Sometimes it is important to know what is happening with the computer in your absence. Who and what is doing on it, which sites and programs are included. All this can be reported by special spyware.

Spying on anyone is not good, to say the least. Or even criminally punishable (violation of the right to confidentiality and all that) ... However, sometimes it does not hurt to know, for example, what your child is doing at the computer in your absence or what the employees of your organization are doing when there is no boss. Maybe they are following you?

Computer and mobile devices have long been exposed to the dangers of all sorts of viruses. However, there is a class of software that, while not being malicious, can perform the same functions as, for example, Trojans - keep a log of application launches in the system, record all keystrokes on the keyboard, periodically take screenshots, and then send all the collected information the one who installed and configured user tracking.

As you understand, today we will talk about spyware, their work and methods of detection.

Differences from viruses

In the field antivirus solutions a class of spyware is known as "spyware" (from the English "spy" - "spy" and abbreviated "software" - "software"). In principle, some of the applications that will be discussed below are perceived by antiviruses as malicious, in fact, they are not.

What is the difference between real spyware and computer tracking software? The main difference here is in the scope and method of operation. Spyware viruses are installed into the system without the knowledge of the user and can serve as a source of additional threats (data theft and corruption, for example).

Spyware programs for monitoring a computer are installed by the user himself in order to find out what another user is doing on the PC. At the same time, the user himself may be aware that they are being monitored (for example, this is done in some institutions in order to record the working hours of employees).

However, in terms of operating principles spyware, in fact, are no different from all sorts of trojans, keyloggers or backdoors... So, we can consider them to be some kind of "defector viruses" that have switched to the "bright side" and are used not so much to steal information from a PC, but to control his works.

By the way, in the West, the practice of implementing tracking software on users' computers corporate networks and on home PCs is quite common. There is even a separate name for such programs - "tracking software" ("tracking programs"), which allows, at least nominally, to separate them from malicious spyware.

Keyloggers

The most common and, to a certain extent, dangerous type of spyware are keyloggers (from the English "key" - "button" and "logger" - "registrar"). Moreover, these programs can be either independent viruses that are introduced into the system, or specially installed tracking utilities. There is, in fact, no difference between them.

Keyloggers are designed to register all button presses on the keyboard (sometimes also the mouse) and save the data to a file. Depending on how each specific keylogger works, the file can simply be stored on a local hard drive or periodically sent to someone who is spying.

Thus, without suspecting anything, we can "give" all our passwords to third parties who can use them for any purpose. For example, an attacker can hack into our account, change access passwords and/or resell them to someone...

Fortunately, most keyloggers are quickly detected by most antiviruses, since they conduct suspicious interception of data. However, if the keylogger was installed by the administrator, then most likely it will be included in the exceptions and will not be detected...

A prime example of a free keylogger is SC-KeyLog :

This keylogger, alas, is detected by the antivirus at the download stage. So, if you decide to install it, temporarily disable protection until you add the necessary files to the "white list":

  • program executable file (default: C:\Program Files\Soft-Central\SC-KeyLog\SC-KeyLog2.exe);
  • executable file of the tracking module, which will be created by you in the specified folder;
  • a library (DLL file) for hidden data processing, the name of which you also set at the settings stage and which is stored by default in the C:\Windows\System32\ folder.

After installation, you will be taken to the setup wizard. Here you can set the email address to which the data files should be sent, the name and location for saving the executable modules for intercepting keystrokes mentioned above, as well as the password required to open the logs.

When all the settings are done and the keylogger files are included in the list of trusted antivirus programs, everything is ready for work. Here is an example of what you can see in the log file:

As you can see, SC-KeyLog displays the titles of all windows that the user works with, mouse button presses and, in fact, the keyboard (including service keys). It should be noted that the program is not able to determine the layout and displays all texts English letters, which still need to be converted into a readable Russian-language form (for example, ).

However, keylogger functions can be hidden even in popular non-specialized software. A vivid example of this is the program for changing the layout of the text Punto Switcher:

One of additional features of this program is the "Diary", which is activated manually and, in fact, is a real keylogger that intercepts and remembers all data entered from the keyboard. At the same time, the text is saved in the desired layout, and the only thing missing is the interception of mouse events and pressing special keyboard keys.

Plus Punto Switcher as a keylogger in that it is not detected by antivirus software and is installed on many computers. Accordingly, if necessary, you can activate tracking without installing any software and additional tricks!

Complex spies

A keylogger is good if you only need to know what the user enters from the keyboard and what programs he launches. However, these data may not be sufficient. Therefore, more complex software complexes for comprehensive espionage. Such spyware may include:

  • keylogger;
  • clipboard interceptor;
  • screen spy (takes screenshots at specified intervals);
  • program launch and activity recorder;
  • sound and video recording system (if you have a microphone or webcam).

To better understand how such programs work, consider a couple of free solutions in this area. And the first one will be free. Russian language system observations under the name (attention, antiviruses and browsers can block access to the site!):

Program features include:

  • interception of keyboard keystrokes;
  • taking screenshots (too often by default);
  • monitoring running programs and the time of their activity;
  • PC activity monitoring and account user.

Alas, this complex for tracking a PC is also detected by antiviruses, therefore, to download and install it, you must first disable protection. During installation, we will need to set a keyboard shortcut to call the program interface, as well as a password for accessing the collected data. Application Data\Softex) and you can activate the protection back.

Softex Expert Home will start in the background and will not create shortcuts or active icons anywhere. It will be possible to detect its work only by pressing the combination of hot keys you specified. In the window that appears, enter the access password, first of all go to the "Settings" section on the "Screenshots" tab and increase the minimum interval between shots, as well as the timer interval (by default 2 and 10 seconds, respectively).

To monitor your home computer, such a spy is enough. In addition to the features already mentioned above, Expert Home has a remote statistics viewing function that allows you to view logs via the Internet. To activate it, just click the connect to the server button in the "Internet monitoring" section, and then wait for the computer ID and access password to be issued on the developers' website:

It is worth clarifying that in the free mode of operation, statistics are stored on the server for only one day. If you want to access a longer period, you will have to pay from 250 (7 days) to 1000 (30 days) rubles per month.

Another free comprehensive program for monitoring your computer is:

Despite the fact that the word "keylogger" appears in the name of the program, in fact there are much more possibilities in it. Among them:

The program itself is not detected by the antivirus, however, with active heuristic algorithms, its "suspicious" activity is found. Therefore, it is best to install and configure it with disabled protection.

At the installation stage, no preliminary preparation is required (the only thing you need is to choose for whom the program is being installed and whether you want to display its tray icon). However, after installation, you need to add the program folder (C:\WINDOWS\system32\Mpk by default) and its MPKView.exe executable file to the antivirus exceptions.

The first time you open the settings window. Here we can change the language from English to, for example, Ukrainian (for some reason there is no Russian ...), set our shortcut keys for the program (ALT + CTRL + SHIFT + K by default) and a password to enter the control panel.

That, in fact, is all. The main disadvantage of the free version of the program is its limitations in some aspects of tracking (not all programs are available, for example), as well as the inability to send logs by mail or via FTP. The rest is almost all good.

Spyware is not only for desktop computers, and for mobile platforms. If you want to know what your child is doing on a tablet or smartphone, you can try using the free multi-platform tracking system KidLogger.

Sniffers

The last, and most insidious, means of espionage can be the so-called sniffers (from the English "sniff" - "sniff out"). This class of programs is scientifically called "traffic analyzers" and is used to intercept and analyze data transmitted over the Internet.

With the help of a sniffer, an attacker can connect to the user's current web session and use it for his own purposes on behalf of the user himself by spoofing data packets. If you are very unlucky, then with the help of a sniffer, your logins and passwords for entering any sites where traffic encryption is not used can be "taken away" from you.

To become a victim of a sniffer, those who use one or another public network to access the Internet (for example, a hotspot WiFi access). Also under the theoretical threat may be users of corporate networks with too "enterprising" administrator.

In order for you to roughly understand what a sniffer is, I propose to consider, in the person of a representative of this class of programs, the development of the popular NirSoft team:

This sniffer is intended mainly for intercepting data packets on a local PC and serves more for good intentions (like network debugging). But its essence is the same as that of hacker tools.

A person who understands the principles of data transmission over network protocols and understands what kind of information is transmitted in a particular packet can decrypt its contents and, if desired, replace it by sending a modified request to the server. If the connection goes over a simple HTTP channel without encryption, then a hacker can see your passwords right in the sniffer window without having to decode anything!

The problem is exacerbated by the fact that earlier there were sniffers only for stationary operating systems. Today, for example, there are numerous sniffers for Android. Therefore, an attacker analyzing traffic can be practically anywhere (even at a nearby table in a cafe with free Wi-Fi! A vivid example of a sniffer for Android can be called mobile version popular sniffer WireShark:

Using this sniffer and the Shark Reader log analysis program, an attacker can intercept data directly from a smartphone or tablet connected to a public access point.

Spy Countermeasures

So we learned how the main types of spyware work. And a natural question arises: "But how can you protect yourself from surveillance yourself?" ... This is a task from the category of "difficult, but possible."

As you can see, almost all spyware is tracked by antiviruses. Therefore, the first step will be to update the anti-virus databases and your security software. In addition, be sure to open the "white list" of your antivirus package and see if it allows files with suspicious names located in system folders to work.

If you use the mentioned Punto Switcher (or its analogues), be sure to check if someone has turned on the "Diary" without your knowledge.

If neither the antivirus settings nor Punto Switcher found any suspicious parameters, you can resort to scanning the system with special virus scanners. I recommend using the programs I have personally tested and.

In addition, you can check the working this moment processes using special anti-virus task managers. An example of this can be free utility. This tool allows not only to see the names and addresses of all running processes, but also to quickly assess the degree of their harmfulness (even if it is potential).

The hardest thing is to counteract sniffers. If you cannot completely refuse to use public networks, then the only type of protection may be the use of sites that support the encrypted HTTPS data transfer protocol (most social networks now have it). If the site or service you need does not support encryption, then, as a last resort, you can organize a secure data transfer tunnel using VPN.

conclusions

As you can see, installing and setting up surveillance of any computer is not so difficult. And, you can do it completely free of charge with the help of small programs. Therefore, if you are using public networks or work on a PC that is used by several users, then theoretically there is a chance that you are already being followed.

Excessive carelessness and trust can cost you, at a minimum, losing passwords from your social network accounts, and, in the worst cases, for example, stealing money from your electronic accounts. Therefore, it is important to be guided by the principle of "trust, but verify."

If you yourself decide to install surveillance on someone's computer, then honestly you should warn the user about this. Otherwise, in case of detection of espionage, you can earn a lot of problems on your head :) Therefore, before spying, think three times well!

P.S. It is allowed to freely copy and quote this article, provided that an open active link to the source is indicated and the authorship of Ruslan Tertyshny is preserved.

After reading the headline, you will most likely think that only hackers, scammers and other dishonest people use spyware, and you will be right, but only in part: after all, sometimes circumstances force us to check people whom we must unconditionally trust.

It can be children who try not to let you in on the details of their virtual life, or even a legal spouse who spends more time on the Internet than with you.

For a boss who has a suspicion that one of his company’s employees is leaking information to competitors, the most correct solution to identify a “snitch” would be to install tracking software on employees’ computers than to hire a detective or ask your subordinates about it personally.

Or, for example, you entrusted your computer to an inexperienced user, as a result of which the system was disrupted: if an activity-tracking program is installed on the computer, it will not be difficult to find and fix the problem, because just look at its logs to understand what it was the actions that led to the failure of the computer. It makes no sense to list all the cases when the use of spyware becomes necessary, because there are very, very many such cases.

SpyGo program: master of computer spying

Today I will tell you how to discreetly track what your household members or employees of your organization are actually doing at the computer during their working hours, and will help us with this special program SpyGo is the most convenient and easy to use, but at the same time very powerful and reliable tool for secretly monitoring your computer. On the official website of the developers at the link http://spygosoft.com/download, three versions of the program are available for download, these are:

  1. SpyGo Lite
  2. SpyGo Home
  3. SpyGo Ultima

I chose last- because in addition to the abundance of monitoring functions, it has, in my opinion, a very interesting opportunity - monitoring a computer via the Internet, which we will consider in more detail a little later.

Installation

So let's start by installing SpyGo Ultima on your computer. It is optional, but desirable to temporarily disable the antivirus so that the program installs correctly on the system. We launch the installation distribution and press the big green “Quick Install” button, after which we wait a few seconds, and that's it - the program tells us about the successful installation, offers to start tracking now and create a shortcut on the desktop.

Since we want to monitor the use of the computer secretly, we don’t need a shortcut on the desktop either - so we uncheck it and in the future we will launch the program through a special keyboard shortcut, by default it is: Ctrl + Alt + Shift + Q

Get to know the interface and get started

After installation, the main window of the program appears in front of us, in which you see the “Start” button to start monitoring and the “Hide” button by clicking on which the program will disappear, that is, it will go into hidden mode, in which it will not be visible in the list of tasks manager processes and in the section installed apps, in other words, completely hide its presence on the computer.

Also from the main window, you can go directly to viewing information about computer usage, here we see three main sections, these are: “Activity Log”, “Visited Sites”, “Screenshots”. Let's consider each of them in more detail.

The Activity Log section includes information about various user actions on the computer, which is divided into categories and tabs. This will include information such as:

  • Program performance statistics
  • File operations
  • Any data that has been copied to the clipboard
  • Typed text on the keyboard
  • System events and computer uptime

The “Visited Sites” section, respectively, contains a log of visited websites, there are three tabs in the section:

  • Websites visited
  • Most visited websites
  • Requests to Yandex, Google and other search engines

I want to note that the program captures the entire history of web surfing, even if the user regularly clears it in the browser or visits sites in incognito mode.

The Screenshots section stores only screenshots. In the settings, you can set the interval and specify the events on the occurrence of which you need to take a screenshot, as well as select the quality of the shots and set a quota.

Each section has its own settings, mainly the log filtering setting. For example, you can configure the program so that it tracks only the text that was typed in a document called “Abstract.doc”, or logs only those sites that contain the word “flirting” in the title, and so on.

SpyGo Ultima allows you not only to remotely view the collected logs, enable/disable tracking and manage program settings, but also secretly connect to a computer and watch what is happening on its screen and even take pictures from a webcam in real time.

Outcome

As you can see, if a few years ago, in order to follow a person, it was necessary to hire an expensive detective, today anyone, even you yourself, can become this detective - you just need to install spyware on your computer, because computers have become such a dense part of our lives. that just a few days of computer surveillance is enough to find out almost everything about a person: his character, interests, social circle, and much more.

Spyware

Exist different kinds spyware: keyloggers, screenshots, geolocators, information collectors, Internet spies and others. Some universal programs combine several functions, which facilitates the processing of information. There are also more specific programs aimed at realizing more specific goals: audio, video surveillance of a hidden nature, guessing a password to WiFi networks, take pictures from your device's webcam, listen to conversations in popular programs(Skype, Zello, etc.), backup all information from portable media of the user, saving information from USB-drives and many others. Consider the most popular of these programs.

RealSpyMonitor

Spyware can not only monitor, but also block user access to programs and sites. Filters can be configured both by site address and by individual requests (for example, block access to all sites by the word "porn" on your home computer). There is also an option to access only allowed sites, blocking access to other Internet resources.



Realspy interface is not Russified


However, this program also has some drawbacks. One of the drawbacks is that the program does not know how to work with Russian-language operating systems at all. When removing keystrokes, hieroglyphs are recorded in log files instead of Russian characters. This is understandable, because the program is not Russified. The second drawback is the high cost of the program, which is also important.

snitch

This program is not much different from similar remote control and administration, but there is still one significant difference: it operates in a "hidden" mode. All information collected by the program is sent immediately via the Internet. This program is very convenient to use for remote surveillance of your computer or computers of your company, which can be located both in the office and with employees who work remotely at home. The program has the ability hidden installation, which can help in its installation on remote computers. A feature of the program is that even if the user does not have the Internet, the program still collects information and sends it immediately when connected to the Internet.



Snitch Interface


The program monitors all keystrokes, mouse clicks, visited sites, programs used, as well as opened and edited files. All information is systematized and provided in a convenient form: it is possible to build graphs and reports. You can find out the time spent in each program, the number of hours spent on social networks or games. And tracking file operations will allow you to monitor the safety of service information. However, there are also significant disadvantages: after installing the control module, it is very difficult to turn it off, because. it is hidden deep in the system. The same problems arise and, if necessary, remove it. Absence fine tuning tracking for each computer separately is very inconvenient, since there is no need to collect all the information about some users.

Download Snitch

power spy

The program is almost a complete analogue of Snitch, differing only in some elements. Unlike the program described above, it has the ability to upload reports to FTP server or sending by mail, and works in an absolutely hidden mode. You can call the administrator part of the program only with a pre-set keyboard shortcut.

MaxartQuickEye

A program that allows you to collect detailed information about activities performed on the computer. It will be a great help to the boss, who is faced with a difficult choice about laying off employees. By analyzing reports built on the information collected by the program, it is easy to track the time spent by each employee. Moreover, real data will be taken into account, and not just the time during which this or that program was opened. Even working programm was open all day, but all this time the user spent in in social networks, or by playing games, then all this will be reflected in the reports. Based on the information collected, you will get the real amount of working time spent by employees on work, and not just time spent at the computer, wasting pants.


Working time schedule


In addition to the function of collecting information, the program can create a list of allowed and prohibited programs for each user and limit the operation of programs by time.

MipkoEmployeeMonitor

EliteKeylogger

According to the creators of the program, EliteKeylogger easily interacts with many antiviruses. This is very convenient, because almost all antiviruses define spyware as "potentially dangerous". In addition, an important advantage of the program is that it works at a low level of the kernel in the system and in no way lowers its performance. The program, unlike other keyloggers, has a wider arsenal: there are functions for tracking files sent for printing; programs with which the user works; tracking the user's mail correspondence; saving correspondence in the most popular instant messengers (ICQ, Jabber, MSN, AOL, AIM). An equally important feature of the program is the work with user accounts of the operating system, which allows you to monitor each user separately.



Elite Keylogger


The program can send the received information by mail, copy it to a folder in local network or upload to an FTP server. Reports are stored for the period specified in the program or until the file reaches the specified size. Among the shortcomings: frequent problems with installation in operating rooms Windows systems 7 and 8. After installing the program, drivers sometimes crash on various devices, also some antiviruses block the program.

ActualSpy 2.8

A program that is no different from many other spyware programs. Collects data about the user and his system, organizes and sends information to the user over a local network or to remote server. From time to time there are problems with antiviruses, especially with Kaspersky.

Conclusion

All of the above programs help the user perform certain computer monitoring tasks. Some are broader in scope, some are more specialized. The main thing is to determine the tasks assigned to you and choose the necessary program. AT program NeoSpy all the necessary modules for monitoring the operation of the computer are provided, up to taking pictures from the webcam and geographic tracking of the computer on which the program is installed. Internet traffic tracking will help you keep track of the sites your child visits and enters search queries. And reports viewed on a computer or via the Internet will help you quickly get necessary information in a form convenient for you. It is also worth noting Mipko Employee Monitor, which signals the entered words from the list and signals the system administrator about it. Another program is Maxart Quick Eye, which can not only monitor, but also prohibit user actions. You can create black and white lists of programs. The matter remains small - to choose desired program and install. And your computer will be under control.

Personal Monitor
YOUR DECISION
for parental control

Need keylogger?

2 500 000 . That is how many people (and this is more than the population of the whole of Latvia, for example) have chosen the Mipko Personal Monitor program as a keylogger. Why?

For at least 9 reasons:

Protection for your child

personal monitor for windows

Free version
for 3 days

Video review about Mipko Personal Monitor by Alexander Medvedev

Our proprietary guarantee for Mipko Personal Monitor

We guarantee that you will be 100% satisfied with Mipko Personal Monitor keylogger. After all, you can check all the features of the program in action for free - for this you have 3 days.

Well, if for some reason you are disappointed in Mipko Personal Monitor after switching to a paid version, then within 7 days after the purchase we will refund your money.



How Mipko Personal Monitor works

No matter how you want, but, for example, it is quite difficult to “block” a child’s access to dubious resources beyond their age. In addition, with a little digging on the Internet, inquisitive youth will find a way to get around any obstacles.

If you are worried about your children and want to know what sites they visit, where, with whom and what they are talking about, then Mipko Personal Monitor is the best solution. Why?

The program does not show itself in any way on the computer. The user is not even aware of its existence. At the same time, Mipko Personal Monitor collects a complete report on his actions and records everything that happens. What does it look like?

For example, as soon as your child logs in to VKontakte or logs out to Skype, Mipko Personal Monitor immediately captures all his actions. For example, it records voice calls, saves the history of correspondence, records pages viewed, and so on. You receive the relevant reports on your email.

In addition, all copies of the reports are stored on the computer's hard drive. However, a person who does not know about Mipko Personal Monitor will not find them. After all, the corresponding folder is hidden very deep, and the reports themselves are stored in encrypted form, and only Mipko Personal Monitor can read them.

“I have been using your program for almost a year - it has shown itself to be a very reliable tool with which I have never had any problems. We are also pleased with the performance of the program - it works almost imperceptibly.

Vitaly Makushev

Simplicity and elegance

Mipko Personal Monitor is a home keylogger. It has no extra features that are in demand. corporate clients, but absolutely meaningless on a home computer.

As a result, the program interface itself turned out to be very simple and understandable. Like the iPhone, which even a person far from technology will understand in 5 minutes. At the same time, the possibilities of Mipko Personal Monitor are as wide as possible and will more than satisfy even the most demanding user.

“I have been using your program for a long time. I like the interface and functionality of the program, and most importantly - its performance. I also see that you have not abandoned this project, updates and corrections are constantly being made. For which special thanks to you.

Mikhail Zinoviev

5 more arguments in favor of Mipko Personal Monitor


  • - If Mipko Personal Monitor has a crash or a conflict with an antivirus, the program will still not impersonate or compromise you.
  • - Mipko Personal Monitor has a completely Russian-language interface and technical support.
  • - You are not left alone with the program, but receive any help and support from us even during free testing.
  • - You decide how much hard disk space to allocate for storing Mipko Personal Monitor recordings, and this limit will never be exceeded.
  • - You always know with whom and what your child or loved one is talking about, as well as to whom he makes appointments.

“Before I started using it, I tried many alternative keyloggers (I don’t remember the names anymore). Your program attracted me with its ease of use and visibility of the results.”

Sergey Minaev

Mipko Personal Monitor and antiviruses


Legally, Mipko Personal Monitor is not spyware or malware software classification of antiviruses. In essence, this is an observer program that monitors what is happening on the computer and does not save any personal user data.

At the same time, only the administrator (owner) of the computer can install Mipko Personal Monitor by entering the appropriate password. This provides the program with legality and legitimacy from the point of view of the vast majority of antiviruses. As a result, they do not react in any way to Mipko Personal Monitor.

However, some antivirus programs(no more than 5%) may interfere with the installation and operation of Mipko Personal Monitor. Then just let us know and we will send step by step instructions how to make Mipko Personal Monitor and your antivirus compatible.

“I am glad that the program is hidden, does not load the computer and works completely offline.”

Do you already have these questions?

How to deal with the safety of personal data?

Mipko Personal Monitor does not collect personal data and, moreover, does not send it to us. All information is stored on your computer and sent to you by email. At the same time, all letters go directly, bypassing our servers.

I'm with a computer on you, can I install Mipko Personal Monitor?

Yes, you can. The program interface is extremely simple. You literally need to press just two buttons and follow detailed instructions. In addition, we are always ready to provide any assistance in this matter.

What should I do if I have problems with Mipko Personal Monitor?

Contact our support team and we will quickly resolve all issues.

“I have been a user of your program for quite some time now. for a long time. I like the fact that the program has practically no analogues, helping out even in the most difficult cases. I have a son, and it is very important for my wife and I to know in what direction his interests are developing.