e-Surveiller
e-Surveiller e-Surveiller is a powerful user-activity monitoring, logging and management software package. With it, you can monitor the activities of computer users on standalone computers, on a local area network ... ..
e-Surveiller is a powerful user-activity monitoring, logging and management software package. With it, you can monitor the activities of computer users on standalone computers, on a local area network and on remote computers across the Internet.You view the screens of monitored users on a LAN or across the Internet in real-time!. User-activity logs are also periodically transferred, uploaded or emailed to you for analysis + more!.
e-Surveiller Features
Surveillance and Monitoring Remote Surveillance: Monitor computers on a LAN, across the Internet or on a single/offline PC. User-Activity Monitoring: Monitors and logs all keystrokes along with the window in which they were typed, logs window titles of applications opened, file and folder changes, system activities such as shutdown, startup, logon, etc. with time and date stamps. Screen Viewing: With e-Surveiller, you can watch the monitored user's desktop LIVE as he/she is using the monitored computer. Log Transfer: Monitors can post logs to you via email or FTP. Wide Compatibility Range: Monitors install and run on ALL versions of Windows (95,98,ME,NT4,2000 and XP.) Scalable Operation: Monitoring programs are generated and can have unique instructions for different computers. e-Surveiller can effectively monitor a single computer to several computers from several locations -- even across the Internet! Very Inconspicuous: Monitors will not slow down the monitored computer even when engaged in a screen viewing session. Quiet installation option available for silent monitor installations. Automatically starts when computer starts up. Super stealth-monitoring operation. Easy Installation unto target computer Comprehensive Log Viewing Log Viewer: Catalogs and displays user-activity logs by the users/computers that generated them. Time/Date Stamp: Time in logs is displayed in GMT or in your local time settings URL Recognition: The log viewer highlights internet addresses in the displayed logs. clicking the address visits the address. Verbose/Analysed Views: logs can be displayed exactly in the way they were logged or in an analysed form which considers text formatting and displays logs in a more readable form. Filter logs by date range Mobility 3rd-Party Network Connection: Monitors do not need to email their IP addresses nor know your IP address, they find your computer through 3rd party IRC and Gnutella networks and automatically connect to your computer, making it perfect for mobile use. Log Delivery: Have all recorded activity emailed, FTPed or transferred to you at preset time intervals. Hot Phrase: Set a word which when typed on the monitored computer will prompt you for a folder to save user-activity logs. Monitoring Programs fits into a diskette. Security Super-Stealth Operation: Monitors are virtually undetectable to the monitored user. Password Protection: Unauthorized users can not use the e-Surveiller station and log viewer. Per-User encryption: e-Surveiller logs and screen viewing sessions are encrypted with a unique key for each registered user so that even if logs or screen viewing sessions get into the wrong hands, they can not be viewed. Easy to use! Intuitive Interface: Easy to use, graphical user interface, with intuitive labeled buttons and icons! Easy Monitor Generation wizard: Generate a monitor easily with the Generate new monitor wizard. Comprehensive Help: Built in help file will guide you through any aspect of e-Surveiller.
|
Related:
|
|
|
|