
PC Activity Monitor est une famille de 3 keyloggers :
- PC Activity Monitor Lite
- PC Activity Monitor Net
- PC Activity Monitor Pro
PC Activity Monitor is an ultimate invisible and undetectable easy-to-use monitoring and surveillance tool for both networked and personal PCs. It is professional software that captures all users activity on the PC. All data collected by the monitoring are saved to encrypted log file.
The program runs completely hidden in the background so you can monitor whenever you want. Stealth technology ensures that PC Activity Monitor Pro is completely hidden from everyone except you. Only you can launch or delete PC Activity Monitor Pro. This lets you secretly monitor anything viewed on your computer while you are away. This process goes on undetected and logs a considerable amount of data. Simply install the agent to the PCs and within seconds, you'll be monitoring your networked computers. Log file can be optionally sent via e-mail to specified address (or saved to specified shared resource in LAN environment) for further inspection and analysis. The important advantage of PC Acme Pro is an ability to save log files in special database for further analysis and retrieving information by specifying a search condition.
Even when parents are outside of the home they can remotely monitor children's PC activity using this software. A security service could monitor employee's PC activity from any Internet host in the world to prevent industrial espionage. For local Intranet networks a system administrator can monitor correctness of user's PC activity and restore activity history in any case of problems. Government, law enforcement and investigative agencies can gather critical intelligence data and evidence of criminal PC activity. It is a powerful management tool for companies, which want to increase their productivity and profitability.
Key product features:
* Windows 95/98/ME/NT/2000/XP OS platform supported;
* Extremely easy setup;
* New unique anti-detection technology (Hides Itself);
* New stealth Log-file sending technology;
* New Log Analyzer (easy understanding report);
* Interception:
o Keystrokes;
o International keyboards;
o DOS-box and Java-chat keystrokes;
o System logon passwords (9x/NT/2K/XP);
o Toutes les conversations de type "Chat" (sur ICQ, Yahoo, AIM, etc.);
o Tous les clics avec la souris;
o Toute l'activité fichier;
o Visited URLs;
o Clipboard copy/paste;
o Running applications;
o Opened windows (titles and content);
o Software install/uninstall;
o etc.
* Unique stealth-technology:
o Invisible log-file;
o Invisible executable files;
o Invisible in system registry;
o Invisible in task manager;
o Invisible in Add/Remove Programs Menu;
o etc.
* Strong Log-file protection;
* Strong passwords protection;
* Installation packet fits into 3.5" floppy;
* Configurable nag-screen.
La surveillance est extrêmenent paramétrable et certains objets peuvent être exclus afin de ne pas produire d'interminables logs stériles.
Il est possible de créer aisément des groupes d'objets surveillés auxquels vous donnez des noms quelconques afin de favoriser des analyses ciblées des logs. La création, l'édition et la suppression des groupes est aisée dans une fenêtre à 2 volets permettant d'introduire ou de sortir très simplement un objet d'un groupe. Par defaut tous les objets sont dégroupés et peuvent être analysés individuellement.
C'est surtout l'utilitaire d'analyse des fichiers de log, Log-file Analyze Subsystem, qui importe dans PC Activity Monitor, c'est à dire la version Pro du produit, sinon le produit, extrêmement puissant au demeurant, est inexploitable car la visualisation "en vrac" des logs (SMART log-file viewing) incite à prendre des actions dans un laboratoire fabricant de l'aspirine. Ce "Log-file analyze subsystem" est un outils d'analyse et de présentation, impressionant, très paramétrable. Il produit un véritable site Web à la volée, visualisé immédiatement, d'une manière très agréable dans votre navigateur par défaut.
Bien entendu, l'enregistrement des frappes au clavier permet de révéler les mots de passe.
Tableau comparatif entre les 3 produits:
|
PC Acme Lite |
PC Acme Net |
PC Acme Pro |
Interception: |
|
|
|
Keystrokes; |
YES |
YES |
YES |
System logon passwords; |
YES |
YES |
YES |
DOS-box keystrokes; |
YES |
YES |
YES |
Java-chat keystrokes; |
YES |
YES |
YES |
Chat conversations; |
YES |
YES |
YES |
Mouse clicks; |
YES |
YES |
YES |
File activity; |
YES |
YES |
YES |
Visited URLs (Web-sites); |
YES |
YES |
YES |
Clipboard copy/paste |
YES |
YES |
YES |
Running applications; |
YES |
YES |
YES |
Opened windows (titles); |
YES |
YES |
YES |
Opened windows (content); |
YES |
YES |
YES |
Mouse clicks; |
YES |
YES |
YES |
Software install/uninstall; |
YES |
YES |
YES |
Stealth-technology: |
|
|
|
Invisible log-file; |
YES |
YES |
YES |
Invisible executable files; |
YES |
YES |
YES |
Invisible in system registry; |
YES |
YES |
YES |
Invisible in task manager; |
YES |
YES |
YES |
Invisible in Add/Remove Programs Menu; |
YES |
YES |
YES |
Security: |
|
|
|
Strong Log-file protection; |
YES |
YES |
YES |
Strong passwords protection; |
YES |
YES |
YES |
Installation packet fits into 3.5" floppy; |
YES |
YES |
YES |
Usability: |
|
|
|
Extremely easy setup; |
YES |
YES |
YES |
Windows 9x/ME/NT/2k/XP supported; |
YES |
YES |
YES |
Configurable nag-screen; |
YES |
YES |
YES |
Easy understanding report; |
YES |
YES |
YES |
Distinctive features: |
|
|
|
SMART log-file viewing; |
YES |
YES |
YES |
Send log-file to e-mail |
NO |
YES |
YES |
Send log-file to local network |
NO |
YES |
YES |
Analyze several log-files |
NO |
NO |
YES |
Log-file analyze subsystem |
NO |
NO |
YES |