TrueActive Monitor, true to its name, monitors all PC activities on a computer it's been installed on, including any programs running; keystrokes made; and files altered, created, deleted, moved, or renamed. In fact, its "live monitoring" will let you "see" screen captures by activating its customizable setup where you can set screen capture periods anywhere from once every second to once a day.
Another tool in TrueActive's setup bag of tricks is stealth e-mail. Want to be notified of an action or event that you want to watch happen? Just set the stealth e-mail to send a message indicating that activity to any valid e-mail recipient via the Web. The data can be sent whenever an Internet connection is made or on a timed basis. Just remember the obvious: the PC you're monitoring must have e-mail access first if TrueActive is going to secretly notify you.
Other options include administrative password protection, reporting modules, choice of a user-defined or pre-defined selection list of activities to monitor, Web page password capturing, and video capturing if a camera is attached to the computer.
Additionally, if the site you are monitoring is networked, TrueActive has a solution for you. Its "network manager" permits you to install, monitor, edit the setup, and start and stop monitoring remotely with a simple-to-understand user interface that indicates the status of each program installation as well as the PC's name and who is logged on to it.
So when you find yourself forced to work within a foreign I.T. department, you won't necessarily have to visit the PC you want to monitor. It can be handled remotely, if the appropriate directory services are in place, from anywhere within its network cloud. The significant benefit with this feature is the fewer people involved with your surveillance, the better.[PAGEBREAK]