Realtime-Spy is designed for Windows 95, 98, ME, NT4, 2000 or XP. It is the latest in high-tech surveillance software that allows you to REMOTELY INSTALL the monitoring system and access the activity logs from ANYWHERE via you own personal Realtime-Spy Webspace!
remembering long IP addresses or directly connecting to the remote PC
- all you have to do is point you browser to your own Realtime-Spy website
address to view logs from any machines you deploy Realtime-Spy on! All
logs are password protected and securely stored for your
eyes only - and no worrying about waiting for the remote machine to sign-on
to retrieve its IP address to monitor it!
allows you to monitor any PC from anywhere - without needing to have physical
access to that PC!
Installation without physical presence needed for installation
Access Anytime, Anywhere
24/7 access to the monitored PC, from any location via your personal
website address given to you after you purchase!
User Logging and Tracking
and record MULTIPLE PC's from ONE REMOTE LOCATION without
any extra configuration - just click what user names you want to view
logs for! Usernames are categorized by what PC they are logged under
for easy user selection. [see
on Various Internet Connections
Realtime-Spy can monitor any PC regardless of its Internet connection.
Most other remote deployable monitoring solutions will not work behind
a hardware firewall, router, LAN, or if they are on a dialup connection
- but Realtime-Spy will! No matter what Internet connection the remote
PC uses, you will be able to view logs from your Realtime-Spy webpage.
Stealth and Cloaking
Realtime-Spy runs in COMPLETE STEALTH and cloaks itself
to hide from the remote user! The file you send to the remote user
is able to be discarded and deleted - without affecting Realtime-Spy's
monitoring process! Realtime-Spy is also invisible in the Windows
task manager on all Windows platforms!
can record nearly everything a user does on their PC - from keystrokes,
to website visits, to printer activity and files opened!
is built with security in mind since it is remote based. Realtime-Spy
can operate in complete stealth, can be deployed remotely, and is password
protected from outside users. Only you can access the remote PC.
Log all keystrokes typed by the user. Logs are automatically
pre-formatted from backspaces for easy web viewing via your secure
Log all websites visited by the user. Realtime-Spy supports all the
popular browsers (AOL, IE, Netscape, Opera, etc).
Log all internet connections made and attempted by the user.
Logs include the remote host/port and local host/port.
Log all windows opened and used by the user.
Log both sides of all ICQ/MSN 4,5/Yahoo!/AOL/AIM messenger
Log all applications and programs executed by the remote
Log all print jobs executed by the remote user.
Log all files and documents viewed by the remote user.
Record and monitor system information on the remote machine:
uptime, memory, ram, and more. You can also remotely shutdown, reboot,
restart, logoff, or freeze the remote PC as well!
Shutdowns and User changes
is very easy to use. All activity logs and remote computers can be viewed
using your web-browser from any Internet-connected location.
Stealth: Realtime-Spy is undetectable to all users. Using minimal
PC processing cycles, Realtime-Spy is not visible in any way to the
user, and records and stores all logs without any user notification.
Realtime-Spy cloaks itself to hide from the remote user, so
the original file you deploy can be deleted - yet the PC still stays
monitored! Realtime-Spy is also invisible in the Windows Task Manager.
Deployable: Realtime-Spy can be remotely deployed easily with
just a few clicks and minimal user configuration.
Deployment: simply send your configured Realtime-Spy module
to the remote PC. The user only has to run the attached file -
they do not have to respond or send you any response to start
monitoring - and they will not know they are being monitored!
(optional splash notice available for non-stealth remote installs)
Deployment: Easily deploy Realtime-Spy over a network via
network shares or logon scripts. No user interaction is needed!
Password Protection: All your logs are password protected via
secure web encryption. Only YOU can access your secure log webspace
to view logs! Realtime-Spy does not put your monitored data at risk
- as other remote monitoring tools do - by allowing direct connections
to the remote PC for data retrieval: all data is securely stored on
our servers for viewing ONLY BY YOU.
Real-time Monitoring: Realtime-Spy
will not stop monitoring if the user reboots - it will ALWAYS record
Remote Administration: Realtime-Spy allows you to remotely
shutdown, restart, logoff, freeze, and lockdown the remote PC via
your administration area!
to use Web Interface: Realtime-Spy's web interface is extremely
easy to use - just point and click the logs you want to view!
Archiving: Realtime-Spy comes with an easy to use archive
utility that allows you to download logs from your webspace for local
log viewing and management.
to setup! Realtime-Spy is extremely easy to setup and deploy
- just enter in your username/password and you are ready to go!
Anywhere! Realtime-Spy is accessible from any web-browser, from
any location. Just access your personal web-space!
Uninstall: Do not want Realtime-Spy running anymore? Remotely
uninstall it via your Realtime-Spy admin area.
Logs: Quickly search the activity logs for keywords!
can order Online and download immediately after purchase, or via phone,
fax, or postal order! All purchases also come with Lifetime Priority
Support and 60 days of free upgrades.
Monitor TWO computers instead of One
Personalized Custom Username
Powerful Email Forwarding - Have any emails sent/received on the monitored computer sent to your email address.