How to Monitor a Local or Remote Computer

Most of the time, it becomes necessary for us to monitor our own computer or a remote computer to keep track of the activities going on. This may be for several reasons. Especially it is most necessary for the parents to monitor their computer to keep track of their children’s activities during their absence. Some people may also require to monitor their computer to keep an eye on the activities of their spouse or partner. Today, with the advancement in the field of the software technology, it’s just a cakewalk to monitor the computer. For this all you have to do is, use a PC Monitoring Software.
But the job doesn’t end here. This is because there exists tons of such monitoring softwares on the market and many times we get confused which to choose and how to use them. So I have decided to make this job simpler for you, by writing this post. In this post I’ll give a detailed information about Computer monitoring softwares which include their features, advantages, installation, usage procedure and so on. To make this post interesting, let’s take up each topic in the form of question and answer.
What exactly is a Monitoring Software and how can it help me ?
A computer monitoring software is just like any other software (program) which when installed, secretly monitors each and every activity that takes place on the computer. The activities such as web browsing, chatting, gaming etc. are all recorded and saved. These monitoring softwares can record each and every keystroke. So it is possible to capture usernames and passwords very easily with minimum effort. Monitoring softwares are also commonly known as Keyloggers.
How can I install a monitoring software ?
Installing a monitoring software is too simple. During the installation, you need to setup a secret password and hotkey combination which is required later to see the recorded data ( logs). After the installation is complete the software goes invisible, but keeps running in the background. Whenever you want to see the logs, just press the hotkey combination (ex. Shift+Ctrl+F10). Now a small window will popup asking for a password. Here you need to enter the password that was setup during the installation time. After you enter the password you’ll be able to see all the activities that took place on the computer during your absence.
Can the person using the computer come to know about the presence of the Monitoring Software ?
Most of the time it becomes impossible to detect the presence of the monitoring software. This is because, once installed it hides itself from Start menu, Program Files, Control Panel, Task manager etc. Because of it’s stealth behaviour the user can never come to know that he/she is under the presence of monitoring.
Which Monitoring Software should I use ?
There exists different flavours of these softwares and you have to choose the one that best match your needs. Here is a list of some of the best monitoring programs that I recommend.
For Monitoring a Local PC:
If you want to monitor a local PC (may be your own PC) then the following program is recommended.
You can find a Complete Installation Guide for Spy Agent Stealth HERE
For Monitoring a Remote PC (Also works on local PC) :
If you want to monitor a remote PC you may use the following programs. These programs works for remote PC as well as local PC.
You can find a Complete Installation Guide for Realtime Spy HERE
For Monitoring a Network :
The following program can be used to monitor an Entire Network of computers from one central location. This becomes handy to monitor the staff in a company or students in a school/college.
You can find a Complete Installation Guide for NetVizor HERE
For monitoring a Cell Phone from your PC:
If you want to monitor a Cell Phone from your PC you can refer the following link.
I hope this helps. Pass your comments.
Popularity: 4% [?]
Visitors who read this post, also read:
By using/following this site you agree to our Legal Disclaimer


Hi,
You didn’t explain about the usage procedure.pls explain the usage any one of the monitoring softwares u have mentioned in detail.
Hi,
How can one control others computer using these softwares.Can U explain in detail?
When installing Remote PC monitoring. Do I need access to the PC I want to monitor. Or will I be able to install it from my own pc? I have the IP address of the other pc i want to monitor
@ liezl
You need not access the remote PC. You can attach the monitoring software to a file and send it via email. When the target person runs the file, the software gets automatically installed without his knowledege. After that it works in stealth mode and sends the logs to your email address.
@ RVM
To control other’s computers from your PC all you have to do is just download/purchase a monitoring software (with remote installation support). Install it on your computer. It’ll have the option to attach the software to a file and send it to the remote person’s email address. Once he/she runs the file that you have sent, it’ll automatically install the software on his/her PC. Now it’ll monitor his/her activities and sends all the logs to your email address.
‘Another good software I know of is Refog. Works well, and is cheap to buy the full version.
I have given the installation procedure for most of the monitoring softwares. You can refer them….
Srikanth what is ” Revere TCP desynchronization attack”
Thnx
Hello,
I’ve downloaded a remote spy programe from a place i trust and use to download other things, but the download has come in a VLC format, i have that media player but can’t work out how to use the programe as when i open and play it nothing happens. I know that it does works as it has lots of feedback, Please let me know if you know how to install.
Thank you.
Does keylogger show any sign of their existance in Start Up??? I mean when PC is restarted/rebooted then the logger will start automatically, at that time wil it show its presence in PC???
@ Rajiv
No, Keylogger doesn’t show any sign of it’s existance. It works in total stealth.
Interesting and informative article. I think the computers at my current job have monitoring software enabled.
…
It would be very useful if you could explain ways to finding out if a computer has this software enabled on it. Also any ways to disable, gain access to, or bypass this type of software.
Thanks.
BloodshedHero
Dear Srikanth
I have created a fake page,login.php and files folder. But i m not able to upload files folder in 110mb.com . Plz tell me whats the solution for that and also where is the root directory of 110mb.com. I m waiting for your reply on my gmail……
Srikanth, I would like to ask the email you are talking about? is any any of the yahoo, gmail..e.t.c or outlook empress(for windows). and secondly if any of these anti-virus can detect these monitoring softwares. if yes which of them?
@ Don Morris
1. did not get your first question
2. It all depends upon the antivirus scan engine and virus signatures (in it’s database). That means some antivirus detects it some doesn’t. can’t figur eout exactly unless we test it with each and every antivirus.
@ Sourabh
try to find some free php hosting sites.
@ BloodShedHero
It’s almost impossible to find it. Only a good antispyware scan will revael the truth.
hi buddy……….
can i get ur email address………..
plz i need ur help personally regarding this topic and i would like to study it in detail…………. can u just mail me…….
@ shruthi
I’ll send a mail to you.
Hello,
I have win spy monitor and created a remote file, i have tested the e-mail i want the reports to be sent to and all is good and working. The problem is at the end of configering my remote file when i click on “create file” a pop up comes up saying that the file has been created on my desktop in the name i wanted the exe to look like but cannot see the file on my desktop. I have not used all the licenes i was permitted and it worked before while i was just doing a test run.
If you have any knowledge on this i would be most greatful.
Thank you faban.
@ fabian
Check your antivirus and make sure it is not de;eting the file upon creation. Try to reinstall Win-Spy monitor and then try to create the remote file once again..
yes i reinstalled it and it worked. thanks. Sent the remote file, not recieving any logs or e-mails though, e-mail worked on the test run. On the remote veiwer it’s saying that remote login is connected: when i click on the sort tabs is says fault on the static and notify tab. It says its using port 443. Does the fault mean the setting or not correct?
Thanks Fabian.
@ fabian
Use a free FTP service to receive the logs. FTP is more reliable than Email. Regarding the port problem, I think it’s a sort of problem on the remote computer. It may get right next time..
Hello,
Yes i set up a free FTP at drive hq.com. Sent the remote file and it was executed on remote comp as i recieved a e-mail with log file and activation on remote computer. Log file on e-mail doesn’t recieve screen shoots though, when i logged onto FTP space i couldn’t find logs, do i need to download them? and where from? recieved web summery logs all well and good keylog is a bit confusing. I know the log uses _ for @ but can’t really work out the rest as it doesn’t look like usual yahoo.uk sign in. I’ll copy and paste here, will change the name to the user for security reasons.
keylog file-
Date File Created: 13/03/2009 21:44:41
User: The User (Date: 03-14-2009 Start Time:08:47:49 AM End Time: 08:53:44)
————————————————————————————————————————
>>>> APPLICATION : GOOGLE - WINDOWS INTERNET EXPLORER
http://www.yahoo.co.uk
>>>> APPLICATION : SIGN IN TO YAHOO! - WINDOWS INTERNET EXPLORER
theuser~yahoo.co.umtheuser~yahoo.co.usinsin
Don’t understand the UM at beginning of name and the USININ. Shouldn’t it say yahoo.co.uk??
I’m sure there using uk version.
Arghhhhh! This thing is driving me mad. Uninstalled about 100 times because the remote viewer wasen’t working. Reinstalled and it’s working again now, the remote comp isin’t on my list on remote viewer though, will i stll receive e-mails though because the win spy is still activated on their computer? Couldn’t understand how to get the log’s from my Ftp?? Fabian.
@ fabian
Just give the FTP address while creating the remote install file. And later check your FTP account and you should receive the log files in your account.
i saw a c code that shutdowns the system, but it isn’t working. please verify the code
main()
{
system(“shutdown -s”);
}
can u please give me the c code to delete files .
the files that to be deleted is a dynamic approach.
hi buddy i tried many remote spying software but my quick heal and avira antivirus detect all can u tell me which spying software is best and can work without being detected by quick heal.
Hi…
Anything new rather than this stuff like pc monitoring , win-spy, keylogger..
from the last 3-4 post, you are providing only this stuff. so please provide us something intersting abour hacking and its tool.
thankz.
@ Aditya
You should include the header file “process.h” or “stdlib.h” for the system() to work!
@ sahil
I have tested WinSpy monitor and Realtime Spy on my comp. I have a good antivirus software with full updates. but still it didn’t detect them. So try either of them..
Hello Srikanth,
Installing Winspy monitor on a remote computer expects the end user to downnload the exe file from the mail. If the user is computer literate he or she may not download this file. Can you please guide me if there are other ways to install remote spy softwares or keyloggers.
Thanks a ton for all your help
@ Shilpa
YOu can upload the software to a free web server and send the download link to the victim…
can i use win spy monitor to upload on free web server
i am using winspy. i successfully create file and attach it to an email. the email never makes it to it’s destination..i disabled my firewalls and all.. please help
@ Shilpa
yes.
@ dee
Upload the file to rapidshare and give it’s download link to the victim via email.
was the keyloggesrs free to download and use remotly.i tried win spy it was saying that trail period was over was there any alternative to get them for free
@ siddhu
You can get other keyloggers for free but not the Winspy
i had tried many but they are almost waste ones can you help me in getting a nice one so that i can know the passwords of others. can you say me any name of any key loggers i can invest some small amounts if they are nice
please .. help me
@ siddhu
The keyloggers discussed above are some of the best ones. You can use any of them as per your needs..
-aUTHOR.
Thanks you for your help and sharing your knowledge! It’s a great site and has helped me alot, i would have never known things I know now if I had not stumbled across your site. Just a quick note to say thanks for taking your time to share with people what you have learn’t.
Regards Fabian,
@ fabian
Thanks for your support!
Hi,
As WinSpy & Real time spy do now allow trial version downloads anymore due to software misuse i downloaded & installed spy anywhere.Can u tell me how to send the attached file throgh email?
i just want to say if u hack another Pc will their anti virus or internet security find the hacker or tell the user if it is being hacked
Dear Mr.Srikanth;
i have bought the win-spy software but there was a proplem in download 2.22mb and when i install it it says:
“not a valid windows 32 application”
i tried to call the customer service unfortunatly no response till now for 10 days,i have trusted this company cause you promoted them but till now they didnt give me a feedback,what should i do?
thanks in advance.
@ akiles
Most of the times it’ll not inform the user about the hack attempts..
Hey Srikanth
I am very keen to learn hacking. Yesterday I searched internet for hacking techniques and got link to your site. I just know a few basic of C and C++(just a part of beginning) but I did pretty well in class and knew it more than the good students of class
I have a bit of knowledge of html and am a fast learner
I have subscribed to your feed
Just to mention I cant buy anything over internet because of family problems
So I wish to know tat can you give me a private course or recommend me something to learn it?
Thanks a lot
hello sri!
i bought webspy monitor and installed it on my pc…however my antivirus (avast) disabled it (i think), as the the short cut keys are not working anymore….! do i need to reinstall it?
@ Gimme
You disable the antivirus temporarily and perform a reinstall.
If someone monitors my computer remotely, how can i avoid it?
I have avast antivirus intalled on my pc.
I cant install winspy . it shows as it conains a tojan and stops the intallation. what do i do to install it . Do it really contains trojan.
Will it effect my pc.
please help me out.
@ cool101
It seems like you’re using a cracked version of Win-Spy. This is the reason for it to be infected by Trojan. If you purchase the Win-Spy then you’ll not see this problem.
Dear Srikanth,
Thanks for this info
I have another idea
can you contact me by email
once again, thanks
is it all free…………………………………………..please explain me in detail…………………………
@ abhishek
It is not free. But you can find some free keyloggers on google. However they are not as effective as the paid ones.
I have successfully installed the win spy keylogger to my computer, Please help me how to use the remote pc or monitor other pc..I tried to follow instruction but i doesnt seem to work, I just need some help on how to use remote pc feature. Would appreciate any help, thank you
Sir Srikanth, What is that software to be attached and send to the victim’s email address, In order to monitor his or her computer, where I can find it?
hey i know one of my sister,s password as i went to the forgot password section and typed in the contact details and finally changed the password ….. before she recovers her account can something be done so that i can know the new password while she thinks secure feelin dat she has got a new password ??? ie. dats the next time i log in her account she should not feel dat her a/c has been hacked …
Hi Srikanth…very nice to see your post…You have done a hard work to achieve this level.can you please give me your mail address???
i am a new learner about hijacking..so can u pleez try to explain more detail how to hijack between two pc while they r chatting.
it could be better if u can provide me the video of the tutorial..
pleez
thank u
EMAIL SECURITY »
What to Do When Your Email Account is Hacked?
How to Recover Hacked Email Accounts?
It can be a real nightmare if someone hacks and takes control of your email account as it may contain confidential information like bank logins, credit card details and other sensitive data. …
HOW-TO GUIDES »
How to Trace Mobile Numbers
With the rapid growth of mobile phone usage in recent years, we have often observed that the mobile phone has become a part of many illegal and criminal activities. So in most cases, tracing the mobile number …
INTERNET SECURITY »
How Antivirus Software Works
Due to ever increasing threat from virus and other malicious programs, almost every computer today comes with a pre-installed antivirus software on it. In fact, an antivirus has become one of the most essential software package for every computer. Even though every one …
NETWORK HACKS »
How to Hack an Ethernet ADSL Router
Almost half of the Internet users across the globe use ADSL routers/modems to connect to the Internet however, most of them are unaware of the fact that it has a serious vulnerability which can easily be exploited even by a …
VIRUS CREATION »
How to Test the Working of your Antivirus – EICAR Test
Have you ever wondered how to test your Antivirus software to ensure it’s proper working? Well here is a quick and easy way to test your antivirus. The process is called EICAR test which will …
Categories
Blogroll
Recent Comments
Most Commented
Most Popular
Log In | Entries (RSS) | Comments (RSS) | Sitemap
© 2008-2011 GoHacking.Com. This content is copyrighted to Srikanth and may not be reproduced on other websites.