SOFTWARE FEATURES
Spy
Agent's logging capabilities are unmatched. Spy
Agent can log anything from what the user types,
to the files they printed and programs they ran
- all timestamped by date for easy viewing. All
logs are easily saved and exported for later use.
Spy Agent can be configured to log all users on
your computer with ease.
The Most Powerful Local PC Monitoring Spy Software
INTERNET
SPYING SOFTWARE
- Keystroke
Monitoring
Monitor and log all keystrokes along with the
window they are typed in and timestamp. Click
the "Format" button to remove and
apply text formatting to make the log more readable
-
Emails Sent and Received
Monitor and log all emails sent and received
by users of your computer! All SMTP and POP3
messages are recorded for later viewing.
- Events
Timeline Logging
Log
all events users performed and view them in
an organized chronically ordered listing. The
Events Timeline lets you view what the events
the user performed, in the order they did them.
Events logged include Program Starts/Stops,
Website Visits, Document Viewings and Printings,
and more.
- Internet
Conversations
Monitor and log both sides of all chat
conversations made on Skype and other messengers.
-
Website Activity
Log all websites visited by the popular
browsers: Internet Explorer, Netscape, Opera,
and America Online. All website visits are logged
by website address, username, and duration of
the site visit.
-
Webmail Content
Log webmail messages and data. Spy Agent
lets you view the emails as the user read them
when they received them.
-
Internet Connections
Monitor and log all internet sessions made
on the PC. This includes all FTP,HTTP, POP3,
Chat Messenger, and any other TCP connections.
- Files/Documents
Accessed
Log all files and documents opened from
within Windows Explorer. The log viewer provides
links to the documents viewed.
- Files/Documents
Printed
Log all files and documents printed by
users of your PC. Logs include the document
printed, who printed it, what printer was used,
and when.
- Window
Activity
log all windows in which the user directly
interacts on the desktop.
- Application
Usage
Monitor and log all applications ran on
the PC. Full file names along with execution
start and stop times are logged.
- Screenshot
Capturing
Spy Agent can take snapshots of your desktop
at set intervals of time, allowing you to visually
see what is happening. The ScreenShot capture
manager also has a built in Slide show viewer
for easy viewing.
- Clipboard
Logging
Log
all text copied to the Windows clipboard by
users.
- Activity
Logging
log all all system shutdowns and
user log-ons, as well as Spy Agent actions:
starting/stopping of monitoring processes, option
changes, log accesses, and failed access attempts
to start/stop monitoring. This also shows how
long a user was active during a monitoring session.
- E-Mail
Log Delivery
have all recorded activity logs emailed
to your email address every xxx minutes.*
- FTP
Log Delivery
have all recorded activity logs uploaded
to your FTP account every xxx minutes.
CONTENT FILTERING
Spy
Agent not only acts as a powerful spy software
solution, but also as a content filtering tool.
Spy Agent can filter websites from being visited,
applications from being ran by the user, and even
chat messengers from being used while Spy Agent
is active.

- Application
Filtering
Spy
Agent allows you to control what programs users
cannot run!
- Website
Filtering
Spy
Agent allows you to control what websites users
can and cannot visit!
- Chat
Filtering
Spy
Agent allows you to control what chat messengers
users can and cannot use while Spy Agent is
running!
- Email
Alerts
Spy
Agent can be configured to send you email notifications
when a user runs an unwanted website, chat client,
or application. Alerts can also be sent when
the computer is started/shutdown, and when spyware
detectors are installed!
STEALTH FEATURES
Spy
Agent has a large array of security and stealth
features. Spy Agent is undetectable under all
Windows versions (it does not even show up in
the task manager on any Windows platform) and
can circumvent popular third-party "spyware"
detectors. Spy Agent has powerful lockdown and
logging scheduling features, log file encryption,
optional startup warnings, and much more.

- Stealth-Mode
Spy Agent can run totally in stealth; that is,
it is virtually undetectable to the user. Spy
Agent will NOT show up in the task manager under
Windows - at all. Spy Agent does not appear
in registry and Windows startup utilities while
it is running, either.
- Log
File Encryption
Spy Agent has a built in encryption option
that allows you to have all your Spy Agent activity
logs encrypted so others cannot stumble across
Spy Agent's logs or read them without using
Spy Agent's protected log viewers.
- Security
Settings
Toggle various Windows security settings
to make it harder for users to trace and bypass
Spy Agent - such as the ability to disable the
system clock's time/date settings, or to access
the Windows task manager.
- Spyware
Detector Disabling
Configure Spy Agent to disable popular spyware
detectors that may interfere or detect Spy Agent
running!
- Logging
Time Scheduling
configure Spy Agent to monitor and record
only when you want it to!
- PC
Lockdown Scheduling
schedule Spy Agent to lock your PC down
when you are not around!
- Warning
Screen
display a splash screen which alerts users
they are being monitored by the Spy Agent software
(totally optional).
- Password
Protection
Spy Agent is password protected to prevent easy
monitoring termination and option changes.
- Active
Startup
Run Spy Agent already in active monitoring mode.
- Windows
Startup
Run Spy Agent when Windows boots up.
- Idle
Timeout
Spy Agent will stop logging when the user
is inactive for a specified amount of time,
when they are active again Spy Agent resumes
logging.
- AutoClear
You can set Spy Agent to clear your monitoring
logs every xxx number of actions logged, or
every xxx number of keystrokes entered. This
provides for minimal usage of processor speed
and diskspace.
- Configurable
Stealth Mode Hotkey
Spy Agent allows you to configure its hotkey
pattern to whatever key combination you want
making it harder for others to stumble across
Spy Agent!
- Deploy
Utility
Spy Agent has a built in deploy utility
that prevents it from being task ended from
the task list, or any other process manager.
EASY TO OPERATE
Spy
Agent has always been known as being extremely
easy to use. You can have Spy Agent setup and
monitoring in seconds with its built in easy configuration
wizard and intuitive graphical interface. Spy
Agent can even be tweaked to smoothly monitor
slower PC's!

- Intuitive
Interface
Easy to use, graphical user interface,
with intuitive labeled buttons and icons!
- Easy
Configuration Wizard
Setup Spy Agent in seconds with the built
in easy configuration wizard!
- Quick
Log Filtering
Use the 'sort by day' feature in Spy Agent
to easily view activities that only occurred
on a specified date, rather than all activities
at once.
- Speed
Adjustment
Spy Agent lets you adjust the thread efficiency
for monitoring - this in turn eliminates lag
from Spy Agent on slower PC systems



SPECIAL
OFFER!
SpyTector - Undetectable
KeyLogger!
SpyTector is the most
undetectable keylogger
you can find on the
market. SpyTector keylogger
is undetected when scanned
with Norton, Kaspersky,
McAfee, Panda, AVG,
Avast, F-Secure, Trend
Micro. During the support
period you buy (2 months,
12 months, life-time)
you receive free updates
and new undetected SpyTectors
in the case detection
problems occur.

|
|
|