By John Jones, Guest Author (For Guest Posting, refer Terms ) If you have suspicions about your families computer activity while you'r...
By John Jones, Guest Author (For Guest Posting, refer Terms)
If you have suspicions about your families computer activity while you're away, you might consider using computer monitoring software. Whether it's your son getting up to mischief when he should be doing homework, or your husband emailing someone he shouldn't, computer monitoring software (also called a keylogger) can monitor all activity for you to review at any time.
There are plenty of computer monitoring applications available to download on the internet, ranging from the very basic, which will just monitor keystrokes, to the very advanced, which can monitor almost all aspects of computer use. The most advanced can even monitor the GPS location of a laptop, or when it comes to smart phones, can record an entire call.
Most of the popular computer monitoring software you will find online will have a basic set of features that will usually monitor everything you'll need. The most basic of which, as we mentioned before will be the keystroke logging. The software will monitor all keystrokes pressed, along with the name of the application they were typed into and the time and date.
The next most common feature found in most home monitoring applications is screenshot monitoring. Screenshots will be taken either at set intervals and/or whenever a new window is focused. In some applications video can be taken of the screen whenever there's activity, although in my experience this can be counter-productive as you have to sift through hours of video footage, rather than skimming through screenshots.
Both of the features we've mentioned so far are linked together by application monitoring. All application use will be monitored, along with the time and date of the use. Screenshots and keystrokes are usually labelled with the name of corresponding application, so you can review all activity easily.
Printing will also usually be monitored. The name of the document, the name of the printer and the date & time will all be logged. Sometimes you'll be able to see a snapshot of the printed document. The documents themselves will also be monitored, along side all other file activity. All files created, saved, opened, moved and deleted will usually be logged. Handy if you need to monitor work flow (usually intended for an office environment). The clipboard usually has a section as well, meaning anything copied and pasted will be there.
Of course, no monitoring of computer activity would be complete (in fact, these days almost worthless) without internet activity being recorded. Website sniffing, as it's sometimes referred to, will monitor all websites visited, the date and time of the visit, and usually a snapshot of the website. This, along with the keystroke recording, can usually reveal a lot about the users internet activity.
All of these features usually work stealthily, in the background, while the computer is being used. Un-hiding the software to view the logs and adjust settings can be done by entering a secret key combination and entering your user defined password. Logs can usually also be sent by email, for you to view at a different location.About the author: John Jones, the author of this article runs 'Gecko Monitor' – the powerful and stealthy computer monitoring software. To download a free trial of Gecko Monitor head to GeckoMonitor.com.