REFOG Keylogger

REFOG Keylogger works like a tape recorder running in hidden mode.  It captures all the typed data, username, passwords, emails, chats etc. once the computer turns on. REFOG Keylogger is highly flexible, allowing you to configure multiple alerts on harmful or offensive keystrokes sent or received on their computer. Set your alarms, and get notified instantly with real-time alerts if a per-defined event happens on their PC.


Screenshots




Features


Keystroke recording

This function captures all data that has been entered by your children or an employee using a keyboard, including chats, usernames, passwords, emails, search queries and other content.

Web history logging

Even if users delete their browser's history, the information is retained in Refog's log database and always available via the reports function.

Screenshot history

This ensures that the log of what is being typed by the user is backed up with visual evidence of exactly what they are doing. With screenshot history, it is always possible to gather evidence if an employee is wasting the company's time.

Invisible mode and password protection

You may not want to disclose the act of PC monitoring, so Refog can work in special stealth mode, making it completely invisible even to a skilled PC user. It cannot be found in the program folder, control panel or tray.

Application monitoring and file tracking

Refog is able to record all programs executed on your PC, so it is possible to establish if your kid is playing games instead of doing his homework, an employee is wasting time offline (e.g. playing solitaire instead of working).

IM monitoring

Refog is also compatible with all major instant messaging software (e.g. AIM, Facebook®,Yahoo! messenger, Skype, ICQ, Google Talk, MSN).

Email reports

It is not necessary to gain physical access to monitored computers in order to view their logs. All reports can be delivered via email, and can be read anywhere.

Comprehensive settings and reports

It is possible to set the control levels of monitoring, enable/disable monitoring for given users, setup alert keywords and reports delivery, easily filter log files and much more.