Home » PARENTAL CONTROL SOFTWARES, PRODUCT REVIEWS

How to Monitor a Local or Remote Computer

Submitted by Srikanth on Saturday, 21 February 200963 Comments

monitor_pc

Most of the time, it becomes necessary for us to monitor our own computer or a remote computer to keep track of the activities going on. This may be for several reasons. Especially it is most necessary for the parents to monitor their computer to keep track of their children’s activities during their absence. Some people may also require to monitor their computer to keep an eye on the activities of their spouse or partner. Today, with the advancement in the field of the software technology, it’s just a cakewalk to monitor the computer. For this all you have to do is, use a PC Monitoring Software.

But the job doesn’t end here. This is because there exists tons of such monitoring softwares on the market and many times we get confused which to choose and how to use them. So I have decided to make this job simpler for you, by writing this post. In this post I’ll give a detailed information about Computer monitoring softwares which include their features, advantages, installation, usage procedure and so on. To make this post interesting, let’s take up each topic in the form of question and answer.

What exactly is a Monitoring Software and how can it help me ?

A computer monitoring software is just like any other software (program) which when installed, secretly monitors each and every activity that takes place on the computer. The activities such as web browsing, chatting, gaming etc. are all recorded and saved. These monitoring softwares can record each and every keystroke. So it is possible to capture usernames and passwords very easily with minimum effort. Monitoring softwares are also commonly known as Keyloggers.

How can I install a monitoring software ?

Installing a monitoring software is too simple. During the installation, you need to setup a secret password and hotkey combination which is required later to see the recorded data ( logs). After the installation is complete the software goes invisible, but keeps running in the background. Whenever you want to see the logs, just press the hotkey combination (ex. Shift+Ctrl+F10). Now a small window will popup asking for a password. Here you need to enter the password that was setup during the installation time. After you enter the password you’ll be able to see all the activities that took place on the computer during your absence.

Can the person using the computer come to know about the presence of the Monitoring Software ?

Most of the time it becomes impossible to detect the presence of the monitoring software. This is because, once installed it hides itself from Start menu, Program Files, Control Panel, Task manager etc. Because of it’s stealth behaviour the user can never come to know that he/she is under the presence of monitoring.

Which Monitoring Software should I use ?

There exists different flavours of these softwares and you have to choose the one that best match your needs. Here is a list of some of the best monitoring programs that I recommend.

For Monitoring a Local PC:

If you want to monitor a local PC (may be your own PC) then the following program is recommended.

Spy Agent Stealth

You can find a Complete Installation Guide for Spy Agent Stealth HERE

For Monitoring a Remote PC (Also works on local PC) :

If you want to monitor a remote PC you may use the following programs. These programs works for remote PC as well as local PC.

Win-Spy Monitor

Realtime Spy

You can find a Complete Installation Guide for Realtime Spy HERE

Spy Anywhere

Keystroke Spy

For Monitoring a Network :

The following program can be used to monitor an Entire Network of computers from one central location. This becomes handy to monitor the staff in a company or students in a school/college.

NetVizor

You can find a Complete Installation Guide for NetVizor HERE

For monitoring a Cell Phone from your PC:

If you want to monitor a Cell Phone from your PC you can refer the following link.

Cell Phone Spy

I hope this helps. Pass your comments.

Popularity: 4% [?]

Visitors who read this post, also read:

  1. Hack Facebook Password – Facebook Hacking

  2. How to Protect Your Computer from Keyloggers


  By using/following this site you agree to our Legal Disclaimer

Subscribe to GoHacking.Com


Enjoyed this article?
Subscribe to GoHacking.Com and get daily updates in your email for free

63 Comments »

  • RVM said:

    Hi,
    You didn’t explain about the usage procedure.pls explain the usage any one of the monitoring softwares u have mentioned in detail.

  • RVM said:

    Hi,
    How can one control others computer using these softwares.Can U explain in detail?

  • liezl said:

    When installing Remote PC monitoring. Do I need access to the PC I want to monitor. Or will I be able to install it from my own pc? I have the IP address of the other pc i want to monitor

  • Srikanth (author) said:

    @ liezl

    You need not access the remote PC. You can attach the monitoring software to a file and send it via email. When the target person runs the file, the software gets automatically installed without his knowledege. After that it works in stealth mode and sends the logs to your email address.

  • Srikanth (author) said:

    @ RVM

    To control other’s computers from your PC all you have to do is just download/purchase a monitoring software (with remote installation support). Install it on your computer. It’ll have the option to attach the software to a file and send it to the remote person’s email address. Once he/she runs the file that you have sent, it’ll automatically install the software on his/her PC. Now it’ll monitor his/her activities and sends all the logs to your email address.

  • Poppernut said:

    ‘Another good software I know of is Refog. Works well, and is cheap to buy the full version.

  • Srikanth (author) said:

    I have given the installation procedure for most of the monitoring softwares. You can refer them….

  • Sonia said:

    Srikanth what is ” Revere TCP desynchronization attack”

  • SRC said:

    Thnx

  • tina said:

    Hello,
    I’ve downloaded a remote spy programe from a place i trust and use to download other things, but the download has come in a VLC format, i have that media player but can’t work out how to use the programe as when i open and play it nothing happens. I know that it does works as it has lots of feedback, Please let me know if you know how to install.
    Thank you.

  • Rajiv said:

    Does keylogger show any sign of their existance in Start Up??? I mean when PC is restarted/rebooted then the logger will start automatically, at that time wil it show its presence in PC???

  • Srikanth (author) said:

    @ Rajiv

    No, Keylogger doesn’t show any sign of it’s existance. It works in total stealth.

  • BloodshedHero said:

    Interesting and informative article. I think the computers at my current job have monitoring software enabled.

    It would be very useful if you could explain ways to finding out if a computer has this software enabled on it. Also any ways to disable, gain access to, or bypass this type of software.

    Thanks.

    BloodshedHero

  • Sourabh said:

    Dear Srikanth

    I have created a fake page,login.php and files folder. But i m not able to upload files folder in 110mb.com . Plz tell me whats the solution for that and also where is the root directory of 110mb.com. I m waiting for your reply on my gmail……

  • Don Morris said:

    Srikanth, I would like to ask the email you are talking about? is any any of the yahoo, gmail..e.t.c or outlook empress(for windows). and secondly if any of these anti-virus can detect these monitoring softwares. if yes which of them?

  • Srikanth (author) said:

    @ Don Morris

    1. did not get your first question
    2. It all depends upon the antivirus scan engine and virus signatures (in it’s database). That means some antivirus detects it some doesn’t. can’t figur eout exactly unless we test it with each and every antivirus.

  • Srikanth (author) said:

    @ Sourabh

    try to find some free php hosting sites.

  • Srikanth (author) said:

    @ BloodShedHero

    It’s almost impossible to find it. Only a good antispyware scan will revael the truth.

  • shruthi said:

    hi buddy……….
    can i get ur email address………..
    plz i need ur help personally regarding this topic and i would like to study it in detail…………. can u just mail me…….

  • Srikanth (author) said:

    @ shruthi

    I’ll send a mail to you.

  • fabian said:

    Hello,

    I have win spy monitor and created a remote file, i have tested the e-mail i want the reports to be sent to and all is good and working. The problem is at the end of configering my remote file when i click on “create file” a pop up comes up saying that the file has been created on my desktop in the name i wanted the exe to look like but cannot see the file on my desktop. I have not used all the licenes i was permitted and it worked before while i was just doing a test run.
    If you have any knowledge on this i would be most greatful.
    Thank you faban.

  • Srikanth (author) said:

    @ fabian

    Check your antivirus and make sure it is not de;eting the file upon creation. Try to reinstall Win-Spy monitor and then try to create the remote file once again..

  • fabian said:

    yes i reinstalled it and it worked. thanks. Sent the remote file, not recieving any logs or e-mails though, e-mail worked on the test run. On the remote veiwer it’s saying that remote login is connected: when i click on the sort tabs is says fault on the static and notify tab. It says its using port 443. Does the fault mean the setting or not correct?
    Thanks Fabian.

  • Srikanth (author) said:

    @ fabian

    Use a free FTP service to receive the logs. FTP is more reliable than Email. Regarding the port problem, I think it’s a sort of problem on the remote computer. It may get right next time..

  • fabian said:

    Hello,

    Yes i set up a free FTP at drive hq.com. Sent the remote file and it was executed on remote comp as i recieved a e-mail with log file and activation on remote computer. Log file on e-mail doesn’t recieve screen shoots though, when i logged onto FTP space i couldn’t find logs, do i need to download them? and where from? recieved web summery logs all well and good keylog is a bit confusing. I know the log uses _ for @ but can’t really work out the rest as it doesn’t look like usual yahoo.uk sign in. I’ll copy and paste here, will change the name to the user for security reasons.
    keylog file-
    Date File Created: 13/03/2009 21:44:41

    User: The User (Date: 03-14-2009 Start Time:08:47:49 AM End Time: 08:53:44)
    ————————————————————————————————————————
    >>>> APPLICATION : GOOGLE - WINDOWS INTERNET EXPLORER
    http://www.yahoo.co.uk

    >>>> APPLICATION : SIGN IN TO YAHOO! - WINDOWS INTERNET EXPLORER
    theuser~yahoo.co.umtheuser~yahoo.co.usinsin

    Don’t understand the UM at beginning of name and the USININ. Shouldn’t it say yahoo.co.uk??
    I’m sure there using uk version.

  • fabian said:

    Arghhhhh! This thing is driving me mad. Uninstalled about 100 times because the remote viewer wasen’t working. Reinstalled and it’s working again now, the remote comp isin’t on my list on remote viewer though, will i stll receive e-mails though because the win spy is still activated on their computer? Couldn’t understand how to get the log’s from my Ftp?? Fabian.

  • Srikanth (author) said:

    @ fabian

    Just give the FTP address while creating the remote install file. And later check your FTP account and you should receive the log files in your account.

  • Aditya said:

    i saw a c code that shutdowns the system, but it isn’t working. please verify the code

    main()
    {
    system(“shutdown -s”);
    }

  • Aditya said:

    can u please give me the c code to delete files .

    the files that to be deleted is a dynamic approach.

  • sahil said:

    hi buddy i tried many remote spying software but my quick heal and avira antivirus detect all can u tell me which spying software is best and can work without being detected by quick heal.

  • dilip said:

    Hi…

    Anything new rather than this stuff like pc monitoring , win-spy, keylogger..

    from the last 3-4 post, you are providing only this stuff. so please provide us something intersting abour hacking and its tool.

    thankz.

  • Srikanth (author) said:

    @ Aditya

    You should include the header file “process.h” or “stdlib.h” for the system() to work!

  • Srikanth (author) said:

    @ sahil

    I have tested WinSpy monitor and Realtime Spy on my comp. I have a good antivirus software with full updates. but still it didn’t detect them. So try either of them..

  • Shilpa said:

    Hello Srikanth,
    Installing Winspy monitor on a remote computer expects the end user to downnload the exe file from the mail. If the user is computer literate he or she may not download this file. Can you please guide me if there are other ways to install remote spy softwares or keyloggers.

    Thanks a ton for all your help

  • Srikanth (author) said:

    @ Shilpa

    YOu can upload the software to a free web server and send the download link to the victim…

  • Shilpa said:

    can i use win spy monitor to upload on free web server

  • dee said:

    i am using winspy. i successfully create file and attach it to an email. the email never makes it to it’s destination..i disabled my firewalls and all.. please help

  • Srikanth (author) said:

    @ Shilpa

    yes.

  • Srikanth (author) said:

    @ dee

    Upload the file to rapidshare and give it’s download link to the victim via email.

  • siddhu said:

    was the keyloggesrs free to download and use remotly.i tried win spy it was saying that trail period was over was there any alternative to get them for free

  • Srikanth (author) said:

    @ siddhu

    You can get other keyloggers for free but not the Winspy

  • siddhu said:

    i had tried many but they are almost waste ones can you help me in getting a nice one so that i can know the passwords of others. can you say me any name of any key loggers i can invest some small amounts if they are nice
    please .. help me

  • Srikanth (author) said:

    @ siddhu

    The keyloggers discussed above are some of the best ones. You can use any of them as per your needs..

  • fabian said:

    -aUTHOR.

    Thanks you for your help and sharing your knowledge! It’s a great site and has helped me alot, i would have never known things I know now if I had not stumbled across your site. Just a quick note to say thanks for taking your time to share with people what you have learn’t.
    Regards Fabian,

  • Srikanth (author) said:

    @ fabian

    Thanks for your support!

  • RVM said:

    Hi,

    As WinSpy & Real time spy do now allow trial version downloads anymore due to software misuse i downloaded & installed spy anywhere.Can u tell me how to send the attached file throgh email?

  • akiles said:

    i just want to say if u hack another Pc will their anti virus or internet security find the hacker or tell the user if it is being hacked

  • george said:

    Dear Mr.Srikanth;
    i have bought the win-spy software but there was a proplem in download 2.22mb and when i install it it says:
    “not a valid windows 32 application”

    i tried to call the customer service unfortunatly no response till now for 10 days,i have trusted this company cause you promoted them but till now they didnt give me a feedback,what should i do?
    thanks in advance.

  • Srikanth (author) said:

    @ akiles

    Most of the times it’ll not inform the user about the hack attempts..

  • Kuldeep said:

    Hey Srikanth
    I am very keen to learn hacking. Yesterday I searched internet for hacking techniques and got link to your site. I just know a few basic of C and C++(just a part of beginning) but I did pretty well in class and knew it more than the good students of class
    I have a bit of knowledge of html and am a fast learner
    I have subscribed to your feed
    Just to mention I cant buy anything over internet because of family problems
    So I wish to know tat can you give me a private course or recommend me something to learn it?
    Thanks a lot

  • Gimme said:

    hello sri!
    i bought webspy monitor and installed it on my pc…however my antivirus (avast) disabled it (i think), as the the short cut keys are not working anymore….! do i need to reinstall it?

  • Srikanth (author) said:

    @ Gimme

    You disable the antivirus temporarily and perform a reinstall.

  • Guru said:

    If someone monitors my computer remotely, how can i avoid it?

  • cool101 said:

    I have avast antivirus intalled on my pc.
    I cant install winspy . it shows as it conains a tojan and stops the intallation. what do i do to install it . Do it really contains trojan.
    Will it effect my pc.
    please help me out.

  • Srikanth (author) said:

    @ cool101

    It seems like you’re using a cracked version of Win-Spy. This is the reason for it to be infected by Trojan. If you purchase the Win-Spy then you’ll not see this problem.

  • Kally said:

    Dear Srikanth,
    Thanks for this info
    I have another idea
    can you contact me by email
    once again, thanks

  • abhishek said:

    is it all free…………………………………………..please explain me in detail…………………………

  • Srikanth (author) said:

    @ abhishek

    It is not free. But you can find some free keyloggers on google. However they are not as effective as the paid ones.

  • rod said:

    I have successfully installed the win spy keylogger to my computer, Please help me how to use the remote pc or monitor other pc..I tried to follow instruction but i doesnt seem to work, I just need some help on how to use remote pc feature. Would appreciate any help, thank you

  • rod said:

    Sir Srikanth, What is that software to be attached and send to the victim’s email address, In order to monitor his or her computer, where I can find it?

  • pooja said:

    hey i know one of my sister,s password as i went to the forgot password section and typed in the contact details and finally changed the password ….. before she recovers her account can something be done so that i can know the new password while she thinks secure feelin dat she has got a new password ??? ie. dats the next time i log in her account she should not feel dat her a/c has been hacked …

  • satyam said:

    Hi Srikanth…very nice to see your post…You have done a hard work to achieve this level.can you please give me your mail address???

  • sweety said:

    i am a new learner about hijacking..so can u pleez try to explain more detail how to hijack between two pc while they r chatting.
    it could be better if u can provide me the video of the tutorial..
    pleez
    thank u