Chats conducted with standard stand-alone apps, like AIM, Adium, and iChat, are logged and reported as complete transcripts but if the person you’re monitoring is using something like Facebook’s built-in chat application, you’ll need to use the program’s keystroke log to figure out what was being said. Spector Pro is subject to the same limitations as eBlaster when it comes to monitoring conversations that may be taking place using chat applications. When used in tandem with Spector Pro’s search feature, these screenshots allow you to quickly assess what the user you’re monitoring is doing when visiting specific Web sites. Select the program’s Web Sites Visited tab and hover your mouse over anything in the log of Web sites visited, and Spector Pro will display the snapshot that was taken at the time the log was updated. But there’s an additional benefit to these snapshots that goes beyond a simple movie. First, because Spector Pro is taking pictures of the screen every few seconds- Screen Snapshots, in Spector Pro parlance-you can watch these pictures in sequence just like a movie, speeding up or pausing as necessary to skip useless information or take a closer look at questionable material. Taking into account the potential limitations of shared folders, what Spector Pro offers in terms of reporting is amazing. eBlaster’s secretly e-mailed reports avoid this possibility altogether. Plus, if the user had changed their password after they gave it to me, and I hadn’t given myself rights to the folder where the log files reside, I’d no longer have access to the data. In many cases this won’t be a problem, as long as you have administrative access to the Mac you’re monitoring but when I tried to install the software on a computer that I didn’t have administrative rights to, it required me to do a little social engineering and talk the user into giving me their password, without raising any suspicion as to why I might need that password. While eBlaster collects information and sends reports via e-mail to someone else, Spector Pro requires the computer on which you’re viewing the reports to have access to the log folder on the monitored computer-which means that File Sharing has to be enabled on the target computer, and that you have to have rights to the folder from which the data is being shared. And it’s this fact that, for me, somewhat limits the usefulness of Spector Pro. But, while the application can’t be located, depending on where you choose to save the files Spector Pro uses to store its logs, it may be possible for someone with a bit of computer savvy to locate those files and wonder what they are. ![]() The only way to open the program on the Mac being watched is by pressing a user-configurable key combination and entering a user-defined password. Once installed, Spector Pro is invisible to the person using the target computer, and can’t be found by using Spotlight or by looking in the Applications folder. While most keylogging software is designed to capture and report keystrokes, Spector Pro goes a step further, capturing screenshots every few seconds, so that you can see as well as read everything that’s happening on another Mac. When direct and open fails, Spector Pro handles its rather unsavory job with aplomb and with a bit of a twist. ![]() ![]() Aimed at companies that want to control employees’ online activity, or at worried parents wondering what their teens are up to online, SpectorPro makes tracking this activity simple, but I wonder if the behaviors that this software is designed to track couldn’t be controlled in a more direct and open way. I understand why software of this sort-also known as keylogging software–is sometimes necessary but it’s software that some people will find difficult to get comfortable with. Spector Pro mac 2009, like its sister applicationĢ009 ( ), is software that specializes in capturing every keystroke on one computer so it can be viewed by someone else on another computer.
0 Comments
Leave a Reply. |