Archive for July, 2012

Monitoring An Office Computer

Wednesday, July 25th, 2012

We’re all well aware of the distractions office workers now face on a daily basis. Facebook, Twitter, Youtube and an endless array of entertainment and games are available to us 24/7 at the click of a mouse. To many, this may be a sign of productivity levels dropping at work, and in a lot of cases this is certainly true. This is one reason you may want to start monitoring an office computer.

An other reason might be a bit more sinister. Stealing, pornography or a complete lack of regard for work might mean you need proof before action is taken on the out of line individual. Whatever the reason for wanting to monitor an office computer, these days it’s easily achievable, with some companies monitoring all their computers whatever the situation.

Office Computer Monitoring

Gecko Monitor, is an all in one monitoring solution for monitoring any computer. It’s main function is stealthy computer monitoring, meaning it’s perfect for monitoring one computer without it’s user knowing. If you’re wondering about whether this is legal or not, the general law is ‘you can monitor a computer that you own’. This varies from state to state and country to country so check your local laws. There’s an interesting thread that goes into more detail on the issue here:

http://askville.amazon.com/legal-computer-monitoring-software-state/AnswerViewer.do?requestId=11071111

Some people also have an ethical issue with this type of software. To those people I always say it’s not the software but what you do with it. When it comes to office productivity and suspicions of malpractice, it’s your company at risk and you have every right to protect it.

Gecko Monitor is a low cost application that provides all round monitoring. The software monitors keystrokes, applications, websites visited, documents opened and deleted, printed documents and takes screenshots at set intervals or when a new window becomes active. All of this is fully customizable and the software runs in complete stealth mode (or, if you choose, with an icon in the tray) meaning there’s no sign that the software is running.

Logs can be checked at the end of the day with a secret key combination and password, or can be emailed to you at set intervals. We think Gecko Monitor is perfect for monitoring an office computer but don’t take our word for it – download the free trial now by heading to our home page.

Monitoring Your Childs Computer – Ethical & Moral Implications

Tuesday, July 10th, 2012

One of the questions I receive on a regular basis is to do with the ethical and moral issues of monitoring another persons internet activities. It’s definitely a hot issue and one that deserves consideration. For me, it depends on the person and the situation, and today we’re looking at monitoring your own childs computer.

Of course, there is no right or wrong answer in this – everyone’s moral compass points in a slightly different direction. The first thing to bare in mind though, is the law in your area. Nine times out of ten the law says you can monitor a computer IF you own it OR if you have the owners permission. You will almost always be able to monitor your own child’s computer, but it’s always a good idea to check up first.

Child at Computer

Another consideration is the reason you’d like to monitor your child’s computer. If the reason is resolvable without using monitoring software, then you might what to take that route rather than risk the fallout of using the software. An example of this may be playing too many games. If though, you think your child is getting into something more serious (pornography or dangerous chat rooms are a couple of examples) and they’re denying it or not talking to you about it, then monitoring software may be the way to go.

As mentioned before, you have to make your own mind up as to whether you are doing the right thing by your child. If you think the activity their doing behind your back could be worse for them in the end than the argument or loss of trust you may get from monitoring them, then use the software.

If you do decide to use monitoring software, you can install the software on the computer when they’re out quickly and simply. Once this is done you can either check the reports on they’re computer whenever they’re out, or get the reports emailed to you remotely. Gecko Monitor can monitor screenshots, keytrokes, websites visited, applications used, document activity, printer activity and more, so you can see exactly what’s been going on on the target computer.

What do you think of the moral and ethical implications of monitoring your child’s computer? Would you do it? And under what circumstances? Let us know in the comments. If you’d like to download a free trial of Gecko Monitor click here.