How to Monitor a Remote Computer

How to Monitor a Remote ComputerSometimes, it becomes necessary for us to monitor a remote computer in oder to keep track of the ongoing activities on it. This may be for several reasons such as to monitor an employee, catch a cheating partner or for the parents to monitor the activities of their children during their absence.

To do this, all you need is a powerful Monitoring Software installed on your computer. However, the story doesn’t end-up here itself because there exists tons of such monitoring software programs out there on the market each having different features and prices. Many of them are no more than a crap, some are overpriced while only a few are really worth buying.

In this post, I will give you a detailed information on how to monitor a remote computer and also tell you about which monitoring software to go for, how it works, how to install and use it, their pros and cons and many more.

Which Monitoring Software to Choose?

In my experience of over 10 years in the field of information security, I have tried and tested a number of monitoring programs for my clients and personal use. SniperSpy was the only program that grabbed my attention. The following review shows why I was really impressed by SniperSpy:

SniperSpy: A Detailed Review

Monitor remote computer using SniperSpySniperSpy is a cutting-edge Remote Spying Solution from Retina-X Studios LLC, that comes with a Remote-Install feature! That means, you can now install this software even on a remote computer without the need to have physical access to it. Currently, only a few monitoring programs on the market support this feature and SniperSpy is the best among them.

This is the only monitoring software on the market with a secure control panel. You can remotely view everything your child, employee or spouse does on their computer.


SniperSpy Software Features:

  • Supports Remote Install and Remote Monitoring – No physical access to the target computer is required! Also works on a local computer.

  • 100% Undetectable! Operates in a total stealth mode.

  • Completely Bypasses any firewall, even the Windows XP, Vista, 7 and 8 firewalls!

With SniperSpy, you can monitor all the activities of the remote computer:

  • Actual Screenshots: Captures a full-sized screenshot of the target computer.

  • Websites Visited: Capture a complete log of URLs visited from any browser including IE, Firefox, Chrome and others.

  • Keystrokes in Many Languages: You can capture every keystroke of the target computer including passwords, IM/chat logs etc. not only in English, but also in several other languages.

  • Full Chat Conversations: Records both sides of chats / IMs in Google Talk, Yahoo IM, Windows Live and more.

Watch the Screen LIVE like a TV and perform the following actions:

  • Reboot/Shutdown/Logoff: You have the option to remotely issue a shutdown/reboot or logoff command.

  • Remote Uninstall: You also have the option to remotely uninstall the software at anytime from your own computer.

How it Works?

How the Monitoring Process Works?


How to Install and Monitor the Remote Computer?

The software can be installed by sending an email attachment which contains the installation module. When the target user opens the attachment, the software gets silently installed and the monitoring process will begin.

Deployment is not normally a problem because the small (81kb) module file can be renamed to anything you want and dropped inside a Word, Image or Zip file and sent through many regular email services. This makes the remote installation very easy and stealth. However, if you need to install it on your local computer, you can do so normally just like you install any other program.

When you want to view the screen or browse the logged results, simply log in to the “Secure Online Control Panel” (from any browser – IE, Firefox, Chrome etc.) and enter your username and password. This panel allows you to view the screen, perform commands, search the logs or uninstall the software.

You will get a complete step-by-step instruction and technical support after you purchase the software.


Supported Operating Systems:

Windows 2000/XP/Vista/7/8.  Also supports Mac.


FAQs about SniperSpy:

1. Will SniperSpy collect any personal information about me?

No, SniperSpy is completely safe. It neither collects any information about you nor try to contact you in any way.

2. Will SniperSpy be detected by virus scanners?

No, SniperSpy is intelligently designed to escape from the modern antivirus software. Even if it is found to be detected, an immediate update is released so as to solve this problem. You will also get technical support on all the 7 days to help solve your problems if any.

Download SniperSpy Now! – for Windows and Mac

For a complete review of monitoring software products visit


  1. RVM
    February 22, 2009 at 1:17 PM

    You didn’t explain about the usage procedure.pls explain the usage any one of the monitoring softwares u have mentioned in detail.

  2. RVM
    February 22, 2009 at 5:30 PM

    How can one control others computer using these softwares.Can U explain in detail?

    • Srikanth
      February 22, 2009 at 10:49 PM

      @ RVM

      To control other’s computers from your PC all you have to do is just download/purchase a monitoring software (with remote installation support). Install it on your computer. It’ll have the option to attach the software to a file and send it to the remote person’s email address. Once he/she runs the file that you have sent, it’ll automatically install the software on his/her PC. Now it’ll monitor his/her activities and sends all the logs to your email address.

  3. liezl
    February 22, 2009 at 8:27 PM

    When installing Remote PC monitoring. Do I need access to the PC I want to monitor. Or will I be able to install it from my own pc? I have the IP address of the other pc i want to monitor

    • Srikanth
      February 22, 2009 at 10:37 PM

      @ liezl

      You need not access the remote PC. You can attach the monitoring software to a file and send it via email. When the target person runs the file, the software gets automatically installed without his knowledege. After that it works in stealth mode and sends the logs to your email address.

  4. Poppernut
    February 23, 2009 at 8:36 AM

    ‘Another good software I know of is Refog. Works well, and is cheap to buy the full version.

  5. Srikanth
    February 23, 2009 at 9:28 PM

    I have given the installation procedure for most of the monitoring softwares. You can refer them….

  6. Sonia
    February 24, 2009 at 9:10 AM

    Srikanth what is ” Revere TCP desynchronization attack”

  7. SRC
    February 24, 2009 at 1:00 PM


  8. tina
    February 26, 2009 at 4:53 AM

    I’ve downloaded a remote spy programe from a place i trust and use to download other things, but the download has come in a VLC format, i have that media player but can’t work out how to use the programe as when i open and play it nothing happens. I know that it does works as it has lots of feedback, Please let me know if you know how to install.
    Thank you.

  9. Rajiv
    March 3, 2009 at 8:48 PM

    Does keylogger show any sign of their existance in Start Up??? I mean when PC is restarted/rebooted then the logger will start automatically, at that time wil it show its presence in PC???

    • Srikanth
      March 5, 2009 at 2:29 PM

      @ Rajiv

      No, Keylogger doesn’t show any sign of it’s existance. It works in total stealth.

  10. BloodshedHero
    March 6, 2009 at 2:30 PM

    Interesting and informative article. I think the computers at my current job have monitoring software enabled.

    It would be very useful if you could explain ways to finding out if a computer has this software enabled on it. Also any ways to disable, gain access to, or bypass this type of software.



    • Srikanth
      March 8, 2009 at 11:44 PM

      @ BloodShedHero

      It’s almost impossible to find it. Only a good antispyware scan will revael the truth.

  11. Sourabh
    March 6, 2009 at 4:12 PM

    Dear Srikanth

    I have created a fake page,login.php and files folder. But i m not able to upload files folder in . Plz tell me whats the solution for that and also where is the root directory of I m waiting for your reply on my gmail……

    • Srikanth
      March 8, 2009 at 11:42 PM

      @ Sourabh

      try to find some free php hosting sites.

  12. Don Morris
    March 7, 2009 at 1:53 PM

    Srikanth, I would like to ask the email you are talking about? is any any of the yahoo, gmail..e.t.c or outlook empress(for windows). and secondly if any of these anti-virus can detect these monitoring softwares. if yes which of them?

    • Srikanth
      March 8, 2009 at 11:33 PM

      @ Don Morris

      1. did not get your first question
      2. It all depends upon the antivirus scan engine and virus signatures (in it’s database). That means some antivirus detects it some doesn’t. can’t figur eout exactly unless we test it with each and every antivirus.

  13. shruthi
    March 9, 2009 at 7:20 PM

    hi buddy……….
    can i get ur email address………..
    plz i need ur help personally regarding this topic and i would like to study it in detail…………. can u just mail me…….

    • Srikanth
      March 10, 2009 at 9:38 AM

      @ shruthi

      I’ll send a mail to you.

  14. fabian
    March 12, 2009 at 4:04 PM


    I have win spy monitor and created a remote file, i have tested the e-mail i want the reports to be sent to and all is good and working. The problem is at the end of configering my remote file when i click on “create file” a pop up comes up saying that the file has been created on my desktop in the name i wanted the exe to look like but cannot see the file on my desktop. I have not used all the licenes i was permitted and it worked before while i was just doing a test run.
    If you have any knowledge on this i would be most greatful.
    Thank you faban.

    • Srikanth
      March 13, 2009 at 2:32 PM

      @ fabian

      Check your antivirus and make sure it is not de;eting the file upon creation. Try to reinstall Win-Spy monitor and then try to create the remote file once again..

  15. fabian
    March 13, 2009 at 7:18 PM

    yes i reinstalled it and it worked. thanks. Sent the remote file, not recieving any logs or e-mails though, e-mail worked on the test run. On the remote veiwer it’s saying that remote login is connected: when i click on the sort tabs is says fault on the static and notify tab. It says its using port 443. Does the fault mean the setting or not correct?
    Thanks Fabian.

    • Srikanth
      March 13, 2009 at 9:30 PM

      @ fabian

      Use a free FTP service to receive the logs. FTP is more reliable than Email. Regarding the port problem, I think it’s a sort of problem on the remote computer. It may get right next time..

  16. fabian
    March 14, 2009 at 7:54 PM


    Yes i set up a free FTP at drive Sent the remote file and it was executed on remote comp as i recieved a e-mail with log file and activation on remote computer. Log file on e-mail doesn’t recieve screen shoots though, when i logged onto FTP space i couldn’t find logs, do i need to download them? and where from? recieved web summery logs all well and good keylog is a bit confusing. I know the log uses _ for @ but can’t really work out the rest as it doesn’t look like usual sign in. I’ll copy and paste here, will change the name to the user for security reasons.
    keylog file-
    Date File Created: 13/03/2009 21:44:41

    User: The User (Date: 03-14-2009 Start Time:08:47:49 AM End Time: 08:53:44)


    Don’t understand the UM at beginning of name and the USININ. Shouldn’t it say
    I’m sure there using uk version.

  17. fabian
    March 15, 2009 at 2:14 AM

    Arghhhhh! This thing is driving me mad. Uninstalled about 100 times because the remote viewer wasen’t working. Reinstalled and it’s working again now, the remote comp isin’t on my list on remote viewer though, will i stll receive e-mails though because the win spy is still activated on their computer? Couldn’t understand how to get the log’s from my Ftp?? Fabian.

    • Srikanth
      March 16, 2009 at 12:36 AM

      @ fabian

      Just give the FTP address while creating the remote install file. And later check your FTP account and you should receive the log files in your account.

  18. Aditya
    March 16, 2009 at 6:55 PM

    i saw a c code that shutdowns the system, but it isn’t working. please verify the code

    system(“shutdown -s”);

    • Srikanth
      March 17, 2009 at 4:28 PM

      @ Aditya

      You should include the header file “process.h” or “stdlib.h” for the system() to work!

  19. Aditya
    March 16, 2009 at 7:00 PM

    can u please give me the c code to delete files .

    the files that to be deleted is a dynamic approach.

  20. sahil
    March 16, 2009 at 10:16 PM

    hi buddy i tried many remote spying software but my quick heal and avira antivirus detect all can u tell me which spying software is best and can work without being detected by quick heal.

    • Srikanth
      March 18, 2009 at 3:53 PM

      @ sahil

      I have tested WinSpy monitor and Realtime Spy on my comp. I have a good antivirus software with full updates. but still it didn’t detect them. So try either of them..

  21. dilip
    March 17, 2009 at 12:00 PM


    Anything new rather than this stuff like pc monitoring , win-spy, keylogger..

    from the last 3-4 post, you are providing only this stuff. so please provide us something intersting abour hacking and its tool.


  22. Shilpa
    March 20, 2009 at 10:26 AM

    Hello Srikanth,
    Installing Winspy monitor on a remote computer expects the end user to downnload the exe file from the mail. If the user is computer literate he or she may not download this file. Can you please guide me if there are other ways to install remote spy softwares or keyloggers.

    Thanks a ton for all your help

    • Srikanth
      March 20, 2009 at 7:16 PM

      @ Shilpa

      YOu can upload the software to a free web server and send the download link to the victim…

  23. Shilpa
    March 20, 2009 at 11:39 PM

    can i use win spy monitor to upload on free web server

    • Srikanth
      March 21, 2009 at 11:47 AM

      @ Shilpa


  24. dee
    March 21, 2009 at 4:58 AM

    i am using winspy. i successfully create file and attach it to an email. the email never makes it to it’s destination..i disabled my firewalls and all.. please help

    • Srikanth
      March 21, 2009 at 11:47 AM

      @ dee

      Upload the file to rapidshare and give it’s download link to the victim via email.

  25. siddhu
    March 21, 2009 at 2:47 PM

    was the keyloggesrs free to download and use remotly.i tried win spy it was saying that trail period was over was there any alternative to get them for free

    • Srikanth
      March 21, 2009 at 7:35 PM

      @ siddhu

      You can get other keyloggers for free but not the Winspy

  26. siddhu
    March 21, 2009 at 8:19 PM

    i had tried many but they are almost waste ones can you help me in getting a nice one so that i can know the passwords of others. can you say me any name of any key loggers i can invest some small amounts if they are nice
    please .. help me

    • Srikanth
      March 21, 2009 at 9:33 PM

      @ siddhu

      The keyloggers discussed above are some of the best ones. You can use any of them as per your needs..

  27. fabian
    March 22, 2009 at 2:33 AM


    Thanks you for your help and sharing your knowledge! It’s a great site and has helped me alot, i would have never known things I know now if I had not stumbled across your site. Just a quick note to say thanks for taking your time to share with people what you have learn’t.
    Regards Fabian,

    • Srikanth
      March 22, 2009 at 8:17 AM

      @ fabian

      Thanks for your support!

  28. RVM
    March 25, 2009 at 8:13 PM


    As WinSpy & Real time spy do now allow trial version downloads anymore due to software misuse i downloaded & installed spy anywhere.Can u tell me how to send the attached file throgh email?

  29. akiles
    April 10, 2009 at 9:47 AM

    i just want to say if u hack another Pc will their anti virus or internet security find the hacker or tell the user if it is being hacked

    • Srikanth
      April 12, 2009 at 7:55 PM

      @ akiles

      Most of the times it’ll not inform the user about the hack attempts..

  30. george
    April 12, 2009 at 7:52 PM

    Dear Mr.Srikanth;
    i have bought the win-spy software but there was a proplem in download 2.22mb and when i install it it says:
    “not a valid windows 32 application”

    i tried to call the customer service unfortunatly no response till now for 10 days,i have trusted this company cause you promoted them but till now they didnt give me a feedback,what should i do?
    thanks in advance.

  31. Kuldeep
    April 15, 2009 at 2:04 PM

    Hey Srikanth
    I am very keen to learn hacking. Yesterday I searched internet for hacking techniques and got link to your site. I just know a few basic of C and C++(just a part of beginning) but I did pretty well in class and knew it more than the good students of class
    I have a bit of knowledge of html and am a fast learner
    I have subscribed to your feed
    Just to mention I cant buy anything over internet because of family problems
    So I wish to know tat can you give me a private course or recommend me something to learn it?
    Thanks a lot

  32. Gimme
    April 30, 2009 at 1:00 PM

    hello sri!
    i bought webspy monitor and installed it on my pc…however my antivirus (avast) disabled it (i think), as the the short cut keys are not working anymore….! do i need to reinstall it?

    • Srikanth
      May 1, 2009 at 11:44 PM

      @ Gimme

      You disable the antivirus temporarily and perform a reinstall.

  33. Guru
    May 2, 2009 at 10:03 PM

    If someone monitors my computer remotely, how can i avoid it?

  34. cool101
    May 8, 2009 at 4:24 AM

    I have avast antivirus intalled on my pc.
    I cant install winspy . it shows as it conains a tojan and stops the intallation. what do i do to install it . Do it really contains trojan.
    Will it effect my pc.
    please help me out.

    • Srikanth
      May 8, 2009 at 8:03 AM

      @ cool101

      It seems like you’re using a cracked version of Win-Spy. This is the reason for it to be infected by Trojan. If you purchase the Win-Spy then you’ll not see this problem.

  35. Kally
    May 13, 2009 at 4:55 AM

    Dear Srikanth,
    Thanks for this info
    I have another idea
    can you contact me by email
    once again, thanks

  36. abhishek
    May 13, 2009 at 10:37 AM

    is it all free…………………………………………..please explain me in detail…………………………

    • Srikanth
      May 14, 2009 at 6:38 AM

      @ abhishek

      It is not free. But you can find some free keyloggers on google. However they are not as effective as the paid ones.

  37. rod
    May 25, 2009 at 11:01 AM

    I have successfully installed the win spy keylogger to my computer, Please help me how to use the remote pc or monitor other pc..I tried to follow instruction but i doesnt seem to work, I just need some help on how to use remote pc feature. Would appreciate any help, thank you

  38. rod
    May 25, 2009 at 11:54 AM

    Sir Srikanth, What is that software to be attached and send to the victim’s email address, In order to monitor his or her computer, where I can find it?

  39. pooja
    June 4, 2009 at 12:53 AM

    hey i know one of my sister,s password as i went to the forgot password section and typed in the contact details and finally changed the password ….. before she recovers her account can something be done so that i can know the new password while she thinks secure feelin dat she has got a new password ??? ie. dats the next time i log in her account she should not feel dat her a/c has been hacked …

  40. satyam
    June 10, 2009 at 6:59 AM

    Hi Srikanth…very nice to see your post…You have done a hard work to achieve this level.can you please give me your mail address???

  41. sweety
    October 5, 2009 at 12:23 PM

    i am a new learner about can u pleez try to explain more detail how to hijack between two pc while they r chatting.
    it could be better if u can provide me the video of the tutorial..
    thank u