Download - Size: 49 KB Source: www.stealthactivityreporter.netFile Ping Time (less is better): 349 ms
Full Description: This is a monitoring tool for both networked and personal PCs. It lets companies and individuals track use and abuse easily and invisibly using password-protected encrypted log files. You can deploy this tool using e-mail. Simply send an e-mail to the person using the computer you want to monitor. STAR will then be installed silently on this computer and the person will never notice that this programm is running. This application monitors and logs: Keystrokes User names Passwords Path names Access times Window titles Visited Web sites Information is stored in an encrypted text file. In stealth mode, it does not show up in the system tray, task bar or task list. You can also invisibly e-mail your log file using SMTP or POP3 e-mail accounts.
Keywords: logger, keylogger, logs, keystrokes, visible, logging, remote, deployment, user, name, internetsession, passwords, path, names, access, times, windows, title, active, monitor, password, protected, encrypted, textfile, logfile, backdatin