Tip 1: How to track user actions
Tip 1: How to track user actions
In some cases, there is a needTrack the user's actions on the computer. In this you can help both the capabilities of the operating system and the browser, and installed third-party programs.
Instructions
1
The need to control actions User can be caused by a variety of reasons. For example, you want to track your subordinates or check what your child is doing when working on the PC. Most of the interest is caused by the addresses of the visited websites launched during the program operation, and information entered from the keyboard.
2
To track the visited Internet resources very muchsimply, you just need to browse the browser's history folder (log). You will see all the sites visited by the user. True, experienced users, after working on someone else's computer, can clear the log of visits or remove individual records from it.
3
The most reliable way to control User is the installation on the computer trackingprograms. For example, you can use the free program KGB Key Logger. It will allow you to be aware of everything that the user is doing on the computer. Has a visible and invisible mode, tracks keystrokes, keeps track of visited sites, can take screenshots (screenshots). The intercepted information can be sent to the mailbox. At the same time the program is absolutely legal, as it is installed on the computer by its owner.
4
Similar functions have the program ExtraSpyEmployee Monitor, created to ensure the control of the management of the enterprises of its employees. Installing this program on the computer, you will always be aware of what the person working on it is doing.
5
To remotely administer a computer, youcan use the program Radmin. Having installed its server part on a computer, the work on which you want to monitor, you can connect to it on the Internet at any time. Before you in the window of the program appears the screen of the remote computer that is updated in the current time mode, you will see everything actions User. In addition, you can view anyfolders and files, copy and delete information, start and close programs. This program is legal, you can download it from the manufacturer's website: http://www.radmin.ru/.
Tip 2: How to track a computer
If the child spends almost all free timeat the computer, parents can be interested in what websites he visits, what games he plays and what movies he watches. Sometimes vigilant spouses for the sake of preserving family and peace of mind also want to check what the expensive half on the Internet does.
Instructions
1
You can purchase a hardware keylogger -A device that tracks keystrokes on the keyboard. Depending on the model, it connects to the USB connector or is inserted into the keyboard. Reports can be written to a special folder or sent over the Internet to another computer. The price of the device depends on the range of its functions and the amount of memory.
2
You can use the software keyboarda spy, for example, Elite Keylogger. The developers claim that the program runs at the operating system kernel level and is therefore completely invisible for antispyware software. Run the program and select one of the Visible mode or Unvisible modes. For preliminary familiarization and training, it is better to use Visible mode.
3
From the Logs menu, click View logs and enter the password,which you will use to view the logs. In the calendar, mark the date that you are interested in, and click View logs for ... In the left part of the window, you will see a user account, a list of keys pressed, and the date and time of the event.
4
The program takes a screenshot every three minutes. To view the thumbnail of the screens, select the menu item Screenshots. Call the full-screen view mode by double-clicking on the thumbnail. The Internet Activity section contains a list of websites visited.
5
Similar functions are performed by a keyloggerEltima Powered Keylogge. This program also tracks keystrokes, takes screenshots at regular intervals and can send logs to the specified e-mail. The program is invisible for antispyware software and password protected
6
These programs are shareware-free. You can use the utility Punto Switcher, which is distributed by the developer completely free of charge. About its spyware capabilities, few suspect, because its main purpose is to switch keyboard layout and auto-replace frequently used words with a certain combination of keys.
7
Install the program on the computer and clickright-click on its icon. In the drop-down menu, select the "Settings" section and in the left part of the settings window select the "Diary" item. Check the checkboxes "Maintain a diary", "Automatically save the contents of the buffer ...", "Maintain the diary in programs-exceptions".
8
Click "Set Password ..." and entera combination of numbers and symbols. Use the "Apply" and OK buttons to confirm. To view the entries in the context menu, select "Settings", then "Open Diary".
Tip 3: How to track Internet traffic
Working in internet, the user can visually controlconnection to the network by the connection icon in the system tray. But in the event that the connection icon is active even while the computer is idle, there is a need for more complete control traffic.
Instructions
1
Uncontrolled network activity of the computercan indicate both the infection of the system by malicious software, and its misconfiguration. Therefore, first open the "Control Panel" and turn off automatic Windows update. Then, after checking the computer, you turn it on again.
2
Open the autorun folder: Start - Run, msconfig command, Startup tab, uncheck all unnecessary programs. Many installed programs themselves register themselves in the autorun, which slows down the loading and running of the computer.
3
Disable any services you do not need: Start - Control Panel - Administrative Tools - Services. A list of services that can be disabled and a description of the shutdown process can be found in internet.
4
After completing the previous steps, check the operationcomputer. If the traffic continues to be used uncontrollably, open the command line: "Start" - "All Programs" - "Standard" - "Command Line". Type netstat -aon and see the list of current connections-they will be marked as Established. In the right part of the window you will see a list of process IDs - PID.
5
Type the tasklist command in the same window. You will see a list of running processes, in the second column, their identifiers will be listed. By matching PID from the list of connections with process list IDs, you can find out which processes are using the Internet connection.
6
If you can not identify the process by name,which program it belongs to, use the utility AnVir Task Manager. Run it, find the list of processes that interests you. In the information on it will be indicated both the executable file and the autorun key in the registry. The utility AnVir Task Manager shows current connections, it is very convenient to use for system diagnostics.
7
If you need total control over traffic, install and run the BWMeter program. Click the Details tab and click Start in the Control panel. In the window of the program all connections with the indication of ip-addresses will be indicated. Additional windows of the program will give you full information about the traffic. You can enable logging; All information about the used traffic will be saved in a text file.
Tip 4: How to track all sms from your phone
With the help of the "Detailing of account" service, customers of the largest telecoms operators can track which numbers were sent to sms, with what are accepted, at what time, the cost of sending and much more. To connect operators provide special numbers.
You will need
- - mobile phone.
Instructions
1
Users of MegaFon can orderdetailing your personal account through the self-service Service Guide. Any subscriber can find this system by going to the company's official website. In addition, you can connect the necessary service in one of the communication salons.
2
The communication operator "Beeline" also provides its customers with the details of the account. With its help, it will be possible to obtain information not only about sms, but also about calls. It can be incoming and dialed numbers, type of calls (mobile, city, service), their duration, date of making calls, receiving mms-messages, as well as data on GPRS-session.
3
From which bill payment system you areuse, the method of activating the service will also depend. Both for clients of the prepaid, that is, advance system, and for clients of the credit system, the connection of detailing is possible directly from the official website of the company. In addition, the fax number (495) 974-5996 is available for advance users. A written application must be sent to it. By the way, subscribers can send their letter to [email protected]. Service activation will cost from 30 to 60 rubles. The operator will determine the exact price based on the parameters of your tariff plan.
4
Customers of the credit system can connectdetailing of the account in the "Beeline" communication center. When dealing with yourself, you must have a passport and a contract for the provision of communication services. The operator will charge an amount of up to 60 rubles from your account.
5
"MTS" company also provides its customers with an opportunity to learn about all the activities that are made with mobile Phone (information is provided only for the last 3 days). Such information can include payment of communication services, use of sms or mms, GPRS, voice services, made andreceived calls. However, the subscriber will not be able to obtain information about service management and tariff changes. To activate the detail, you need to dial USSD-request * 111 * 551 # or send code 551 to 1771.