Archive for the ‘Gecko Monitor’ Category

Can I Monitor My Employees’ Computers?

Friday, December 6th, 2013

You can download a free trial of Gecko Computer Monitoring Software here

You may wonder if you can legally monitor your employees’ computers, and the answer is yes. Employers are allowed to monitor their employees’ computers under certain restrictions. Any computers, PDAs or other computer devices that are given to employees can be monitored by employers legally. It is estimated that over 75% of U.S. companies monitor their employees’ activities on the computer, so it is certainly not uncommon.

What types of activities can I monitor? 

You can monitor your employees’ internet activities, instant messaging, typing speed, the length of time they’re on the computer, e-mails, downloads, documents stored on the computer, and other activities. You can screen your employees’ emails for specific keywords, and you can also monitor their keystrokes.

Why should I monitor my employee’s computers? 

You might consider monitoring your employees’ computers if you are worried about time wasting or productivity issues. Websites and social media sites like Facebook can seriously hamper your employees’ productivity and cost you money. Further you might be concerned about your employees viewing objectionable content on work computers which can subject you to legal risks. You may also be concerned about your employees revealing sensitive information about your company to other people and security threats to your company’s computer system. So, there are many reasons why you might monitor your employees’ computers, but you should do it the right way.

Employee monitoring software 

Employee monitoring software is the way to go if you are considering monitoring your employees’ computers, and there are a number of good solutions available. Employee monitoring software is just one part of a complete business IT system protection plan that should also include anti-virus software, malware protection, and company IT policies. Small businesses have a lot of different employee monitoring software options available each with their own advantages and disadvantages.

How you should go about using employee monitoring software 

Once you have decided on a software solution for employee tracking you shouldn’t use it secretly. Your employees should know that they are being monitored when they are using work computer devices, and you should let them know what you are monitoring and why you are doing it. If your employees know they are being monitored they are much more likely to be productive while at work. They will also appreciate you being upfront about your intentions to monitor them rather than surprising them.

Be fair with your employees and check the monitoring reports regularly 

You should check the monitoring reports on a regular basis and check for potential security issues or time wasting. Depending on the type of company culture you have, a bit of entertainment might be allowable during breaks, but it depends on how the company is run. Be fair with your employees and give them warnings for wasting time or other problems. If you catch your employees wasting too much time on games or social media sites you can have a simple sit down with them or send an email reminder which usually corrects the problem. You can also block certain websites like Facebook, YouTube and others using filtering software. Checking the monitoring reports regularly will allow you to follow up and see if your discussions with your employees have made any impact.

You can download a free trial of Gecko Computer Monitoring Software here

Gecko Monitor EULA (End User License Agreement)

Wednesday, April 10th, 2013

By installing and using Gecko Monitor you agree to the following terms:

Gecko Monitor is provided as a tool for monitoring your own computer. Please observe the laws in your state/country before using Gecko Monitor and use the software responsibly. We will not be held responsible for any misuse of the software.

Gecko Monitor is the intellectual property of ‘Gecko Monitor’ and is protected by copyright laws. Please do not attempt to distribute or copy Gecko Monitor without prior permission.

By acknowledging this EULA, you agree with the above text, and that you will use Gecko Monitor in accordance with the laws in your area.

 

Thank you.

Using a Keylogger as a Backup Tool

Tuesday, March 19th, 2013

Because keylogger programs virtually detect and store every stroke, site, instant message and email that was sent on a personal computer, it also makes for an astounding (and in some cases a saving grace) backup tool for your system.

There are many different keylogging programs and most of them allow you to monitor all the activity that goes on within your PC. Some of the software and hardware will take screenshots, track emails and instant messages, record any passwords that were used and some of the more sophisticated programs even have the ability to record the microphone activity that happened on that computer. They will also work in the event that a virus makes it way into your system and destroys the memory and encrypted information.

In cases where your system may crash, having a keylogging system that has a detailed record of all your data is a good thing. Most of the hardware and software programs now come equipped with text editors. These are nifty components built right within the hardware that will automatically create backup copies of documents that you create on your computer. Therefore in instances where you are maybe working on a research paper or business proposal and accidentally click out of your document that you forgot to save, the program has automatically been recording every key stroke and has a hard copy saved for you.

Additionally, many USB keylogger programs will save your web browsing activities and also remember and recall any sites that you have visited or searches you have entered into the web. This is handy when you need to recall some research and forgot to write down the website. Or if you are one that likes to join or subscribe to pages and blogs, but have a short memory for all those passwords, keylogging programs will also keep a steady record of all the passwords to those accounts.

Backing up

The purpose of these programs is less about spying and more about logging your applications. The software will communicate to the hardware on the PC not only password information, but it also has the ability to recall and record the titles of their windows, along with every keystroke you made to get there.

With these programs the concern that you will lose any text at all is virtually non-existent. There are functions included referred to as email clients which will keep track of any emails you send or will also keep track of your drafts. It is necessary at times to be able to have the ability to copy and paste fragments of partial texts from a website you are on and these programs can also help you do that.

The clipboard functions are also a great addition because they allow the user to copy one piece text from your board at one time instead of the entire text as a whole. You can then copy only the information you want or need to your Windows clipboard and the program will store it and make a backup copy that you can refer to at a later date or if and when you lose or crash a system.

Backing Up Your Logs

With many of the keylogger programs backing up your logs is simple. Generally the program will give you detailed instructions on how to do so and it almost always consists of burning your log into a log folder or burning the information onto a CD or USB. In some cases you can burn or save it directly to the hard drive.  Take a look at our free trial of Gecko Monitor to see how we could help you with your backing up needs.

Are Keyloggers Legal? Or Illegal?

Sunday, March 3rd, 2013

There is much heated debate about the utilization of keyloggers and with so many individuals using them to track cheating spouses as well as companies using them to monitor employees behaviors and production, those for an against them being legal all have seemingly valid arguments. However, the question that needs to be answered has nothing to do with morality; it has to do with defining what the law states in regards to their use, as this is the only evidence that will be deemed acceptable should one choose to take a stance with a partner or employer.

The biggest contention for those who oppose these software programs is that on a large scale they do invade one’s privacy. Unfortunately many of the laws surrounding electronic devices do not have specific limitations or restrictions for using them and therefore, keyloggers are still considered legal in many parts of the United States and elsewhere in the world.

legal or illegal

The Electronic Communications Privacy Act (ECPA)

In 1986 Congress passed the Electronic Communications Privacy Act as a way for the public at large to be able to keep their private information safe while at the same time allowing government agencies the license to monitor and record wiretaps, telephone calls and electronic data. The idea behind this act was to offer a balance between the privacy rights of citizens and to also allow the federal government to gain access to information relating to criminal and unlawful activity.

Since its initial passing, more acts have been passed in an effort to narrow the scope and better define what this act does and does not allow. Such amendments include the Federal Wiretap Act (FWA) and the Stored Communication Act (SCA). Neither of those acts includes making keyloggers illegal either.

Why it’s Still Legal to Use Keyloggers

Much of the confusion and discrepancies surrounding keyloggers comes down to how the acts are interpreted by the general public and the court systems. Even the federal government can’t agree on where the line should be drawn as far as what defines infringing upon one’s privacy rights. Most recently many court systems have attempted to interpret the protective acts in such a way that allowing the general public’s key strokes to be monitored should be seen as being unconstitutional and a definitive invasion of privacy.

The blatant conflict within defining these acts continues to cause a conundrum across the globe and in addition continues to cause conflict between employees and employers because the lines remain blurred, and the definitions and interpretations unclear. Many employees violently oppose employers spying on what they are doing even during work hours and feel that keyloggers are unlawful.

Because someone who installs keylogger software must have administrative rights on the system that it is being installed on, this gives them full access and license to do so as they see fit. Because employers can argue that there are legitimate reasons as to why activity on a computer needs to be monitored and surveyed, the practice of utilizing them is deemed as legal and in many cases, necessary. Companies have the right to protect their personal assets and information from being misused and shared and thus, using that argument alone will bypass any one employee from arguing that it is an invasion of privacy.

On an individual level, many parents utilize this software as a way to protect their children when they are online, which again is legal and recommended by people and professionals across the board. For the most part, those who use keylogger programs are doing so in a lawful and ethical way. The flipside is that with this software, there are many unethical and unlawful uses as well. Criminals are able to gain access to personal information, passwords and bank account information and therein lies the issues with those that are opposed to such software programs.

Canada Law and Keylogger Software

Much like the US Canada also have a Privacy Act that is in place and also like the US, their Privacy Act is written with many gray areas, making keylogger software definitely legal for private homes and employers. With the current acts and laws, as long as the person who installed the keylogger program is the owner of the computer or device that the software is being installed on, they have full and legal rights to utilize such software.

The laws and regulations become less arduous when individuals who are not owners of the computers or devices attempt to use them. If for example an ex-spouse or partner installs it on a computer or device without that person’s knowledge, a law suit can be filed and many have been brought up on criminal charges for doing so. In these instances it is because the installer is not the owner of the device and therefore infringes upon the computer owner’s privacy.

UK Laws and Keylogger Software

AS previously discussed, the laws and privacy acts also state that it is legal in the UK for individuals and companies to utilize keylogger software on any computer that they rightfully own. Many companies in the UK have a disclaimer in their employee manuals that specifically states that they have the right to monitor all employee activity in the case of suspicion and otherwise.

It is illegal only in instances where the information obtained is used in an unlawful way, for example as a way to collect passwords or using bank account information in an effort to steal personal funds.

If you’d like to download a free trial of Gecko Monitor, head to our homepage here.

Spying on Emails, Text Messages & Phone Calls

Monday, January 28th, 2013

Although most people greatly value their privacy and many wouldn’t dream of infringing upon other’s personal emails, phone messages and texts, there are still a vast majority who for one reason or another feel the need to peer in on loved one’s private happenings either because they want to know what is going on or in many cases, because their suspect infidelity.

Like it or not and regardless of personal opinions about spying, there is a booming business for devices and apparatuses that will help those who need to be ‘in the know’ on their journeys of discovery. The realm of communications is advancing by the minute and thus, so isn’t the technology for those who wish to spy.

Cell Phone Spying Equipment (Mobistealth)

With the influx of people using their mobile phones to communicate, companies every day are creating monitoring software that can utilized to spy on anyone’s phone messages, texts and will even keep track of websites that they visit while using their cell phone.

Girl with cell phone

How it Works

Once you have targeted the cell phone of your choice, beginning your spying is as easy as downloading whichever software program you choose to buy or invest in to the cell phone you want to monitor. For parents who are giving their underage children a cell phone, there are many companies that sell such software already installed. If however, you are being sneakier with your monitoring, you will have to download the software when the owner is not around.

Once the software has been installed and downloaded, it will begin to work immediately by transmitting (without the owner’s knowledge) masses of data to a secure server that you have set up. This is a separate account to which only the person spying has the password to and is the hub where all the cell phone activity will be sent to.

Once your secure server hub has been set up, you will receive every detail that happens with the cell phone and it goes directly to your secured site. The information transmitted will include all and any websites that the cell phone user visits, a complete log of all the incoming and outgoing calls they make and receive and a complete log of any text messages that are sent and received, including ones that are deleted.

Additionally most also have the option to use the software as a GPS tracking device so that you can track and monitor the cell phone user’s exact location at any time of the day or evening.

There are various options when it comes to cell phone spying software and therefore a little research may be required. Some software only works with specific kinds of phones, while other types will work with any phone. There is also specific monitoring software designed for Blackberry phones and Smart phones because those types have special functions that a traditional phone does not have and therefore you will need specific software if you are to track and spy on those functions.

Email Monitoring Software (http://www.geckomonitor.com)

While many people use their cell phones for the majority of their interactions, most still also use and access a home computer or laptop. Corporations have become particularly interested in this type of software as it allows them to track exactly what their employees are doing during their work hours, but it has also become quite popular in the general community as well.

email monitoring software

 

Most of the software programs sold today work in such a way that the user of the PC is not aware that their every key stroke is being recorded and monitored, making it the most efficient way to spy on the user without getting caught.

Depending on the type of software you purchase and download, every action that happens on the PC can be recorded and viewed at a later date to include screenshots, websites visited (along with the time and date stamped), a complete record of any emails sent and received (both present and deleted) and a record of any chat or instant messages that have been sent or received on the computer.

It is also possible with most of these software programs to track, record and monitor every individual key stroke that happens which means the spying individual can gain access to pertinent information such as passwords and any URL that has been typed into the computer.

Though one would think that a software program this complex and involved would be complicated to set up, the truth is that once you have selected the software you want, all you have to do is install and download it to the PC of your choice and it will begin logging information immediately, with all the collected data going to a secure server that you have set up and that is password protected.

When researching different programs and software it is important to make sure the software you select will work with the specific programs used on the computer such as Windows or Mac programs. While some software is cross-relevant and will work with a myriad of programs, others are designed in such a way that you have to match the software with a specific program type.

 

Windows 8 Keylogger – Gecko Monitor Upgrades

Thursday, January 3rd, 2013

Gecko Monitor has been growing in strength over the past 6 months. Thank you to everyone who has supported to us through development and too everyone who has used the software.

As Windows 8 hits stores and PC’s around the world, and more and more people upgrade to Microsoft’s new operating system, we thought it best to begin upgrading Gecko Monitor to make sure our Keylogger is 100% compatible with the new incarnation of Windows.

Although Windows 8 works similarly to previous versions of Windows (apart from the addition of the new style start menu) there are some minor alterations, especially behind the scenes. The main feature of Gecko Monitor that needed upgrading to be comprehensively compatible was the Keylogger, which has been upgraded to offer improved stability and functionality.

We are also in the process of adjusting the trial length of Gecko Monitor to a longer time period, to allow users to test the features more before purchasing the software. If you’d like to download Gecko Monitor and see the software in action, head to our home page here:

http://www.geckomonitor.com

More new features will be announced here on the blog in the the not too distant future. At the moment the team behind Gecko is looking at microphone recording, web cam monitoring and Skype integration. Check back soon if any of that excites you!

What is Computer Monitoring Software? A Quick Guide

Monday, December 17th, 2012

Computer monitoring software isn’t a new concept; however as technology advances on the Internet and people become more adept are searching, the need for this type of software particularly for household with children has vastly increased.

Essentially a computer monitoring software program will allow the owner or registers of a laptop or desktop to monitor all the activity that happens on that computer without the user knowing that their activities are being recorded and monitored. This is the same software that is also known as parental software which many parents have put on their computers that are used by underage children as well as other family members.

Once the software is installed, the program will monitor all online activities as well as filter the content. It also has settings that allow the owner of the computer to block particular sites from gaining access to the computer, and controls can be set so that certain cites cannot be accessed by those using the computer. Generally the controls placed are those sites that are at high risk of containing viruses and sites that contain adult material such as pornography.

Computer monitoring software often gets confused with other software programs that fall under the spyware programs. There are vast differences between the two and in order for particular software to fall under monitoring software one of three key elements must be present:

  • The person who installs the monitoring software must be the owner of the PC or laptop that it is being installed on.
  • The owner has permission from other family members or users of that computer to install the software.
  • Whoever installs the software is the parent of an underage child.

Computer monitoring software is not only used by parents, but is also vastly used in many workplaces where the business owner or owners want to regulate what their employees can access and what programs can have access to their PC’s. These monitoring software programs will recognize key words that directly contradict what that employer will allow their employees to search for. When an employee tries to search for things that should not be accessed they will be brought to a screen that states something like “Unauthorized to view this website” or something similar.

Considerations Before Purchasing or Installing Computer Monitoring Software

There are hundreds of available software programs and not all are created equally. You should devote some time to researching the many that are available so that you invest in one that is affordable, is easy to install and navigate and that will do everything you need it to do. There are many programs available online that is free, while others will charge but have more bells and whistles available.

Things you should take into consideration are:

  • Compare pricing and capabilities of the software
  • Be sure that the software you buy is the latest version
  • Make sure that it is compatible with your operating system
  • Purchase one that has stellar customer support services as you will probably have questions along the way. Also ask what their turnaround time is for addressing your questions or issues

Interested in learning more? Check out our very own Gecko Monitor. Gecko Monitor’s advanced systems comfortably and easily allow parents to monitor all of their computer’s and user’s activities while online and our program works equally as well for employers who want to monitor their employee’s activities.

When choosing a program consumers need one that is easy to install and that is easily navigated and Gecko is not only is affordable, but it is the easiest to install and manage on the market. Once the program is installed and the user assigns a password, all activity on the computer can be quietly monitored to ensure the safety of all users.

We offer a free two hour trial so you can get to know the program and then make an educated decision as to whether this is the computer monitoring program for you, your family or your place of business.

Gecko Monitor also offers many unique features which include:

  • Monitoring of any and all printed documents constructed on the computer
  • Compiles screenshots of all activity and sites visited
  • Easy to use and understand time stamping system
  • Emailing documentation and reporting to the email you assign to the program which offers reports and alerts
  • Complete monitoring of all files which are opened, deleted or saved
  • Guaranteed monitoring that is hidden and can unhide with password/secret key combination

To download a free trial of Gecko Monitor click here.

 

Protecting Children Online – An Infographic

Monday, November 12th, 2012

protecting children online

Monitoring a Cheating Spouse – Cell Phone & PC

Friday, October 19th, 2012

If you have your suspicions about a cheating spouse there are now more ways to catch them out than there was ten years ago. These days the world is intrinsically connected in way that can be dangerous for those trying to hide something. So if you do have your suspicions the best way to get the truth is to start monitoring their devices.

Whether or not you should monitor a spouse is a different issue and may be one that doesn’t play well on peoples morals, but that debate is a lengthy one that will never have an agreeable answer, so we won’t go into it now. If you feel that monitoring your spouses devices is the route you need to go down then read on.

Man on Cell Phone

The two devices in question are the mobile (cell) phone and the computer or laptop. In the 21st century both can be monitored with ease. The mobile phone can be monitored by simple programs that you install when you have a few minutes alone with the phone. Mobistealth is the leading phone monitoring software which you can purchase and prepare from your own computer when no one is around. Then, when you have a few minutes with the target phone you simply type a link into the phones browser and the software gets installed.

Phone and computer monitoring programs both work in complete stealth, so as soon as the application has been installed no one will know about it. With Mobistealth you can log into your members area to see the logs and look over what has been monitored. You’ll be able to listen to phone calls, read texts, see picture messages and even see where your spouse has been using GPS tracking. You can read a review of Mobistealth here.

Monitoring your spouses computer is just as easy. Using an application like Gecko Monitor, all you’ll need is 10 minutes alone with the computer to set up the software, after which everything runs in stealth while monitoring things like keystrokes, websites visited, applications used, documents typed and emails sent. You can view all of this either by logging back into Gecko Monitor or by having the reports sent to you remotely via email.

With both of these programs installed you can be sure to find out the truth about a cheating spouse, and have the proof to confront them with. You can download a free trial of Gecko Monitor here.

Parental Control Features To Be Built Into Gecko Monitor

Thursday, October 4th, 2012

Here at Gecko Monitor we strive to provide an unparalleled computer monitoring product and are always researching, planning and implementing new features and improved functionality. With this in mind we asked ourselves what other features our users would need. We came to two conclusions; Parental control features and networked office monitoring. As most of our users are home users monitoring their home computers, we decided on exploring parental control features first, although we will add more functionality for networked offices in the future.

Parental control (in computers) is obviously already an established market and a lot of our competitors already implement these features. We’ve looked at the market leader and other applications in the industry to decide how we can match and even improve on what’s already out there, and we think we’ve got something pretty special in the pipelines.
parental control software Of course the first thing we asked ourselves is what parents want from parental control at the most basic level. I’m sure all parents will agree that it’s safety, which we bare in mind at every stage in the development of the feature.

Blocking and Filtering is the bulk of parental controls and it’ll work like this; Every time a web page is loaded it’ll be scanned by Gecko Monitor before it’s shown. If there are words or images that appear inappropriate the web page will be blocked and will show a ‘locked’ splash screen instead of the website. But how does Gecko Monitor know what’s appropriate and what’s not? That’s up to you.

Behind the scenes we’ll have an extensive, comprehensive keyword list, sorted into categories that Gecko Monitor will check through when scanning a page. We’ll have suggested levels of filtering for different age groups and you can even add and remove keywords and phrases yourself. We’ll also include a setting for the youngest age group that only allows a select handful of sites (a children’s network) and block everything else.

The development of parental control is in its infancy at the moment so we’ve got a lot of work to do but we’re hoping to release the first version of the new Gecko Monitor within the next 4 months. Are main aim at this time is to create a program that’s an industry leader, a comprehensive tool that’s flexible and reliable. If you have any ideas, comments, requests or anything else you’d like to discuss with us please don’t hesitate to get in touch, we’d love to hear from you!

If you haven’t tried Gecko Monitor yet take a look at the free trial, available here.