![]() ![]() That is because eBlaster records chat conversations, keystrokes typed and the names of web sites visited and can notify you via e-mail as frequently as every 30 minutes. On the other hand, if you will only have occasional access to the computer your children use, and yet you want to see basic reports of the web sites they are visiting and transcripts of their chat sessions, then eBlaster is likely the more appropriate product for you. ![]() (E-mails, chat conversations, instant messages, web sites visited, keystrokes typed - Spector records all of this by continually taking snapshots of what is on the computer screen and allowing you to play back these snapshots at your convenience.) If you have access to this computer frequently, and can check the computer for a few minutes once or twice a day to see what you children have been doing online, then Spector is probably the more appropriate product for you because it will be able to SHOW you in EXACT detail what they have been doing. Let's assume that you are a parent who wants to monitor the Internet activity of your children and that you will be installing on the computer your children use. What is the difference between Spector Pro, Spector and eBlaster? Which product is right for me? ![]() The software is easy to install and, although the system has a number of components that can be distributed across several systems, all the server and control software can be installed on one system.14. Monitoring software must be installed on each system, which will then record all activity that takes place, feeding it back to the central server systems that store the data for later analysis and display. The Dashboard display is where it all happens. From here, the administrator can see user timesheets, application usage, website visits and keyboard activity in graphical form, showing a snapshot in a given time frame. More useful from a security perspective is the Security Favourites display, showing which users have been most active in areas such as file transfers to removable media, file downloading, printing documents, sending email with attachments and using webmail. All these activities are potential security risks. The Productivity display reveals which users visit which websites, who spends most time doing internet searches, who uses the most bandwidth, who sends the most email and which apps are used the most. These may be indicators of a productive employee, but they can just as easily show an employee who spends a lot of time watching online videos and chatting to mates.Īll this information can be put to a variety of uses. Analysing the website activity could indicate which sites need to be blocked, but could also indicate a resource that employees find essential for their work, which could be replaced with an in-house product. The system provides the evidence to distinguish between the two by providing a complete transaction list of everything a user did in a particular activity in a given time frame. The system can report a user’s activity down to the keystroke level, providing details of what apps were involved, and also supplying screenshots taken at the time the activity was logged. This last feature is available for all the recorded activities and eliminates any chance of misinterpreting an activity. A URL may be just a string of characters, but a screenshot is unambiguous. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |