Create spyware. Tracking PC User - Free Spyware Review. What is and why keyloggers are needed

The software for tracking a computer, which I will talk about in this article, is unique in its kind, as it has many advantages that competitors do not have. It is called Expert Home 4. This is what makes this tool so special:

  • The program is completely free and works without any restrictions.
  • Interface, help and support in Russian.
  • Combines many tracking functions.
  • Works in invisible mode, starts with a password and a secret key combination.
  • Allows you to encrypt received reports and send them over the Internet.
  • The antivirus will not swear.

This computer tracking program is really very interesting and worthy of attention. Therefore, fewer words, let's get down to business!

Expert Home 4 - computer tracking software

After downloading the installation file, run it. In the first window, you need to select a language and click "Next".

Then agree to the license and click Next.

Now comes the fun part. The program for monitoring the computer will open by a secret key combination consisting of four keys. The first three are Ctrl + Shift + Alt, and the fourth is set by you. It can be any letter that you can select from the list.

In the same window there is a field in which you need to enter a password, which will be requested after entering the secret key combination.

After choosing a letter and entering a password, click Next.

Check all the data is correct and click "Install".

Wait until the installation of the Expert Home 4 program is completed, and in the last window click the "Close" button. Everything! The program has already started its work and monitors all user actions. As you will notice, no trace of the program is visible.

To start the program for tracking the computer and view its report, you need to enter a secret key combination. After that, a window will appear in which you should write down the password you thought up during installation. And then you will see the program interface - Expert Home 4 control center. It consists of two sections - "Reports" and "Additional".

Let me first consider the "Reports" section:

Keyboard. This is a keylogger, that is, there is a report on the pressing of each key on the keyboard. You can see what was written by the user and in which program. It is possible to choose the date of the report.

Screenshots. Computer tracking software periodically makes hidden screenshots screen and can be viewed here. It is also possible to select the date of the archive. In addition, you can manage screenshots using the buttons below.

Programs. Displays which programs were launched and when. You can see the title of the programs, the name of the executable file and other data useful for analysis.

Food. Here you can analyze when the computer was turned on and off.

Activity. The activity of computer users is displayed.

Now I will consider the "Advanced" block, which also consists of several important sections.

Internet monitoring. The program for tracking your computer allows you to transfer report files over the Internet in encrypted form. They can be viewed in the Softex (program developer) file storage. That is, reports can be viewed remotely. First, click the "Allow Remote Tracking" button.


Spyware is a type of malicious software (software) that performs certain actions without the user's knowledge, such as displaying advertisements, collecting confidential information, or modifying device settings. If your internet connection slows down, your browser becomes slow, or some other unusual phenomenon occurs, your computer may be infected with spyware.

Steps

Detect and remove spyware on Android device

    Remember the signs of spyware. If your internet connection drops frequently, or if you receive strange text messages, including messages from strangers, on your smartphone, the device is most likely infected with spyware.

    • Spyware often generates messages with a random set of characters or with a request to enter a specific code.
  1. Check how apps are using internet traffic. Open the Settings app and click Traffic Control. Scroll down the screen and see what traffic is being consumed by a particular application. As a rule, spyware consumes a lot of traffic.

    Create backup data. Connect your smartphone to your computer using a USB cable, then drag and drop to hDD important files (such as photos or contacts).

    • Since the mobile device and the computer are running different operating systems, the computer will not be infected.
  2. Open the Settings app and tap Restore & Reset. A screen will open with several options, including the option to reset the device to factory settings.

    Click Reset to Factory Settings. It's at the bottom of the Backup & Reset screen.

    Click "Factory data reset". The smartphone will automatically reboot and user data and applications, including spyware, will be removed.

    • Please note that resetting to factory settings will erase all user data. So be sure to make a backup important information.

    Using HijackThis (Windows)

    1. Download and install. It is a utility that is designed to detect spyware. Double click on installation fileto run it. When you have installed this utility, run it.

      • Similar software is Adaware or MalwareBytes.
    2. Click “Config”. This button is located in the lower right corner of the screen under the “Other Stuff” section. The program settings will open.

      • In the settings you can enable or disable certain functions, eg, backup files. It is recommended to create a backup if you are working with important files or software. The backup is small; Moreover, it can be deleted later (from the folder in which the backups are stored).
      • Note that the “Make backups before fixing items” feature is enabled by default.
    3. Click "Back" to return to the main menu. This button replaces the Config button when the settings window is open.

      Click “Scan”. This button is located in the lower left corner of the screen, which will display a list of potentially dangerous files. It is important to note that HijackThis will quickly scan the most vulnerable nodes of the system, so not all files on the list will be malicious.

      Check the box next to the suspicious file and click "Info on selected item". A window will open with detailed information about the file and the reason why it was included in the specified list. After checking the file, close the window.

      • As detailed information, the screen displays the location of the file, its possible use and the action that is recommended to be applied to the file.
    4. Click “Fix checked”. This button is located in the lower left corner of the screen; HijackThis will either restore or delete the selected file (depending on the selected action).

      • You can select multiple files at once; to do this, check the box next to each of them.
      • Before taking any action, HijackThis will create (by default) a backup of the data so that the user can undo the changes made.
    5. Restore data from backup. To undo any changes made by HijackThis, click “Config” in the lower right corner of the screen, and then click “Backup”. Select the backup file from the list (its name includes the date and time it was created), and then click “Restore”.

      • Backups will be kept until you delete them. That is, you can close HijackThis and restore the data later.

    Using Netstat (Windows)

    1. Open a command prompt window. Netstat is built in windows utilitythat detects spyware and other malicious files. Click ⊞ Win + R to open the Run window and then type cmd. Command line provides interaction with the operating system through text commands.

      • Use this method if you do not want to install additional software or want more control over the malware removal process.
    2. Enter the command netstat -b and press ↵ Enter . A list of processes that have access to the Internet will be displayed (may open ports or use an Internet connection).

      • In this command, the operator -b means "binary code". That is, the screen will display the active "binaries" (executable files) and their connections.
    3. Click Ctrl + Alt + Delete . The Windows Task Manager will open, listing all active processes. Scroll down the list and find the malicious process that you detected using the command line.

      Click right click mouse on the process name and select "Open file storage location" from the menu. A folder with a malicious file will open.

      Right-click on the file and select "Delete" from the menu. The malicious file will be sent to the Trash, which prevents processes from starting.

      • If a window opens with a warning that the file cannot be deleted because it is in use, return to the Task Manager window, highlight the process, and click End Process. The process will be completed and you can delete the corresponding file.
      • If you deleted the wrong file, double-click the Trash to open it, and then drag the file from the Trash to restore it.
    4. Right-click on the Trash and choose Empty from the menu. This will permanently delete the file.

    Using Terminal (Mac OS X)

      Open a terminal. In the terminal, you can run a utility that detects spyware (if, of course, there is one). Click "Applications" - "Utilities" and double click on "Terminal". The terminal provides interaction with the operating system through text commands.

      • The terminal icon can be found in Launchpad.
    1. Enter the command sudo lsof -i | grep LISTEN and press ⏎ Return . A list of active processes and information about their activity on the network will be displayed.

      • Command sudo grants root access to the subsequent command, that is, allows you to view system files.
      • lsof is short for "list of open files". That is, this command allows you to view running processes.
      • Operator -i indicates that the list of active processes should be accompanied by information about their network activitybecause spyware connects to the internet to communicate with external sources.
      • grep LISTEN - this command selects processes that open certain ports (this is how spyware works).
    2. Enter your admin password and click ⏎ Return . This is required by the command sudo... Keep in mind that while entering the password, it is not displayed in the terminal.

    3. Find out which processes are malicious. If you do not know the name of the process or it opens a port, most likely it is malware... If you are unsure of any process or port, search for the process name on the Internet. Most likely, other users have already encountered unusual processes and left feedback about their nature (malicious or harmless). If you are sure the process is malicious, delete the file that starts the process.

      • If you still have not figured out the nature of the process, it is better not to delete the corresponding file, because this may lead to the crash of some program.
      • rm Is short for “remove”.
      • Make sure you want to delete this particular file. Remember that the file will be deleted permanently. Therefore, we recommend that you create a backup beforehand. Open the Apple menu and click System settings» – « Time machine" - "Backup".
    • If HijackThis produces too many suspicious files, click Save Log to create a text file with the results, and post them on this forum. Perhaps other users can recommend what to do with this or that file.
    • Ports 80 and 443 are used by many reliable network access programs. Of course, spyware can use these ports, but this is unlikely, meaning the spyware will open other ports.
    • When you find and remove spyware, change the passwords for each accountthat you log into from your computer. Better to be safe than sorry.
    • Some mobile applicationsthat supposedly detect and remove spyware on Android devices are in fact unreliable or even fraudulent. The best way to clear your smartphone from spyware is to return to factory settings.
    • Factory reset is also an effective way to remove spyware on iPhone, but if you don't have root access to system filesmost likely, spyware will not be able to infiltrate iOS.

    Warnings

    • Be careful when deleting unfamiliar files. Deleting a file from the System folder (in Windows) can damage the operating system and then reinstall Windows.
    • Likewise, be careful when deleting files using the terminal in Mac OS X. If you think you have found a malicious process, first read the information about it on the Internet.

With viruses and the consequences of their impact on computer systems today almost all users are familiar. Among all the threats that are most widespread, a separate place is occupied by spyware that monitors the actions of users and steals confidential information. Next, we will show what such applications and applets are, and consider the question related to how to detect spyware on the computer and get rid of such a threat without harm to the system.

What is spyware?

To begin with, spyware, or executable applets, commonly referred to as Spyware, are not, in the usual sense, viruses per se. That is, they have practically no effect on the system in terms of its integrity or operability, although when computers are infected they can constantly reside in RAM and consume some of the system resources. But, as a rule, this does not particularly affect the operating speed of the OS.

But their main purpose is precisely tracking the user's work, and, if possible, stealing confidential data, replacing e-mail with the aim of sending spam, analyzing requests on the Internet and redirecting to sites containing malware, analyzing information on the hard drive, etc. It goes without saying that any user must have at least a primitive anti-virus package installed for protection. True, for the most part neither free antivirus, let alone a built-in firewall Windows full they do not give confidence in safety. Some applications may simply not be recognized. This is where a completely natural question arises: "What then should be the protection of the computer from spyware?" Let's try to consider the main aspects and concepts.

Types of spyware

Before embarking on a practical solution, you should be clear about which applications and applets belong to the Spyware class. Today, there are several main types:

  • key loggers;
  • hard disk scanners;
  • screen spies;
  • mail spies;
  • proxy spies.

Each such program has a different effect on the system, so let's see how spyware penetrates the computer and what it can do to the infected system.

Spyware penetration methods into computer systems

Today, due to the incredible development of Internet technologies The World Wide Web is the main open and weakly protected channel that threats of this type use to penetrate local computer systems or networks.

In some cases, spyware is installed on the computer by the user himself, no matter how paradoxical it sounds. In most cases, he doesn't even know about it. And everything is banal and simple. For example, you downloaded a seemingly interesting program from the Internet and started the installation. In the first stages, everything looks as usual. But then sometimes windows appear suggesting the installation of some additional software product or add-on to the Internet browser. Usually it's all written small print... The user, striving to quickly complete the installation process and start working with a new application, often does not pay attention to it, agrees with all the conditions and ... as a result, gets an embedded "agent" to collect information.

Sometimes spyware is installed on a computer in the background, disguising itself later on important system processes. There may be plenty of options here: installing unverified software, downloading content from the Internet, opening dubious email attachments, and even simply visiting some unsafe resources on the Web. As already clear, to track such an installation without special protection just impossible.

Impact consequences

As for the harm caused by spies, as already mentioned, this does not affect the system as a whole in any way, but user information and personal data are at risk.

The most dangerous among all applications of this type are the so-called key loggers, or, simply put, they are precisely able to monitor the character set, which gives the attacker the opportunity to obtain the same logins and passwords, bank details or card PIN codes, and that's all- what the user would not like to make the property of a wide range of people. As a rule, after determining all the data, they are sent either to a remote server or by e-mail, of course, in a hidden mode. Therefore, it is recommended to use special encryption utilities to store such important information. In addition, it is advisable to save files not on a hard disk (hard drive scanners can easily find them), but on removable media, and at least on a flash drive, and always together with a decoder key.

Among other things, many experts consider it the safest to use onscreen keyboard, although they recognize the inconvenience of this method.

Tracking the screen in terms of what exactly the user is doing is dangerous only when confidential data or registration details are entered. Spy just through certain time takes screenshots and sends them to the attacker. Using the on-screen keyboard, as in the first case, will not give any result. And if two spies work at the same time, then in general you will not hide anywhere.

Email tracking is done on the contact list. The main purpose is to replace the content of the letter when sending it for the purpose of sending spam.

Proxy spies do harm only in the sense that they turn a local computer terminal into a kind of proxy server. Why is this needed? Yes, only to hide behind, say, the user's IP address when committing illegal actions. Naturally, the user does not know about it. Let's say, someone hacked into the security system of a bank and stole a certain amount of money. Tracking actions by authorized services reveals that the hack was made from a terminal with such and such an IP located at such and such an address. Special services come to an unsuspecting person and send him to jail. Isn't there anything good about it?

The first symptoms of infection

Now let's get down to practice. How to check a computer for spyware if, for some reason, doubts about the integrity of the security system crept in? To do this, you need to know how the impact of such applications manifests itself in the early stages.

If for no apparent reason a decrease in performance is noticed, or the system periodically "freezes", or refuses to work at all, first you should look at the use of the load on the processor and RAM, and also monitor all active processes.

In most cases, the user in the same "Task Manager" will see unfamiliar services that were not previously in the process tree. This is only the first bell. The creators of spyware are far from stupid, so they create programs that disguise themselves as system processes, and identify them without special knowledge in manual mode just impossible. Then problems with connecting to the Internet begin, changes start page etc.

How to check your computer for spyware

As for the scan, standard antiviruses will not help here, especially if they have already missed the threat. At a minimum, you need some kind of portable version like or Kaspersky Virus Removal Tool (or better - something like a Rescue Disc with a system check before it boots).

How do I find spyware on my computer? In most cases, it is recommended to use highly targeted special programs of the Anti-Spyware class (SpywareBlaster, AVZ, XoftSpySE Anti-Spyware, Microsoft Antispyware, etc.). The scanning process in them is fully automated, as well as the subsequent removal. But there are also things worth paying attention to.

How to remove spyware from your computer: standard methods and used third-party software

You can even remove spyware from your computer manually, but only if the program is not disguised.

To do this, you can go to the programs and components section, find the application you are looking for in the list and start the uninstallation process. True, the Windows uninstaller, to put it mildly, is not entirely good, since it leaves a bunch of computer garbage after the process is completed, so it is better to use specialized utilities like iObit Uninstaller, which, in addition to removing in a standard wayallow deep scanning to find leftover files or even keys and entries in the system registry.

Now a few words about the acclaimed Spyhunter utility. Many call it almost a panacea for all ills. Let us disagree with this. It still scans the system, although sometimes it gives a false alarm. This is not the problem. The fact is that uninstalling it turns out to be quite problematic. For an ordinary user, from all the number of actions that need to be performed, his head is spinning.

What to use? You can protect against such threats and search for spyware on your computer, for example, even using the ESETNOD32 package or Smart Security with activated function "Anti-theft". However, everyone chooses what is best and easier for him.

Legalized espionage in Windows 10

But that's not all. All of the above referred only to how spyware penetrates the system, how it behaves, etc. But what to do when espionage is legalized?

Windows 10 in this regard has distinguished itself not for the better. There are a bunch of services that need to be disabled (communicating with remote Microsoft servers, using identification to receive advertisements, sending data to a company, determining a location using telemetry, receiving updates from multiple locations, etc.).

Is there 100% protection?

If you look closely at how spyware penetrates your computer and what they do afterwards, you can only say one thing about 100% protection: it does not exist. Even with the use of the entire arsenal of means in safety, you can be sure of 80 percent, no more. However, on the part of the user himself, there should be no provocative actions in the form of visiting dubious sites, installing unsafe software, ignoring antivirus warnings, opening email attachments from unknown sources, etc.

In our library of examples of detecting and neutralizing spyware, there are already a lot of articles, and we decided to classify this material.
The classification is based on the subjective assessment of our test laboratory technicians. As we plan to continue testing popular spyware in the future, we believe that this classification will help COVERT users and our website visitors better understand the place of each spyware in the mosaic of modern threats.

We give each spy three ratings:
The first is design and functionality... The higher the score, the more opportunities the program provides for data theft and user tracking.
The second is secrecy within the system... How difficult it can be to detect it on a computer. The higher the score, the better program hides himself.
Third - evaluates the protection of a spy against antispyware and the difficulty of neutralizing it... The higher the score, the more diligently the program clings to its existence on the computer and the more steps need to be taken towards it complete removal... Some programs cannot be removed by simply erasing the file folder from the disc.

- RLM: 5/5/4

VkurSe spy for secret monitoring of all user actions on the computer and sending the collected data to a special server. Provides the ability to covertly monitor the computer online, creates screenshots, intercepts keyboard input, clipboard, and many others.

- RLM: 1/1/0

Windows Spy Keylogger is a fairly classic example of a keylogger - it captures all keyboard input and saves it to log files. Has an invisible mode, practically does not consume the resources of the operating system, is easy to install and can be installed on a computer without administrator rights.

- RLM: 3/6/1

Spytector works stealthily on a computer, saves passwords entered in browsers and messengers Internet Explorer, Google Chrome, Opera, FireFox, Safari, Outlook, GoogleTalk, Windows Live Messenger and other applications. The keylogger can intercept entire chats in popular instant messengers - MSN Messenger, Yahoo Messenger, ICQ, AIM. The intercepted information is encrypted by Spytector Keylogger and sent by e-mail or to FTP server.

- RLM: 8/3/2

JETLOGGER allows you to monitor the user's computer activity, collects information about running programsah, the sites visited and the key combinations used, structures the received data and displays them in the form of charts and graphs. You can enable automatic screen capture via certain intervals time. Hides the fact of collecting information about activity on the device.

- RLM: 4/0/1

Yaware.TimeTracker is a system for tracking working hours and evaluating the efficiency of employees at the computer.

- RLM: 5/2/3

Award Keylogger is a popular spyware program that is described on many sites as a powerful real-time tracking tool with rich functionality. But we were unable to see all of the listed functionality, although we tested the latest fully functional version. The program turned out to be not much better than the average spy.

- RLM: 5/0/0

Real Spy Monitor is designed to track activity on the computer and allows you to save information about running programs, open files and windows, take screenshots, monitor which sites are visited by users, intercept and save keyboard input.

- RLM: 5/1/1

LightLogger - has a fairly standard set of functions - monitors visited websites, takes screenshots at a given frequency, intercepts keyboard input in applications, browsers and e-mail, remembers all running programs, copies the contents of the system buffer.

- RLM: 7/1/0

REFOG Personal Monitor provides full control over the system, logs any keystrokes. In addition, he periodically takes screenshots so that the observer has a complete picture of what is happening on the computer. All reports are sent to the specified e-mail. The work of the spy is invisible on the computer: he does not impersonate himself and consumes very few system resources.

- RLM: 5/3/3

TheRat can be installed on a computer using social engineering. In addition to traditional keylogger functions, the program can track actions in application windows and respond to words, as well as take screenshots of the screen each time you press the Enter key. A keylogger's feature is work on the principle of disembodied viruses.

- RLM: 6/2/1

Snitch collects data about the activity of users and transmits them to its server, from which they are already sent to the control module and displayed in its interface.

- RLM: 2/0/0

Hide Trace is a typical representative of screenshots, which monitors user actions, creating a detailed report of open windows, taking screenshots.

- RLM: 6/8/6

WebWatcher records all activity taking place on the PC: emails, messages from instant messengers, information about visited sites, activity on Facebook / MySpace and everything that the user types in real time. Captures screenshots and tracks everything search queries... All collected information is sent to special servers, where the observer can view the results of surveillance remotely.

- RLM: 6/0/2

DameWare Mini Remote Control Server allows you to connect and control remote machines via the Internet or a local network. Can covertly, imperceptibly for the observed, control all his actions.

RLM: 7/2/2

Kickidler - The program has good functionality, but it is easily detected and removed. There is a function of blocking the entrance to the secure COVERT platform, which is easily bypassed by means of a masker.

- RLM: 3/1/0

Total Spy - the interface is extremely simple, the program is small and does not affect system performance. But the functionality in the program is only basic.

- RLM: 7/8/5

PC Pandora- hides in the system and controls the entire computer and Internet traffic. Takes screenshots, receives keyboard input, actions on visited websites, emails, instant messages from instant messengers and much more collects information about the user's work. The program does not have a folder in which it stores its data. Everything is loaded into the operating system, and each new installation on the same or another computer is done with new file names.

- RLM: 5/7/4

Micro Keylogger - a well-hidden spy program that is not visible in the Start menu, in the taskbar, control panel-programs, process list, Msconfig launch list and in other places on the computer where it is possible to monitor running applications. It does not show signs of presence and does not affect the performance of the system, secretly sends a report to an e-mail or FTP server. Its activity is conducted through DLLs.

- RLM: 4/0/0

Expert Homemultifunctional program for covert surveillance and detailed recording of all actions performed on a computer with a remote tracking function, which allows you to view reports and screenshots anywhere, from any device, with Internet access.

- RLM: 7/0/0

Monitors the remote computer in real time, takes pictures of the user from the computer's webcam, records sounds in the room where the computer is installed, views file system, remotely downloads files, monitors and removes system processes, and other standard spyware functions.

- RLM: 5/1/1

System Surveillance Pro provides everything you need to monitor your PC in stealth mode. The utility logs text input, instant messages, applications used and sites visited, and also takes screenshots at a specified time interval or by event.

RLM: 3/0/0

KidLogger PRO, this is a keylogger with open source code, who can record sound from a microphone, take screenshots. Delivery of logs / screenshots is possible by mail, or to the manufacturer's website, where they can already be viewed. It can also just store logs with screenshots locally.

- RLM: 7/0/0

Remote Manipulator System - remote monitoring and control, allows you to connect to a remote computer and control it as if you were sitting directly in front of its screen.

- RLM: 6/2/1

Spy NeoSpy - a program for tracking your computer, allows you to conduct hidden monitoring of the system. Tracks all actions performed by users on the monitor screen, via the Internet from a computer, smartphone and tablet.

- RLM: 6/5/3

SoftActivity Keylogger monitors and records all user activities on the computer.
It works stealthily and unnoticed even for savvy users, no process in the task manager, no files can be seen in the system.
The configuration utility and uninstall option are password protected.

- RLM: 4/1/0

Snooper is an audio spy designed to record sounds that are picked up by a microphone connected to a computer, does not appear in the tray in recording mode, and is not visible in the process list in the Windows Task Manager. As long as the microphone does not capture sounds, the spy remains in sleep mode.

- RLM 5/0/0

The Best KeyLogger is a program that allows you to always have complete control over your computer.
The program allows you to read the entire history of actions on your computer in your absence.
With this program, you can view the chat logs, as well as mail and see which sites the user has visited.

- RLM: 5/1/1

SpyAgent is a program for complete control over user actions. Monitors system performance, including recording keystrokes, running programs, opening files, and more. Allows you to record all online activity - FTP, HTTP, POP3, Chat and other TCP / UDP communications, including visited websites. Takes screenshots, sends collected data to specified e-mail, there is a possibility remote control program.

- RLM: 6/2/0

Ardamax Keylogger - takes screenshots, intercepts clipboards and keystrokes on the keyboard. The spy has a hidden mode and it is not visible in the task manager. The program creates a log of all actions for further analysis.

- RLM: 8/1/0

Spyrix Personal Monitor allows you to conduct hidden control over any activity on your computer - in social networks (VKontakte, Odnoklassniki, Facebook, etc.), chatting and e-mail, site visits and queries in search engines (Yandex, Google). Spyrix Personal Monitor is designed for centralized monitoring of all user activities.

- RLM: 2/6/6

All In One Keylogger logs all keystrokes, including specific language characters, conversations and conversation messages, passwords, emails, clipboard information, microphone sounds, screenshots, Internet activities. The spy does not appear in running processes.

- RLM: 8/6/7

Mipko Personal Monitor - monitors activity on the computer, monitors what sites are visited on the Internet, saves all user actions to the hard disk - pressed keys, visited sites, launching applications, screenshots. Not visible when working in stealth mode standard means system and does not appear in the process list. It works absolutely imperceptibly, like an invisible one, is friendly with antiviruses and in 95% of cases remains undetected.

- RLM: 3/1/0

Free Keylogger Remote is capable of intercepting keystrokes and copied text from any application. It can also record the names of running applications, visited websites, take screenshots at a given time interval. The spy operates in invisible mode and cannot be accessed. There is a function of remote monitoring and sending daily reports by e-mail.

- RLM: 7/1/0

SpyGo is a software package for covert monitoring and tracking user activity on the computer. It is controlled remotely and allows for real-time surveillance. Works in hidden mode and remains invisible during monitoring.

- RLM: 3/1/0

The hidden agent Actual Spy is capable of monitoring all events occurring in the system: intercepting all keystrokes, determining the register and Russian layout, taking screenshots (screenshots), remembering the launch and closing of programs, monitor the contents of the clipboard, record Internet connections, register visited sites and much more.

- RLM: 5/1/1

Elite Keylogger - designed for secret monitoring of all types of user activity. The capabilities of the keylogger include tracking all types of correspondence from ICQ to e-mail, websites visited by users, typed passwords and programs used. The spy generates screenshots of the user's work screen. It can send a report on user actions to an e-mail box after a certain fixed period of time.

- RLM: 6/0/2

Using the Power Spy utility, you can take screenshots from the screen at regular intervals, record keyboard strokes, and visited Internet pages. You can also view mail messagesread with Microsoft Outlook and Microsoft Outlook Express and documents opened in Word and Notepad. The program, according to the specified parameters, sends a report to E-mail or writes it to a hidden log file.

- RLM: 6/5/5

The STAKH @ NOVETS software package is designed to track computer network enterprises. She gives complete information about each employee. Monitoring of the company's personnel can be carried out in a completely hidden mode.

- RLM: 6/0/3

StaffCop monitors running programs, applications and websites on work PCs. Intercepts messages in ICQ, Skype, e-mail and other messengers. It takes screenshots of the monitor screen, records keystrokes and much more, which is included in the concept of "computer control".

(KGB) - RLM: 7/1/0

KGB SPY is one of the most popular programs designed to spy on users personal computers... It intercepts and saves a detailed log of user actions on the hard disk, takes screenshots, records the launch of the software, etc.

- RLM: 1/1/0

Punto Switcher, designed to change keyboard layouts in automatic mode on the computer. At the same time, it can be used as a keylogger if certain configuration changes are made.