Posts Tagged ‘guide’

Setting Up Gecko Monitor Remote Email Reporting

Tuesday, September 25th, 2012

To set up remote email reporting make sure ‘Send logs via E-Mail’ is checked and enter the email address you would like to send the reports to in ‘Send mails to:’

You will need to enter your SMTP details to allow Gecko to send the reports. If your email account is with Gmail you can leave the settings as they are and enter your email address and password. If you use a different email service please use the settings below. Gecko Monitor needs this information because it uses your account to send and receive the logs, so that no sensitive information is sent via us.

IMPORTANT: If you have entered all of your credentials and you are not receiving the test email, please set up a new Gmail account ( and use that. Older email accounts sometimes block the sending of third party emails.

If you’re uncomfortable with entering this information you can set up a new free email account with gmail or hotmail and use that to send the reports. 

If your email account is with Gmail the settings should be:

SMTP server: | SMTP port: 465 | Username: Your email address| Password: Your email accounts password

If your email account is with Hotmail the settings should be:

SMTP server: | SMTP port: 587 | Username: Your email address | Password: Your email accounts password

If your email account is with Yahoo the settings should be:

SMTP server: | SMTP port: 995 | Username: Your email address | Password: Your email accounts password

Remember to click ‘Send test mail’ to check your settings and check for email in your inbox. The reports will be attached to the mail as an attachment.

If you’re still not receiving the reports, Windows Firewall maybe blocking Geckos email function. Please follow these instructions to add Gecko to the Firewalls allowed list:

1. Open the control panel by going to ‘My Computer’ then ‘Control Panel’. Once there open ‘Windows Firewall’

2. Click ‘Allow an app or feature through Windows Firewall’ (This option may be phrased differently depending on your version of Windows)

3. Click ‘Change settings’ followed by ‘Allow another app…’ (again this maybe phrased differently)

4. Click browse…

5. Browse to:

C: > Windows > SysWOW64 > Catroot > {GEC0AA…
or if using 32bit Windows: C: > Windows > System32 > Catroot > {GEC0AA…

and click ‘Open’

6. Click ‘Add’

7. Click ‘Ok’ and you’re done. Now go back to Gecko Monitor and try sending a test email.

If you’re still having issues please contact us.


Add Keylogger to AVG Exceptions

Friday, September 21st, 2012

If you’re having issues with Gecko Monitor or any other Keylogger and are using AVG, you’ll want to add the Keylogger to the anti-virus exceptions list. This should also help if you’re having trouble sending logs via email. To add a program to the AVG exceptions list follow the instructions below:

1. Right click the AVG logo (the Yellow, Blue, Green & Red) square in the bottom right hand corner of your task bar.

2. Click ‘Open AVG User Interface’

3. Click ‘Tools’, followed by ‘Advanced Settings…’

AVG screen shot 1

4. Click the ‘+’ symbol next to ‘Resident Shield, followed by clicking ‘Exceptions’

AVG screenshot 2

5. Click ‘Add Path’

AVG screenshot 3

6. Now navigate to your Keyloggers folder and click OK to add the entire folder to the exceptions list. If you’re using Gecko Monitor (you really should be! If you’re not you can download the free trial here) the folders path is:

C: > Windows > SysWOW64 > Catroot > {GEC0AA…

or if you’re using 32 bit Windows and can’t find the above folder:

C: > Windows > System32 > Catroot > {GEC0AA…

Remember to add the entire folder to the exceptions list.

Monitoring Your Home Computer With Gecko Monitor

Thursday, June 28th, 2012

In this blog post I’m going to outline some of the features we have in Gecko Monitor, along with what they can do for you. Gecko Monitor is an application for monitoring your computer while you’re away. You can use it to monitor your kids computers, your employees computers or your personal computer.

Geckos feature set is powerful, stealthy and comprehensive. We offer an all in one solution for monitoring all aspects of activity and it’s all done in complete stealth. Once Gecko has been installed you can choose whether you monitor all users of the target computer, whether Gecko runs silently on start up and whether you want users to know they’re being monitored by adding an icon to the tray. These settings, along with a host of others are all configurable from the settings menu.

The first time you start Gecko you’ll be asked to provide a password. This password, along with a secret key combination (which can be altered if you wish) are used to re-open the user console at any time to view the reports. Alternatively, you can have the reports sent to you remotely via email. This, of course is done silently.

Once you’ve set up Gecko, you simply hit the ‘Start Monitoring’ button to begin monitoring in silent mode. When monitoring, the application will not be shown in the task manager or task bar/tray (unless you set it to be), or the add/remove programs list etc. The software is installed deep inside the Windows directory, making it almost impossible to find, even if you know what you’re looking for.

You can re-open Gecko to view the logs at any time and when you do, you’ll be presented with nine tabs running across the top of the interface. The first of which is the home tab, which shows you how long the application has been monitoring and what’s been logged. The second tab is the screenshots tab. This tab has thumbnail screenshots in chronological order which can be double clicked to enter full screen mode. The screenshots are labelled with the date and time they were taken and the active window at the time. You can move or print the screenshots if you need to.

Gecko Monitor Screenshots

The next tab is the keystrokes tab. You will see all keystrokes pressed, along with the date, time and the application they were typed in, all in an easy view drop down list. The next two tabs are the websites and applications tabs. All websites visited and applications used are listed here, along with the date and time of the visit/use.

The next three tabs all relate to file and document monitoring. The first is the printers tab, which monitors all printed documents, the printer they were sent to and the date and time. The next tab is the clipboard tab which monitors anything that’s been copied and pasted. The third is the files tab, which monitors all file and document use, including anything created, opened, saved, deleted or moved, along with the times and dates.

The final tab is the ‘Timeline’ tab. This innovate feature shows you a snapshot of everything that’s happened on a selected date. You can easily drag the timeline to see earlier or later and the window will show screenshots at the top and selective other data (applications used, keystrokes typed etc) below. You can click on any event to be taken to the corresponding tab and see a more detailed result.

All of the above can be customized as you need and once you’ve finished using the software you can quickly uninstall from inside the console to completely avoid detection. If you’re interested in seeing all these features first hand, you can download the free trial of Gecko by clicking here.