Refog Personal Monitor 184.108.40.2065
Refog Personal Monitor 220.127.116.115 Ranking & Summary
Refog Personal Monitor 18.104.22.1685 description
Refog Personal Monitor 22.214.171.1245 is well-known as a fast and powerful utility that is designed to enable you to discipline employees and monitor actions of advanced computer users.
The PC monitoring tool intercepts and logs keystrokes, cut-and-paste operations, records launched applications and Web sites visited by your employees or family members An instant alert will be e-mailed when they type one of a number of pre-defined keywords, allowing you to be fully involved even if you are far from the office.
Refog Personal Monitor helps enhance employee productivity by ensuring that you are always aware of their activities. Allowing fully silent and hidden monitoring, Refog Personal Monitor is hard to detect and impossible to remove without your authorization. Smart keystroke interception with advanced filter and search mechanisms allow you learn easily and precisely about what was typed and where.
- Keystroke recording
- Once installed and running, Refog registers all keys pressed by a user, thus acting as a keylogger. This function captures all data that has been entered by your children or an employee using a keyboard, including chats, usernames, passwords, emails, search queries and other content. In addition to key logging, Refog is also able to log clipboard text.
- Web history logging
- Even if users delete their browser's history, the informaton is retained in Refog's log database and always available via the reports function. All relevant information is collected including URLs visited, page titles and the timestamp.
- Screenshot history
- With customizable capability, Refog takes full color screenshots of a desktop screen. This ensures that the log of what is being typed by the user is backed up with visual evidence of exactly what they are doing. Without being monitored, it is often the case that employees get carried away with excessive web surfing, shopping and other personal tasks. With screenshot history, it is always possible to gather evidence if an employee is wasting the company's time. Multiple monitor configurations are supported!
- Invisible mode and password protection
- You may not want to disclose the act of PC monitoring, so Refog can work in special stealth mode, making it completely invisible even to a skilled PC user. It cannot be found in the program folder, control panel or tray. When required, the program can be revealed using a special command or hotkey. In addition, it is possible to protect Refog with a password, so users are unable to erase their logs.
- Application monitoring and file tracking
- Refog is able to record all programs executed on your PC, so it is possible to establish if your kid is playing games instead of doing his homework, an employee is wasting time offline (e.g. playing solitaire instead of working). In addition to programs, Refog stores all file operations (e.g. open, edit, copy, delete), and can reveal inappropriate interest in specific confidential documents.
- IM monitoring
- Refog is also compatible with all major instant messaging software (e.g. AIM, Facebook®,Yahoo! messenger, Skype, ICQ, Google Talk, MSN). It is not only able to log outgoing messages by a local user, but also incoming messages too.
- Email reports
- It is not necessary to gain physical access to monitored computers in order to view their logs. All reports can be delivered via email, and can be read anywhere.
- Comprehensive settings and reports
- It is possible to set the control levels of monitoring, enable/disable monitoring for given users, setup alert keywords and reports delivery, easily filter log files and much more. With this armory of tools, Refog comes preconfigured so it can be installed in just a few clicks and run with default settings, requiring no tech skills at all!
Refog Personal Monitor 126.96.36.1995 Screenshot
Refog Personal Monitor 188.8.131.525 Keywords
Bookmark Refog Personal Monitor 184.108.40.2065
Refog Personal Monitor 220.127.116.115 Copyright
Want to place your software product here?
Please contact us for consideration.