Archive for the ‘Email’ Category

Spying on Emails, Text Messages & Phone Calls

Monday, January 28th, 2013

Although most people greatly value their privacy and many wouldn’t dream of infringing upon other’s personal emails, phone messages and texts, there are still a vast majority who for one reason or another feel the need to peer in on loved one’s private happenings either because they want to know what is going on or in many cases, because their suspect infidelity.

Like it or not and regardless of personal opinions about spying, there is a booming business for devices and apparatuses that will help those who need to be ‘in the know’ on their journeys of discovery. The realm of communications is advancing by the minute and thus, so isn’t the technology for those who wish to spy.

Cell Phone Spying Equipment (Mobistealth)

With the influx of people using their mobile phones to communicate, companies every day are creating monitoring software that can utilized to spy on anyone’s phone messages, texts and will even keep track of websites that they visit while using their cell phone.

Girl with cell phone

How it Works

Once you have targeted the cell phone of your choice, beginning your spying is as easy as downloading whichever software program you choose to buy or invest in to the cell phone you want to monitor. For parents who are giving their underage children a cell phone, there are many companies that sell such software already installed. If however, you are being sneakier with your monitoring, you will have to download the software when the owner is not around.

Once the software has been installed and downloaded, it will begin to work immediately by transmitting (without the owner’s knowledge) masses of data to a secure server that you have set up. This is a separate account to which only the person spying has the password to and is the hub where all the cell phone activity will be sent to.

Once your secure server hub has been set up, you will receive every detail that happens with the cell phone and it goes directly to your secured site. The information transmitted will include all and any websites that the cell phone user visits, a complete log of all the incoming and outgoing calls they make and receive and a complete log of any text messages that are sent and received, including ones that are deleted.

Additionally most also have the option to use the software as a GPS tracking device so that you can track and monitor the cell phone user’s exact location at any time of the day or evening.

There are various options when it comes to cell phone spying software and therefore a little research may be required. Some software only works with specific kinds of phones, while other types will work with any phone. There is also specific monitoring software designed for Blackberry phones and Smart phones because those types have special functions that a traditional phone does not have and therefore you will need specific software if you are to track and spy on those functions.

Email Monitoring Software (http://www.geckomonitor.com)

While many people use their cell phones for the majority of their interactions, most still also use and access a home computer or laptop. Corporations have become particularly interested in this type of software as it allows them to track exactly what their employees are doing during their work hours, but it has also become quite popular in the general community as well.

email monitoring software

 

Most of the software programs sold today work in such a way that the user of the PC is not aware that their every key stroke is being recorded and monitored, making it the most efficient way to spy on the user without getting caught.

Depending on the type of software you purchase and download, every action that happens on the PC can be recorded and viewed at a later date to include screenshots, websites visited (along with the time and date stamped), a complete record of any emails sent and received (both present and deleted) and a record of any chat or instant messages that have been sent or received on the computer.

It is also possible with most of these software programs to track, record and monitor every individual key stroke that happens which means the spying individual can gain access to pertinent information such as passwords and any URL that has been typed into the computer.

Though one would think that a software program this complex and involved would be complicated to set up, the truth is that once you have selected the software you want, all you have to do is install and download it to the PC of your choice and it will begin logging information immediately, with all the collected data going to a secure server that you have set up and that is password protected.

When researching different programs and software it is important to make sure the software you select will work with the specific programs used on the computer such as Windows or Mac programs. While some software is cross-relevant and will work with a myriad of programs, others are designed in such a way that you have to match the software with a specific program type.

 

Setting Up Gecko Monitor Remote Email Reporting

Tuesday, September 25th, 2012

To set up remote email reporting make sure ‘Send logs via E-Mail’ is checked and enter the email address you would like to send the reports to in ‘Send mails to:’

You will need to enter your SMTP details to allow Gecko to send the reports. If your email account is with Gmail you can leave the settings as they are and enter your email address and password. If you use a different email service please use the settings below. Gecko Monitor needs this information because it uses your account to send and receive the logs, so that no sensitive information is sent via us.

IMPORTANT: If you have entered all of your credentials and you are not receiving the test email, please set up a new Gmail account (http://www.gmail.com) and use that. Older email accounts sometimes block the sending of third party emails.

If you’re uncomfortable with entering this information you can set up a new free email account with gmail or hotmail and use that to send the reports. 

If your email account is with Gmail the settings should be:

SMTP server: smtp.gmail.com | SMTP port: 465 | Username: Your email address| Password: Your email accounts password

If your email account is with Hotmail the settings should be:

SMTP server: smtp.live.com | SMTP port: 587 | Username: Your email address | Password: Your email accounts password

If your email account is with Yahoo the settings should be:

SMTP server: smtp.mail.yahoo.com | SMTP port: 995 | Username: Your email address | Password: Your email accounts password

Remember to click ‘Send test mail’ to check your settings and check for email in your inbox. The reports will be attached to the mail as an attachment.

If you’re still not receiving the reports, Windows Firewall maybe blocking Geckos email function. Please follow these instructions to add Gecko to the Firewalls allowed list:

1. Open the control panel by going to ‘My Computer’ then ‘Control Panel’. Once there open ‘Windows Firewall’

2. Click ‘Allow an app or feature through Windows Firewall’ (This option may be phrased differently depending on your version of Windows)

3. Click ‘Change settings’ followed by ‘Allow another app…’ (again this maybe phrased differently)

4. Click browse…

5. Browse to:

C: > Windows > SysWOW64 > Catroot > {GEC0AA…
or if using 32bit Windows: C: > Windows > System32 > Catroot > {GEC0AA…

and click ‘Open’

6. Click ‘Add’

7. Click ‘Ok’ and you’re done. Now go back to Gecko Monitor and try sending a test email.

If you’re still having issues please contact us.