Posts Tagged ‘home monitoring’

Using a Keylogger as a Backup Tool

Tuesday, March 19th, 2013

Because keylogger programs virtually detect and store every stroke, site, instant message and email that was sent on a personal computer, it also makes for an astounding (and in some cases a saving grace) backup tool for your system.

There are many different keylogging programs and most of them allow you to monitor all the activity that goes on within your PC. Some of the software and hardware will take screenshots, track emails and instant messages, record any passwords that were used and some of the more sophisticated programs even have the ability to record the microphone activity that happened on that computer. They will also work in the event that a virus makes it way into your system and destroys the memory and encrypted information.

In cases where your system may crash, having a keylogging system that has a detailed record of all your data is a good thing. Most of the hardware and software programs now come equipped with text editors. These are nifty components built right within the hardware that will automatically create backup copies of documents that you create on your computer. Therefore in instances where you are maybe working on a research paper or business proposal and accidentally click out of your document that you forgot to save, the program has automatically been recording every key stroke and has a hard copy saved for you.

Additionally, many USB keylogger programs will save your web browsing activities and also remember and recall any sites that you have visited or searches you have entered into the web. This is handy when you need to recall some research and forgot to write down the website. Or if you are one that likes to join or subscribe to pages and blogs, but have a short memory for all those passwords, keylogging programs will also keep a steady record of all the passwords to those accounts.

Backing up

The purpose of these programs is less about spying and more about logging your applications. The software will communicate to the hardware on the PC not only password information, but it also has the ability to recall and record the titles of their windows, along with every keystroke you made to get there.

With these programs the concern that you will lose any text at all is virtually non-existent. There are functions included referred to as email clients which will keep track of any emails you send or will also keep track of your drafts. It is necessary at times to be able to have the ability to copy and paste fragments of partial texts from a website you are on and these programs can also help you do that.

The clipboard functions are also a great addition because they allow the user to copy one piece text from your board at one time instead of the entire text as a whole. You can then copy only the information you want or need to your Windows clipboard and the program will store it and make a backup copy that you can refer to at a later date or if and when you lose or crash a system.

Backing Up Your Logs

With many of the keylogger programs backing up your logs is simple. Generally the program will give you detailed instructions on how to do so and it almost always consists of burning your log into a log folder or burning the information onto a CD or USB. In some cases you can burn or save it directly to the hard drive.  Take a look at our free trial of Gecko Monitor to see how we could help you with your backing up needs.

Monitoring Your Childs Computer – Ethical & Moral Implications

Tuesday, July 10th, 2012

One of the questions I receive on a regular basis is to do with the ethical and moral issues of monitoring another persons internet activities. It’s definitely a hot issue and one that deserves consideration. For me, it depends on the person and the situation, and today we’re looking at monitoring your own childs computer.

Of course, there is no right or wrong answer in this – everyone’s moral compass points in a slightly different direction. The first thing to bare in mind though, is the law in your area. Nine times out of ten the law says you can monitor a computer IF you own it OR if you have the owners permission. You will almost always be able to monitor your own child’s computer, but it’s always a good idea to check up first.

Child at Computer

Another consideration is the reason you’d like to monitor your child’s computer. If the reason is resolvable without using monitoring software, then you might what to take that route rather than risk the fallout of using the software. An example of this may be playing too many games. If though, you think your child is getting into something more serious (pornography or dangerous chat rooms are a couple of examples) and they’re denying it or not talking to you about it, then monitoring software may be the way to go.

As mentioned before, you have to make your own mind up as to whether you are doing the right thing by your child. If you think the activity their doing behind your back could be worse for them in the end than the argument or loss of trust you may get from monitoring them, then use the software.

If you do decide to use monitoring software, you can install the software on the computer when they’re out quickly and simply. Once this is done you can either check the reports on they’re computer whenever they’re out, or get the reports emailed to you remotely. Gecko Monitor can monitor screenshots, keytrokes, websites visited, applications used, document activity, printer activity and more, so you can see exactly what’s been going on on the target computer.

What do you think of the moral and ethical implications of monitoring your child’s computer? Would you do it? And under what circumstances? Let us know in the comments. If you’d like to download a free trial of Gecko Monitor click here.

Monitoring Your Home Computer With Gecko Monitor

Thursday, June 28th, 2012

In this blog post I’m going to outline some of the features we have in Gecko Monitor, along with what they can do for you. Gecko Monitor is an application for monitoring your computer while you’re away. You can use it to monitor your kids computers, your employees computers or your personal computer.

Geckos feature set is powerful, stealthy and comprehensive. We offer an all in one solution for monitoring all aspects of activity and it’s all done in complete stealth. Once Gecko has been installed you can choose whether you monitor all users of the target computer, whether Gecko runs silently on start up and whether you want users to know they’re being monitored by adding an icon to the tray. These settings, along with a host of others are all configurable from the settings menu.

The first time you start Gecko you’ll be asked to provide a password. This password, along with a secret key combination (which can be altered if you wish) are used to re-open the user console at any time to view the reports. Alternatively, you can have the reports sent to you remotely via email. This, of course is done silently.

Once you’ve set up Gecko, you simply hit the ‘Start Monitoring’ button to begin monitoring in silent mode. When monitoring, the application will not be shown in the task manager or task bar/tray (unless you set it to be), or the add/remove programs list etc. The software is installed deep inside the Windows directory, making it almost impossible to find, even if you know what you’re looking for.

You can re-open Gecko to view the logs at any time and when you do, you’ll be presented with nine tabs running across the top of the interface. The first of which is the home tab, which shows you how long the application has been monitoring and what’s been logged. The second tab is the screenshots tab. This tab has thumbnail screenshots in chronological order which can be double clicked to enter full screen mode. The screenshots are labelled with the date and time they were taken and the active window at the time. You can move or print the screenshots if you need to.

Gecko Monitor Screenshots

The next tab is the keystrokes tab. You will see all keystrokes pressed, along with the date, time and the application they were typed in, all in an easy view drop down list. The next two tabs are the websites and applications tabs. All websites visited and applications used are listed here, along with the date and time of the visit/use.

The next three tabs all relate to file and document monitoring. The first is the printers tab, which monitors all printed documents, the printer they were sent to and the date and time. The next tab is the clipboard tab which monitors anything that’s been copied and pasted. The third is the files tab, which monitors all file and document use, including anything created, opened, saved, deleted or moved, along with the times and dates.

The final tab is the ‘Timeline’ tab. This innovate feature shows you a snapshot of everything that’s happened on a selected date. You can easily drag the timeline to see earlier or later and the window will show screenshots at the top and selective other data (applications used, keystrokes typed etc) below. You can click on any event to be taken to the corresponding tab and see a more detailed result.

All of the above can be customized as you need and once you’ve finished using the software you can quickly uninstall from inside the console to completely avoid detection. If you’re interested in seeing all these features first hand, you can download the free trial of Gecko by clicking here.