activity of children and employees with a time stamp (when they visited the site, how much time they spent).

Recording chats

As for instant messengers, Elite Keylogger records messages from each program (ICQ clients, ) and mail agents in order to provide you with information about who is being corresponded with and through what on your computer.

Remote monitoring

After collecting data, reports can be sent to a specified email or FTP server, making it possible to get acquainted with the actions of subordinates, wife or child, while being far from the computer where the keylogger works. So, relatives will be more careful, and employees will spend less time playing or playing games.

Ways to receive reports

The received information can be stored on the computer’s hard drive, sent by email or FTP, sent via and even secretly copied to a connected or. The size of logs is not limited.

Other options

The developers did not refuse screenshots, recording all running applications with the time of their activity and work in background. Elite Keylogger's clipboard is also monitored.

Among those considered and similar programs it's hard to choose a clear leader. The functionality of most tracking utilities is similar; only a few developers try to bribe the client with the presence unique features, increased program secrecy, design and work with reports.

How to monitor employees, monitor children or monitor a person at a computer?

It's hard to imagine everyday life modern man without using a computer or mobile devices, connected to the global network and used daily to receive and process information for personal and business purposes. Computers have become a part of the lives of not only adults, but also teenagers and children who spend several hours on the Internet every day.

Modern schoolchildren from the first grades learn to use computer technologies and actively use them for educational and entertainment purposes. Unfortunately, the Internet is flooded not only with workshops on solving problems in physics or mathematics, which do not pose a threat to the fragile child’s psyche. Global network contains countless unsafe websites, including extremist, sectarian and adult sites, which can cause serious harm to the normal development of a child as a person and lead to problems in the future. Agree, you would not want your child to study occult rituals or view pages of dubious content instead of doing homework after school.

Due to the above, many parents may have a very reasonable question: “How to protect a child from the harmful influence of the Internet?”, “How to find out what a child does in his free time at the computer?”, “Who does your beloved child communicate with?”, “ How to organize supervision of children?».

There are a lot of programs for monitoring computer activity and spyware, but, as a rule, they are all paid, reduce the performance of the computer and are easily detected even by inexperienced users. In reality, you will only be able to view the contents of log files with data entered on the keyboard and, in some cases, screenshots. In addition, you can view these log files only on the computer where these files were created. Those. if you are in a remote location, you will not be able to view these files. Of course you can customize automatic sending these logs to mail or a server, but this is associated with additional difficulties and waste of time. Besides, it's just inconvenient.

For full control over children, it can be very convenient to use programs remote access to a computer via the Internet. Some of these programs are very easy to set up, or to be more precise, they practically do not require it and are able to instantly establish a connection with any computer connected to the Internet.

One such program is Ammyy Admin. And despite the fact that the main application area of ​​the program is the provision of remote technical support, the features and versatility of Ammyy Admin make it easy to use it as a means of remote monitoring of children. When it comes to business, monitoring and control of employees is also one of the areas of application of the program.

Why should you use Ammyy Admin for remote control of children?

  1. You can connect to any PC in a few seconds.
  2. You can view the image of the remote computer from any other computer connected to the Internet. No tedious settings, registrations or installations!
  3. Ammyy Admin bypasses all known firewalls and antiviruses (which cannot be said about programs keyloggers) and does not require installation. At correct settings It will be practically impossible to detect Ammyy Admin.
  4. Your child will never realize that someone is watching him in real time.
  5. You can interactively enable voice chat and listen to what is happening on the remote PC side.
  6. Ammyy Admin is completely free for home use, provided that you have not exceeded your usage limit free version.

How to set up child monitoring using Ammyy Admin?

So, the procedure for setting up the program is extremely simple and will not take more than a minute.

What to do on the remote computer that we will monitor:

What to do on the computer from which we are monitoring:


If you want to organize employee control by monitoring their work computers, then the laws of some countries require you to warn them about this. In any case, it will be useful to do this, because... Knowing that the computer is under surveillance, the employee will not engage in extraneous activities on the work computer, which will reduce the risk of infecting the computer with viruses and leaking confidential information, and will also increase useful working time.

Hello.

Today’s article is dedicated more to managers (although if you want to know who is working on your computer in your absence, the article will also be useful).

The issue of monitoring the work of other people is quite complex and, at times, very controversial. I think those who have at least once tried to manage at least 3-5 people will understand me now. and coordinate their work (especially if there is really a lot of work) .

But those whose employees work at a computer are a little luckier :). Now there are very interesting solutions: special. programs that easily and quickly track everything a person does during working hours. And the manager will only have to look at the reports. Convenient, I tell you!

In this article I want to tell you FROM and TO how to organize such control. So, …

1. Selecting software for organizing control

In my opinion, one of the best programs of its kind (for monitoring employee PCs) - this is CleverControl. Judge for yourself: firstly, it takes 1-2 minutes to launch it on an employee’s PC (and no IT knowledge, i.e. you don’t need to ask anyone to help you) ; secondly, 3 PCs can be controlled even in the free version (so to speak, evaluate all the possibilities...) .

C leverControl

Website: http://clevercontrol.ru/

Simple and convenient program in order to view who is doing what on the PC. You can install it both on your computer and on the computer of your employees. The report will contain the following data: which websites were visited; start and end times of work; the ability to watch your PC desktop in real time; viewing applications that the user launched, etc. (you can see screenshots and examples below in the article) .

In addition to its main direction (controlling subordinates), it can be used for some other purposes: for example, to see what you are doing, to evaluate the effectiveness of the time spent on the PC, what sites you opened, etc. In general, increase your efficiency of time spent at the computer.

What is also captivating about the program is its focus on the untrained user. Those. even if you just sat down at your computer yesterday, it will be easy for you to install and configure its operation (below, I will show in detail how this is done).

Important point: to be able to control, computers must be connected to the Internet (and preferably high-speed).

By the way, all data and work statistics are stored on the program server, and you can find out at any time, from any computer: who is doing what. In general, it’s convenient!

2. Getting started (registration account and downloading the program)

Let's get down to business :)

First, go to the official website of the program (I gave the link to the site above) and click the button Connect and download for free"(screenshot below).

Start using CleverControl (clickable)

Next you will need to enter your email and password (remember them, they will be needed to install applications on computers and view the results) , after which you should open Personal Area. You can download the program there (the screenshot is shown below).

The downloaded application is best recorded on a flash drive. And then with this flash drive, go one by one to the computers that you are going to control and install the program.

3. Install the application

Actually, as I wrote above, you simply install the downloaded program on the computers you want to control (you can also install it on your PC to make it clearer how everything works and compare your indicators with the indicators of employees - display some kind of standard) .

Important point: installation takes place in standard mode (time required for installation - 2-3 minutes) except for one step. You will need to correctly enter the email and password you created in the previous step. If you enter an incorrect E-mail, you will not receive a report, or the installation will not continue at all, the program will return an error that the data is incorrect.

Actually, after the installation took place, the program started working! That's it, she started tracking what was happening on this computer, who was using it and how it was working, etc. You can configure what to control and how - through the account that we registered in step 2 of this article.

4. Setting up basic control parameters: what, how, how much, and how often...

Remote setup (clickable)

What can you control?

  • what characters were printed;
  • what characters were removed.

Screenshots:

  • when changing windows;
  • when changing the web page;
  • when changing the clipboard;
  • the ability to take pictures from a webcam (useful if you want to know whether the right employee is working at the PC, and whether someone is replacing him).

Keyboard events, screenshot, quality (clickable)

In addition, you can control all popular social media (Facebook, Myspace, Twitter, VK, etc.), shoot video from a webcam, monitor Internet pagers (ICQ, Skype, AIM, etc.), record sound (speakers, microphone, etc. devices).

And another nice feature for blocking unnecessary actions by employees:

  • social media can be banned networks, torrents, video hosting and other entertainment sites;
  • You can also manually set sites to which access should be denied;
  • you can even set stop words for blocking (however, you need to be careful with this, because if a similar word appears on the required website for work, the employee simply will not be able to access it :)).

Add. blocking parameters (clickable)

5. Reports, what is interesting?

Reports are not generated immediately, but after 10-15 minutes, after installing the application on the computer. To see the results of the program: just open the link “Dashboard" (main control panel, if translated into Russian).

Online broadcast (reports) - clickable

You will also have access to dozens of reports based on various criteria (which we set in the 4th step of this article). For example, statistics of my last 2 hours of work: it was even interesting to see the efficiency of my work :).

Sites and programs that were launched (reports) - clickable

By the way, there are quite a lot of reports, you just need to click on the various sections and links on the panel on the left: keyboard events, screenshots, visited web pages, queries in search engines, Skype, social media. networks, sound recording, webcam recording, activity in various applications, etc. (screenshot below).

Report options

Important point!

You may install such software only to monitor PCs that you own (or those to which you have legal rights). Non-compliance similar conditions may result in a violation of the law. You should consult with your legal counsel regarding the legality of using CleverControl Software in your area of ​​authority. CleverControl software is intended only for employee control (employees in most cases, by the way, must give written consent to this).

That's all for now, I'll wrap it up. Thanks in advance for any additions on the topic. Good luck to all!