SpyAnywhere is a simple to use Web-based application that enables you to remotely control and log the activity on your computer. The software can run in both administrator mode and stealth mode, in order to log keystrokes, view recently accessed files or temporary histories. You may also block the user’s access to the computer.
Desktop control center, browser operational center
SpyAnywhere can run in several modes, depending on the immediate purpose you wish to embed to it. The software can be installed and run as administrator or in stealth mode. The difference between the two modes is the way the application behaves on the host system. For instance, in stealth mode, no help or documentation is available and start menu references or icons are installer either.
The desktop application displays the internal IP of the system, the server connection status and the last active connection. The software prompts you to create a master password that you can use in order to log in as an administrator to the Web-based application. The software can also run in ‘Listening’ mode, at Windows startup, recording all the opened files, logging keystrokes or saving histories.
Remote station control
Once you log in to the Web-based application, you can have full access to the selected system, even from a remote location. You simply need to connect to the same server and log in. You may view the currently opened processes, Windows applications, file system or registry startup keys.
Moreover, you can view real-time keystrokes, the current desktop, take screenshots, or view the Internet history. You may lock down the monitored station, freeze the mouse or shutdown the PC while the user unfolds their activity. You can easily restrict their access to your computer.
Monitoring, protection and control
SpyAnywhere is a suitable tool that enables you to monitor and protect your computer from the access of unauthorised users. The software can save and display several logs recorded on the monitored station, including applications, connections, conversations, keystrokes, Internet traffic, mouse clicks, screenshots, print jobs, file transfers or sent emails.