DATARECOVERY



Powerful Computer Monitoring and Spy Software


SpyAgent is a powerful utility that enables you to monitor and log Internet traffic and application usage on your computer.

SpyAgent can log all keystrokes, emails, windows, websites, applications, internet connections, chat conversations, passwords, print jobs, documents viewed and even screenshots
.


SpyAgent runs in complete stealth with optional email delivery, logging and lockdown scheduling. Record any actions on your PC with this powerful full featured PC spy!

SpyAgent is used by home users and businesses alike - as it provides the most comprehensive logging that can be found anywhere.

Here are some key features of "SpyAgent":

Keystroke Logging:
· Monitor and log all keystrokes along with the window they are typed in and timestamp. Click the "Format" button to remove and apply text formatting to make the log more readable. Passwords captured are flagged for easy viewing. If screenshot capturing is enabled, SpyAgent will display related screenshots alongside the keystroke log entries.

Emails Sent and Received:
· Monitor and log all emails sent and received by users of your computer! All SMTP and POP3 messages are recorded for later viewing. Attachments are logged as well.

Events Timeline Logging:
· Log all events users performed and view them in an organized chronically ordered listing. The Events Timeline lets you view what the events the user performed, in the order they did them. Events logged include Program Starts/Stops, Keystrokes Typed, Email and Chat Messages, Website Visits, Document Viewings and Printings, how long users were active and idle each session, and more.

Internet Chat Conversations:
· Monitor and log both sides of all chat conversations made on chat clients. Supported clients include the latest versions of: AOL (including 9.0 and Optimized), AOL Instant Messenger, AIM Triton, Yahoo Messenger, MSN Messenger (including 6.x and 7.x), Excite Messenger, GoogleTalk, Skype, XFire, and ICQ.

· Application Usage
· Monitor and log all applications ran by users - SpyAgent logs when the application was started, stopped, and how long it was actually used. Users cannot fool SpyAgent by simply opening a program and leaving it running in the background - SpyAgent will know how long the program was actually used.

Internet Traffic Data:
· Monitor and log all internet traffic data that is sent and received by your computer. This data includes emails, website requests and contents, FTP sessions, passwords, chat conversations, and more.

Files Uploaded and Downloaded:
· Log files users upload and download via the web, email, and FTP. All file transfers include the user that performed the transfer, where they downloaded from/uploaded to, and when. File transfer logs can be sorted by content-type for convenient log viewing.

Application Filtering:
· SpyAgent allows you to control what programs users cannot run.

Requirements:

· 500 MHz CPU
· 32MB RAM
· 3 MB HD Space


Limitations:

· Monitoring during the evaluation period will terminate after 30 minutes. You have to restart the application to resume logging.
· Nag screen
What's New in This Release:

· Improved Remote Log Reporting, Mouse Click Recording, Enhanced Behavior Alerts, Customizable Report Generation, Logging Improvements


Program Information
 Developer: Spytech Software
Price and Added Date
Demo / USD 69.95.02-04-2014
Download Links
.

Related Posts:

  • Recover Keys 8.0.3.110 An efficient and reliable application designed for helping you retrieve the serial keys for the software programs installed on your computer Recover Keys is a handy application designed to extract activation key… Read More
  • Magen Malware Vigilance 1.5.3.4 A compact and efficient application able to scan your computer and notify you about the programs that have been installed without your consent Magen Malware Vigilance allows you to bring an additional layer of sec… Read More
  • Metasploit Pro 4.9.3 This is a versatile and effective application that prevents data breaches with real-world attack scenarios and verifies security effectiveness Metasploit Pro will provide user swith a suite of tools that will hel… Read More
  • Mandiant Redline 1.12 Identify malicious activity on a system using memory and file analysis Mandiant Redline is a powerful solution that processes and data can be analyzed to find any traces of malware that is active onto a system. The … Read More
  • WinTrezur 1.1.0 A fully-featured application that helps users compress or decompress files and view images, as well as split and merge files, find duplicate items and resize images WinTrezur is a nice encryption program than prot… Read More
Powered by Blogger.

Enter your email address:

Delivered by FeedBurner

Popular Posts