Small business owners, managers and parents have one thing in common — they want to know how their computers are used, whether employees, team members and children use computers properly and, most importantly, whether their activities affect their work or studies or not. Unfortunately, it’s not always possible to be around them, if at all, so this problem should be solved in a different way — for instance, using a remote activity monitoring tool. So if you’ve been thinking about doing this and have not yet chosen the right tool, give Computer Use Reporter a good try!
Computer Use Reporter is a super-compact, yet functional tool for convenient and discrete monitoring of users’ actions on local and network computers. The program records the content of title bars, including website names and URLs, as well as the names of documents opened by users. CUR will also let you know the name of the user responsible for a specific action when it’s clicked in the action log. Note that the program will only work with user accounts that have write permissions. The log of users’ actions can be viewed using the program’s control panel. The software is fully compatible with Windows 95/98/2000/NT/XP and ME.
The software is provided on a «try before you buy» basis, so you can use it for a month prior to purchasing a license.
Stealth Activity Reporter 4.6 This is a monitoring tool for both networked and personal PCs. It lets companies and individuals track use and abuse easily and invisibly using password-protected encrypted log
Home Computer Users Highly Vulnerable Home computer users who think that they are well protected from malevolent acts should think again. The vast majority of home computers operate at risk of intrusion by invasive code, according to the results of a study conducted by America Online and the