4 Tools For Tracking What Others Do On Your Computer Behind Your Back

Ads by Google

computer tracking softwareIn an ideal world, we’d all be able to keep our computers secure from unauthorized access. That’s not the world we live in however. Roommates snoop, significant others get curious, and family members decide to check up on each other – without permission.

If you suspect this is occurring, you can monitor your computer to see how it is being used when you’re away. Let’s look at some tools that will do just that.

Revealer Keylogger & AllInOne Keylogger

computer tracking software

The easiest way to tell what someone is doing on your computer is to use a keylogger. As you likely already know, this is a piece of software that logs keystrokes, which can then be retrieved later. You will be able to obtain information about what keystrokes we activated, thus providing an activity history.

If you’d like to stick with free solutions, Revealer Keylogger is a good choice. This utility logs keystrokes accurately and also records the process in which the keystrokes were logged as well as the time. The software can also be hidden from the user. It’s basic, but it works. Note that anti-malware software may quarantine this tool upon download, so you’ll need to remove the quarantine before you can install it.

computer tracking freeware

Want more features and options? Then you’re going to have to go paid. One of the better options is AllInOne Keylogger, which captures keystrokes like any other, but has advanced log filtering options and the ability to send logs to specified email addresses, FTP servers or networked computers automatically. In addition, this software can take screenshots and record sounds via microphone. You can use this option free for seven days, but it’s $69.95 afterwards.

SurveliStar Activity Monitor

computer tracking freeware

Ads by Google

Keylogging can pick up a lot of information, but sorting through it to make sense of web activity can be a pain. SurveliStar Activity Monitor provides a easier and more comprehensive way to track web activity.

Once activated, SurveliStar can pick up on a number of online activities including web browsing, file transfers, and emails. These are then logged for later review. The log are very detailed particularly where web browsing is concerned. Everything is picked up including web use through extensions, plugins, etc.

Surprisingly, this software is free. You only need to pay for enterprise use of the software, which starts at $69.95.

iSpy – Automatic Webcam Recording

computer tracking software

Let’s say that unauthorized computer use is just the beginning of your problems. What if you’re also concerned about what’s going on around your computer? A keylogger or activity monitor can’t help you there.

That’s where iSpy comes in. This free, open source software has the ability to automatically record video with your webcam while you’re away. It has motion tracking and scheduling features that allow you to record only when you need to, and it also has the ability to automatically upload recorded video to the web, including YouTube. That’s handy because it allows for remote storage of video immediately, keeping it safe from any attempt to delete it.

Heck, you can even access your webcam remotely via the Internet while it’s recording and catch your roommate eating ice cream in your bed red-handed.

Conclusion

The tools above provide a complete pack for monitoring your PC. You can find out what was typed, what websites were visited, what files were downloaded, and what emails were sent. You can even see what’s going on in front of your computer remotely via your webcam.

Still, there may be an element here that I’ve missed, or software that readers prefer. If you have some advice on how to monitor activity on your PC, be sure to post in the comments.

Ads by Google
Comments (25)
  • StealthGenie

    Only computer monitoring is not
    enough, try to monitor all communication devices. You can use StealthGenie for
    mobile spying. Activity monitoring is very necessary in this modern era.

  • James Romines

    Parents have a duty to protect their children, period. A poker-playing friend used to say “I trust everyone; I still cut the cards.” I would tell my children that I’m monitoring all internet access, not because I don’t trust them, but because I don’t know, and therefore can’t trust, the people on the other end of the connection I and they make while on the internet.

    I need to have proof of a bad person’s behavior to take to authorities in the unfortunate event that somebody tries to do bad things to anybody on a network I’m responsible for. After all, the police can’t do anything to the scoundrel, if I can’t show them ‘probable cause’.

    I also want to be able to block people and IP addresses attempting or starting bad behavior on my network. I’m not just monitoring members of my family. I’m also scanning my network for external activity that I need to prevent, so that I can keep my network up and running for our joint use. Computer Security involves:
         a) making sure users can access the network/internet
         b) making sure legitimate external users have access to internal/local
             resources they have need of
         c) securing local data so that it is not illegally accessed, changed, stolen
         d) being sure that viruses, ‘bots, trojan horses, etc do not compromise either
             internal or external access to the network and internal data.
    These are the formal requirements. I have and will discuss them with *_anyone_* wanting to use my internal network, including the computers, tablets, phones, etc. on it.

  • Cikaba

    If you find it “offensive” to spy on family or anyone, then why are you reading about spyware and keyloggers?

  • Cikaba

    Henk,

    Why are you here???

  • Rushnosh

    My question… out of the scope of the above comments … Very interesting comments I like to add…
    However are there any reports say if any of these keyloggers are installed onto your computer wouldn’t this be a gateway for potential hacks to gain information about your personal information?? I hear keylogging hacks all the time, and its quite bad.

    Say if a hacker gains accessed your computer, ran a “grep” command for say “Key” they can potenially do the same spying as yourself. Should this article also focus on the potential danger here, make sure the administrator logons are protected?

    Hence I guess there are clever “trojin horses” out there that could probably install the keylogger “all in one” and send logging information via email to the hacker.

    • M.S. Smith

      Presumably a hacker with access to your PC could turn your keylogger on you if they had proper access and found the keylogger. This seems like a minimal risk situation, though. Also, IIRC All In One Keylogger and Surveli Star had password protection options/features (unfortunately I don’t have them installed on this PC to double check). 

    • Rushnosh

      Thanks for the clearfication … I didn’t know some of these have password protection on there :D … I’ll probably have to play around with it a bit more and work out the kinks.

Load 10 more
Affiliate Disclamer

This review may contain affiliate links, which pays us a small compensation if you do decide to make a purchase based on our recommendation. Our judgement is in no way biased, and our recommendations are always based on the merits of the items.

For more details, please read our disclosure.
Affiliate Disclamer

This review may contain affiliate links, which pays us a small compensation if you do decide to make a purchase based on our recommendation. Our judgement is in no way biased, and our recommendations are always based on the merits of the items.

For more details, please read our disclosure.