Posts Tagged ‘gecko monitor’

Gecko Monitor EULA (End User License Agreement)

Wednesday, April 10th, 2013

By installing and using Gecko Monitor you agree to the following terms:

Gecko Monitor is provided as a tool for monitoring your own computer. Please observe the laws in your state/country before using Gecko Monitor and use the software responsibly. We will not be held responsible for any misuse of the software.

Gecko Monitor is the intellectual property of ‘Gecko Monitor’ and is protected by copyright laws. Please do not attempt to distribute or copy Gecko Monitor without prior permission.

By acknowledging this EULA, you agree with the above text, and that you will use Gecko Monitor in accordance with the laws in your area.

 

Thank you.

Spying on Emails, Text Messages & Phone Calls

Monday, January 28th, 2013

Although most people greatly value their privacy and many wouldn’t dream of infringing upon other’s personal emails, phone messages and texts, there are still a vast majority who for one reason or another feel the need to peer in on loved one’s private happenings either because they want to know what is going on or in many cases, because their suspect infidelity.

Like it or not and regardless of personal opinions about spying, there is a booming business for devices and apparatuses that will help those who need to be ‘in the know’ on their journeys of discovery. The realm of communications is advancing by the minute and thus, so isn’t the technology for those who wish to spy.

Cell Phone Spying Equipment (Mobistealth)

With the influx of people using their mobile phones to communicate, companies every day are creating monitoring software that can utilized to spy on anyone’s phone messages, texts and will even keep track of websites that they visit while using their cell phone.

Girl with cell phone

How it Works

Once you have targeted the cell phone of your choice, beginning your spying is as easy as downloading whichever software program you choose to buy or invest in to the cell phone you want to monitor. For parents who are giving their underage children a cell phone, there are many companies that sell such software already installed. If however, you are being sneakier with your monitoring, you will have to download the software when the owner is not around.

Once the software has been installed and downloaded, it will begin to work immediately by transmitting (without the owner’s knowledge) masses of data to a secure server that you have set up. This is a separate account to which only the person spying has the password to and is the hub where all the cell phone activity will be sent to.

Once your secure server hub has been set up, you will receive every detail that happens with the cell phone and it goes directly to your secured site. The information transmitted will include all and any websites that the cell phone user visits, a complete log of all the incoming and outgoing calls they make and receive and a complete log of any text messages that are sent and received, including ones that are deleted.

Additionally most also have the option to use the software as a GPS tracking device so that you can track and monitor the cell phone user’s exact location at any time of the day or evening.

There are various options when it comes to cell phone spying software and therefore a little research may be required. Some software only works with specific kinds of phones, while other types will work with any phone. There is also specific monitoring software designed for Blackberry phones and Smart phones because those types have special functions that a traditional phone does not have and therefore you will need specific software if you are to track and spy on those functions.

Email Monitoring Software (http://www.geckomonitor.com)

While many people use their cell phones for the majority of their interactions, most still also use and access a home computer or laptop. Corporations have become particularly interested in this type of software as it allows them to track exactly what their employees are doing during their work hours, but it has also become quite popular in the general community as well.

email monitoring software

 

Most of the software programs sold today work in such a way that the user of the PC is not aware that their every key stroke is being recorded and monitored, making it the most efficient way to spy on the user without getting caught.

Depending on the type of software you purchase and download, every action that happens on the PC can be recorded and viewed at a later date to include screenshots, websites visited (along with the time and date stamped), a complete record of any emails sent and received (both present and deleted) and a record of any chat or instant messages that have been sent or received on the computer.

It is also possible with most of these software programs to track, record and monitor every individual key stroke that happens which means the spying individual can gain access to pertinent information such as passwords and any URL that has been typed into the computer.

Though one would think that a software program this complex and involved would be complicated to set up, the truth is that once you have selected the software you want, all you have to do is install and download it to the PC of your choice and it will begin logging information immediately, with all the collected data going to a secure server that you have set up and that is password protected.

When researching different programs and software it is important to make sure the software you select will work with the specific programs used on the computer such as Windows or Mac programs. While some software is cross-relevant and will work with a myriad of programs, others are designed in such a way that you have to match the software with a specific program type.

 

Windows 8 Keylogger – Gecko Monitor Upgrades

Thursday, January 3rd, 2013

Gecko Monitor has been growing in strength over the past 6 months. Thank you to everyone who has supported to us through development and too everyone who has used the software.

As Windows 8 hits stores and PC’s around the world, and more and more people upgrade to Microsoft’s new operating system, we thought it best to begin upgrading Gecko Monitor to make sure our Keylogger is 100% compatible with the new incarnation of Windows.

Although Windows 8 works similarly to previous versions of Windows (apart from the addition of the new style start menu) there are some minor alterations, especially behind the scenes. The main feature of Gecko Monitor that needed upgrading to be comprehensively compatible was the Keylogger, which has been upgraded to offer improved stability and functionality.

We are also in the process of adjusting the trial length of Gecko Monitor to a longer time period, to allow users to test the features more before purchasing the software. If you’d like to download Gecko Monitor and see the software in action, head to our home page here:

http://www.geckomonitor.com

More new features will be announced here on the blog in the the not too distant future. At the moment the team behind Gecko is looking at microphone recording, web cam monitoring and Skype integration. Check back soon if any of that excites you!

What is Computer Monitoring Software? A Quick Guide

Monday, December 17th, 2012

Computer monitoring software isn’t a new concept; however as technology advances on the Internet and people become more adept are searching, the need for this type of software particularly for household with children has vastly increased.

Essentially a computer monitoring software program will allow the owner or registers of a laptop or desktop to monitor all the activity that happens on that computer without the user knowing that their activities are being recorded and monitored. This is the same software that is also known as parental software which many parents have put on their computers that are used by underage children as well as other family members.

Once the software is installed, the program will monitor all online activities as well as filter the content. It also has settings that allow the owner of the computer to block particular sites from gaining access to the computer, and controls can be set so that certain cites cannot be accessed by those using the computer. Generally the controls placed are those sites that are at high risk of containing viruses and sites that contain adult material such as pornography.

Computer monitoring software often gets confused with other software programs that fall under the spyware programs. There are vast differences between the two and in order for particular software to fall under monitoring software one of three key elements must be present:

  • The person who installs the monitoring software must be the owner of the PC or laptop that it is being installed on.
  • The owner has permission from other family members or users of that computer to install the software.
  • Whoever installs the software is the parent of an underage child.

Computer monitoring software is not only used by parents, but is also vastly used in many workplaces where the business owner or owners want to regulate what their employees can access and what programs can have access to their PC’s. These monitoring software programs will recognize key words that directly contradict what that employer will allow their employees to search for. When an employee tries to search for things that should not be accessed they will be brought to a screen that states something like “Unauthorized to view this website” or something similar.

Considerations Before Purchasing or Installing Computer Monitoring Software

There are hundreds of available software programs and not all are created equally. You should devote some time to researching the many that are available so that you invest in one that is affordable, is easy to install and navigate and that will do everything you need it to do. There are many programs available online that is free, while others will charge but have more bells and whistles available.

Things you should take into consideration are:

  • Compare pricing and capabilities of the software
  • Be sure that the software you buy is the latest version
  • Make sure that it is compatible with your operating system
  • Purchase one that has stellar customer support services as you will probably have questions along the way. Also ask what their turnaround time is for addressing your questions or issues

Interested in learning more? Check out our very own Gecko Monitor. Gecko Monitor’s advanced systems comfortably and easily allow parents to monitor all of their computer’s and user’s activities while online and our program works equally as well for employers who want to monitor their employee’s activities.

When choosing a program consumers need one that is easy to install and that is easily navigated and Gecko is not only is affordable, but it is the easiest to install and manage on the market. Once the program is installed and the user assigns a password, all activity on the computer can be quietly monitored to ensure the safety of all users.

We offer a free two hour trial so you can get to know the program and then make an educated decision as to whether this is the computer monitoring program for you, your family or your place of business.

Gecko Monitor also offers many unique features which include:

  • Monitoring of any and all printed documents constructed on the computer
  • Compiles screenshots of all activity and sites visited
  • Easy to use and understand time stamping system
  • Emailing documentation and reporting to the email you assign to the program which offers reports and alerts
  • Complete monitoring of all files which are opened, deleted or saved
  • Guaranteed monitoring that is hidden and can unhide with password/secret key combination

To download a free trial of Gecko Monitor click here.

 

Parental Control Features To Be Built Into Gecko Monitor

Thursday, October 4th, 2012

Here at Gecko Monitor we strive to provide an unparalleled computer monitoring product and are always researching, planning and implementing new features and improved functionality. With this in mind we asked ourselves what other features our users would need. We came to two conclusions; Parental control features and networked office monitoring. As most of our users are home users monitoring their home computers, we decided on exploring parental control features first, although we will add more functionality for networked offices in the future.

Parental control (in computers) is obviously already an established market and a lot of our competitors already implement these features. We’ve looked at the market leader and other applications in the industry to decide how we can match and even improve on what’s already out there, and we think we’ve got something pretty special in the pipelines.
parental control software Of course the first thing we asked ourselves is what parents want from parental control at the most basic level. I’m sure all parents will agree that it’s safety, which we bare in mind at every stage in the development of the feature.

Blocking and Filtering is the bulk of parental controls and it’ll work like this; Every time a web page is loaded it’ll be scanned by Gecko Monitor before it’s shown. If there are words or images that appear inappropriate the web page will be blocked and will show a ‘locked’ splash screen instead of the website. But how does Gecko Monitor know what’s appropriate and what’s not? That’s up to you.

Behind the scenes we’ll have an extensive, comprehensive keyword list, sorted into categories that Gecko Monitor will check through when scanning a page. We’ll have suggested levels of filtering for different age groups and you can even add and remove keywords and phrases yourself. We’ll also include a setting for the youngest age group that only allows a select handful of sites (a children’s network) and block everything else.

The development of parental control is in its infancy at the moment so we’ve got a lot of work to do but we’re hoping to release the first version of the new Gecko Monitor within the next 4 months. Are main aim at this time is to create a program that’s an industry leader, a comprehensive tool that’s flexible and reliable. If you have any ideas, comments, requests or anything else you’d like to discuss with us please don’t hesitate to get in touch, we’d love to hear from you!

If you haven’t tried Gecko Monitor yet take a look at the free trial, available here.

Setting Up Gecko Monitor Remote Email Reporting

Tuesday, September 25th, 2012

To set up remote email reporting make sure ‘Send logs via E-Mail’ is checked and enter the email address you would like to send the reports to in ‘Send mails to:’

You will need to enter your SMTP details to allow Gecko to send the reports. If your email account is with Gmail you can leave the settings as they are and enter your email address and password. If you use a different email service please use the settings below. Gecko Monitor needs this information because it uses your account to send and receive the logs, so that no sensitive information is sent via us.

IMPORTANT: If you have entered all of your credentials and you are not receiving the test email, please set up a new Gmail account (http://www.gmail.com) and use that. Older email accounts sometimes block the sending of third party emails.

If you’re uncomfortable with entering this information you can set up a new free email account with gmail or hotmail and use that to send the reports. 

If your email account is with Gmail the settings should be:

SMTP server: smtp.gmail.com | SMTP port: 465 | Username: Your email address| Password: Your email accounts password

If your email account is with Hotmail the settings should be:

SMTP server: smtp.live.com | SMTP port: 587 | Username: Your email address | Password: Your email accounts password

If your email account is with Yahoo the settings should be:

SMTP server: smtp.mail.yahoo.com | SMTP port: 995 | Username: Your email address | Password: Your email accounts password

Remember to click ‘Send test mail’ to check your settings and check for email in your inbox. The reports will be attached to the mail as an attachment.

If you’re still not receiving the reports, Windows Firewall maybe blocking Geckos email function. Please follow these instructions to add Gecko to the Firewalls allowed list:

1. Open the control panel by going to ‘My Computer’ then ‘Control Panel’. Once there open ‘Windows Firewall’

2. Click ‘Allow an app or feature through Windows Firewall’ (This option may be phrased differently depending on your version of Windows)

3. Click ‘Change settings’ followed by ‘Allow another app…’ (again this maybe phrased differently)

4. Click browse…

5. Browse to:

C: > Windows > SysWOW64 > Catroot > {GEC0AA…
or if using 32bit Windows: C: > Windows > System32 > Catroot > {GEC0AA…

and click ‘Open’

6. Click ‘Add’

7. Click ‘Ok’ and you’re done. Now go back to Gecko Monitor and try sending a test email.

If you’re still having issues please contact us.

 

Add Keylogger to AVG Exceptions

Friday, September 21st, 2012

If you’re having issues with Gecko Monitor or any other Keylogger and are using AVG, you’ll want to add the Keylogger to the anti-virus exceptions list. This should also help if you’re having trouble sending logs via email. To add a program to the AVG exceptions list follow the instructions below:

1. Right click the AVG logo (the Yellow, Blue, Green & Red) square in the bottom right hand corner of your task bar.

2. Click ‘Open AVG User Interface’

3. Click ‘Tools’, followed by ‘Advanced Settings…’

AVG screen shot 1

4. Click the ‘+’ symbol next to ‘Resident Shield, followed by clicking ‘Exceptions’

AVG screenshot 2

5. Click ‘Add Path’

AVG screenshot 3

6. Now navigate to your Keyloggers folder and click OK to add the entire folder to the exceptions list. If you’re using Gecko Monitor (you really should be! If you’re not you can download the free trial here) the folders path is:

C: > Windows > SysWOW64 > Catroot > {GEC0AA…

or if you’re using 32 bit Windows and can’t find the above folder:

C: > Windows > System32 > Catroot > {GEC0AA…

Remember to add the entire folder to the exceptions list.

Child Internet Safety Facts

Wednesday, August 8th, 2012

Child Internet Safety Facts

Monitoring An Office Computer

Wednesday, July 25th, 2012

We’re all well aware of the distractions office workers now face on a daily basis. Facebook, Twitter, Youtube and an endless array of entertainment and games are available to us 24/7 at the click of a mouse. To many, this may be a sign of productivity levels dropping at work, and in a lot of cases this is certainly true. This is one reason you may want to start monitoring an office computer.

An other reason might be a bit more sinister. Stealing, pornography or a complete lack of regard for work might mean you need proof before action is taken on the out of line individual. Whatever the reason for wanting to monitor an office computer, these days it’s easily achievable, with some companies monitoring all their computers whatever the situation.

Office Computer Monitoring

Gecko Monitor, is an all in one monitoring solution for monitoring any computer. It’s main function is stealthy computer monitoring, meaning it’s perfect for monitoring one computer without it’s user knowing. If you’re wondering about whether this is legal or not, the general law is ‘you can monitor a computer that you own’. This varies from state to state and country to country so check your local laws. There’s an interesting thread that goes into more detail on the issue here:

http://askville.amazon.com/legal-computer-monitoring-software-state/AnswerViewer.do?requestId=11071111

Some people also have an ethical issue with this type of software. To those people I always say it’s not the software but what you do with it. When it comes to office productivity and suspicions of malpractice, it’s your company at risk and you have every right to protect it.

Gecko Monitor is a low cost application that provides all round monitoring. The software monitors keystrokes, applications, websites visited, documents opened and deleted, printed documents and takes screenshots at set intervals or when a new window becomes active. All of this is fully customizable and the software runs in complete stealth mode (or, if you choose, with an icon in the tray) meaning there’s no sign that the software is running.

Logs can be checked at the end of the day with a secret key combination and password, or can be emailed to you at set intervals. We think Gecko Monitor is perfect for monitoring an office computer but don’t take our word for it – download the free trial now by heading to our home page.

Monitoring Your Childs Computer – Ethical & Moral Implications

Tuesday, July 10th, 2012

One of the questions I receive on a regular basis is to do with the ethical and moral issues of monitoring another persons internet activities. It’s definitely a hot issue and one that deserves consideration. For me, it depends on the person and the situation, and today we’re looking at monitoring your own childs computer.

Of course, there is no right or wrong answer in this – everyone’s moral compass points in a slightly different direction. The first thing to bare in mind though, is the law in your area. Nine times out of ten the law says you can monitor a computer IF you own it OR if you have the owners permission. You will almost always be able to monitor your own child’s computer, but it’s always a good idea to check up first.

Child at Computer

Another consideration is the reason you’d like to monitor your child’s computer. If the reason is resolvable without using monitoring software, then you might what to take that route rather than risk the fallout of using the software. An example of this may be playing too many games. If though, you think your child is getting into something more serious (pornography or dangerous chat rooms are a couple of examples) and they’re denying it or not talking to you about it, then monitoring software may be the way to go.

As mentioned before, you have to make your own mind up as to whether you are doing the right thing by your child. If you think the activity their doing behind your back could be worse for them in the end than the argument or loss of trust you may get from monitoring them, then use the software.

If you do decide to use monitoring software, you can install the software on the computer when they’re out quickly and simply. Once this is done you can either check the reports on they’re computer whenever they’re out, or get the reports emailed to you remotely. Gecko Monitor can monitor screenshots, keytrokes, websites visited, applications used, document activity, printer activity and more, so you can see exactly what’s been going on on the target computer.

What do you think of the moral and ethical implications of monitoring your child’s computer? Would you do it? And under what circumstances? Let us know in the comments. If you’d like to download a free trial of Gecko Monitor click here.