Monitor Any PC from Anywhere!
The first software of its kind... Realtime-Spy allows you to remotely install the software on any computer as well as view the log files from anywhere in the world via your own personal Realtime-Spy webspace!
Realtime-Spy does not require IP addresses and does not create a direct connection with the PC you are monitoring! Once installed all log files are uploaded secretly to your personal Realtime-Spy account on our webserver. This enables you to view reports in real-time from anywhere in the world.
Click here to read how Realtime-Spy works
Click here to read Realtime-Spy's Legal Requirements
Realtime-Spy has a very large list of features. Below is a list of Realtime-Spy's extensive features, organized by category for easy browsing. Click on a category to view its feature-set.
| Remote Installation and Remote Access
Realtime-Spy allows you to monitor any PC from anywhere - without needing to have physical access to that PC! Realtime-Spy is remotely installable and can be installed invisibly.
- Remote Installation and Removal
Remote Installation without physical presence needed for installation. Realtime-Spy can later be uninstalled and permanently disallowed from running on a remote computer, again without physical interaction with the remote computer.
Click here to Read How it Works!
- Logging Access Anytime, Anywhere
24/7 access to the monitored PC, from any location via your personal website address given to you after you purchase! Activity logs are updated every half-hour for constant review.
- Centralized User Logging and Tracking
Log and record MULTIPLE PC's from ONE REMOTE LOCATION without any extra configuration - just click what user names you want to view logs for! Usernames are categorized by what PC they are logged under for easy user selection. [see screenshot]
- Works on Various Internet Connections
Realtime-Spy can monitor any PC regardless of its Internet connection. Most other remote deployable monitoring solutions will not work behind a hardware firewall, router, LAN, or if they are on a dialup connection - but Realtime-Spy will! No matter what Internet connection the remote PC uses, you will be able to view logs from your Realtime-Spy webpage.
- Advanced Stealth and Cloaking
Realtime-Spy runs in COMPLETE STEALTH and cloaks itself to hide from the remote user! The file you send to the remote user is able to be discarded and deleted - without affecting Realtime-Spy's monitoring process! Realtime-Spy is also invisible in the Windows task manager on all Windows platforms!
back to top
| Surveillance and Monitoring Features
Realtime-Spy can record nearly everything a user does on their PC - from keystrokes, to website visits, to printer activity and files opened! Realtime-Spy's activity logging will give you an in-depth, detailed look at what users are doing on your computer.
- Keystrokes Typed
Log all keystrokes typed by the user. Logs are automatically pre-formatted from backspaces for easy web viewing via your secure Realtime-Spy webspace.
- Email Forwarding (Realtime-Spy PLUS only)
Have all emails that a user sends and receives forwarded to your own private email account for later viewing. Now you can see all email activity that is going on when you are not around.
- Desktop Screenshots
Log screenshots of the active window the remote user is working in and interacting with.
- Websites Visited
Log all websites visited by the user. Realtime-Spy supports all the popular browsers (AOL, IE, Netscape, Mozilla, Opera, etc).
- Internet Connections
Log all internet connections made and attempted by the user. Logs include the remote host/port and local host/port.
- Windows Opened
Log all windows opened and used by the user.
- Chat Conversations
Log both sides of all ICQ/MSN/Yahoo!/AOL/AIM messenger conversations!
- Applications Ran
Log all applications and programs executed by the remote user.
- Print Jobs Executed
Log all print jobs executed by the remote user.
- File Usage
Log all files and folders created and deleted by the remote user.
- Documents Viewed
Log all files and documents viewed by the remote user.
- System Information
Record and monitor system information on the remote machine: uptime, memory, ram, and more. You can also remotely shutdown, reboot, restart, logoff, or freeze the remote PC as well!
- System Shutdowns and User changes
- E-mails typed
- Passwords typed
back to top
| Security and Stealth Features
Realtime-Spy is built with security in mind since it is remote based. Realtime-Spy can operate in complete stealth, can be deployed remotely, and is password protected from outside users. Only you can access the remote PC.
- Complete Stealth
Realtime-Spy is undetectable to all users. Using minimal PC processing cycles, Realtime-Spy is not visible in any way to the user, and records and stores all logs without any user notification. Realtime-Spy cloaks itself to hide from the remote user, so the original file you deploy can be deleted - yet the PC still stays monitored! Realtime-Spy is also invisible in the Windows Task Manager.
Realtime-Spy can be remotely deployed easily with just a few clicks and minimal user configuration.
- Email Deployment: simply send your configured Realtime-Spy module to the remote PC. The user only has to run the attached file - they do not have to respond or send you any response to start monitoring - and they will not know they are being monitored! (optional splash notice available for non-stealth remote installs)
Extra-Secure Email Deployment when combined with our Stealth Email Service!
- LAN/Network Deployment: Easily deploy Realtime-Spy over a network via network shares or logon scripts. No user interaction is needed!
- Secure Password Protection
All your logs are password protected via secure web encryption. Only YOU can access your secure log webspace to view logs! Realtime-Spy does not put your monitored data at risk - as other remote monitoring tools do - by allowing direct connections to the remote PC for data retrieval: all data is securely stored on our servers for viewing ONLY BY YOU.
- 24/7 Real-time Monitoring
Realtime-Spy will not stop monitoring if the user reboots - it will ALWAYS record their activities.
- Basic Remote Administration
Realtime-Spy allows you to remotely shutdown, restart, logoff, freeze, and lockdown the remote PC via your administration area!
back to top
Realtime-Spy is very easy to use. All activity logs and remote computers can be viewed using your web-browser from any Internet-connected location. Setup is a breeze with our installation guide.
- Easy to use Web Interface
Realtime-Spy's web interface is extremely easy to use - just point and click the logs you want to view!
- Easy Log Management
Realtime-Spy's web interface allows you to clear individual logs, all logs, or entire users from your webspace in seconds!
- Log Archiving
Realtime-Spy comes with an easy to use archive utility that allows you to download logs from your webspace for local log viewing and management.
- Easy to setup!
Realtime-Spy is extremely easy to setup and deploy - just enter in your username/password and you are ready to go!
- Accessible Anywhere!
Realtime-Spy is accessible from any web-browser, from any location. Just access your personal web-space!
- Remote Uninstall
Do not want Realtime-Spy running anymore? You can remotely uninstall it via your Realtime-Spy administration area.
- Searchable Logs
Quickly search the activity logs for keywords!
back to top
- Windows NT4, 200x, XP, or Vista
- Pentium Class PC (133mhz or higher)
- 3MB Hard disk space
"Love your product. Wanted you to know that I tried 6 different software packages for my home PC and yours is absolutely the best. I have already recommended it to 3 other people who were looking for such a product. The interface is amazingly easy and intuitive, the data which is captured far exceeded my expectations and is extremely easy to retrieve."