Tuesday, April 26, 2011

Spy Your Friend With HT Employee Monitor

HT Employee Monitor is a software which tracks and records all your employees' computer activities and gives you remote access to this information, including typed keystrokes, visited websites, opened and closed applications, screenshots, and more. The software helps you to increase employee productivity with monitoring, as well as by blocking activities that are not work-related such us instant messengers, installers, specified web content, etc. 

Key features:
Web History
The most important feature in regards to monitored activities is a list of visited websites, which highlights employee activities that are not work-related. The Web History feature records the URLs and page titles of visited websites, as well as timestamps. Even if employees clear their web browser's history it does not hide their viewing of inappropriate internet content. The program is compatible with all versions of the following browsers: Internet Explorer, Firefox, Opera, Chrome, and others.

Keystrokes Recorded
Our employee monitoring software records all typed keystrokes in any application including chat, email, word processing, web browsers and others. The Keystroke History log report includes typed text, title of document, and timestamps. See exactly what employees type on the computer!

Application monitoring
Another feature of our Employee Monitor is the tracking of applications used by employees. It lets you find out if an employee is wasting time at work (e.g. playing solitaire instead of working). The detail log reports will tell you exactly which applications were run and when, and also record application window titles so you can see exactly what your employee was doing.

Screenshot Capturing
Screenshot history provides visualization of employees' activities which can make it obvious just what employees are doing. Employee Monitor captures a full color computer screenshot with customizable intervals and image quality.

Computer Activity
Our employee monitoring software tracks the time a computer was turned on and off. It gives a manager the opportunity to know exactly how much time employees spend at the workplace, and therefore to take measures against truancy and lateness.

Remote Monitoring
It is no longer necessary for managers to manage employees in person. The remote monitoring feature enables viewing of employees' PC activities with just a few mouse clicks via the e-mail delivery of log files. So even when you are far from the office you will know what your employees are doing. Let your employees know that managers and supervisors can see what is happening on their computers in real time even from remote locations — it improves discipline and productivity!

Block Websites / Filter content
Without monitoring employees have the temptation to surf the Internet and waste work time. Our software can help to prevent weak-willed employees from doing this. The Block Websites feature disallows inappropriate Internet content by categories, URLs, or keywords. For example, you can block Facebook.

Block Applications
Games, instant messengers, web browsers, network games, etc. can be big time-wasters. Sometimes a large group of employees plays a network game for hours, and everybody knows about it except the boss. Employee Monitor allows you to block instant messengers, games, and any other programs that managers want to prohibit. For example, you can disable Internet Explorer at all.

Block Installers
Sometimes the most harmful thing to a computer can be a newly installed program. Databases, servers and desktop computers can be crashed by inexperienced PC users who try to install new applications that may contain spyware, adware, or in the worst case, viruses.

Multi-user
The program allows you to monitor and limit every PC user account independent of its rights. It is convenient for managers to create a few user accounts with different sets of rights, and monitor and limit them with our computer monitoring software in different ways.

Invisible mode and password protection
You may want to hide the act of computer monitoring, so HT Employee Monitor can work in a special stealth mode. Only the owner of HT Employee Monitor who knows the special hotkeys can access the program. In addition, to prevent employees accessing and uninstalling the software, you can set a password. The combination of invisible mode and password provides stronger protection. 

Hide Your Identity While Hacking – Hide My IP

Did you know your IP address is exposed every time you visit a website? Your IP address is your online identity and hiding it is the smartest thing you can do to protect your privacy online. You may want to hide your identity just because you want to be anonymous, or maybe because you are doing illegal stuff. Either way here is how to hide your identity online.

Hide My IP masks your true IP address to protect your anonymity while surfing the Web. This application will deliver you several fresh anonymous proxy servers every time you will launch the program.

The main benefit of this software is that you can’t be traced when browsing websites. Also if a website is restricted for users from specified country the program can bypass that protection.

Hiding your IP address is as simple as clicking the “Hide My IP” button, which installs a “fake ip” in your favorite web browser including Internet Explorer, Firefox, Google Chrome, Safari, Opera, Netscape, and many more! When you close Hide My IP, your Internet settings will revert back to normal.

Hide My IP Top Features:

Anonymous Web Surfing

Prevent others from seeing your true IP when browsing the Internet. Change your IP frequently with the click of a button!

Protect Your Identity

Identity thieves can use your IP address to monitor your web activity and intercept your private financial information. Criminals, hackers, and even the government can trace your exact location right down to your street address.

Encrypt Your Internet Connection

Prevent your Internet Service Provider or hackers on wireless networks sniffing your web browsing traffic by using the “Encrypt My Connection” feature, which creates a secure 128-bit encrypted link between your computer and your hidden IP.

Send Anonymous E-mails

Prevent your real IP address from being shown in E-mail headers on any Webmail E-mail service such as Yahoo, Hotmail, or Gmail. It is very for anyone to find your geographic area you send E-mail from using free publicly available IP lookup tools.

Un-ban Yourself From Forums and Message Boards

Have you been banned from a forum or message board? No problem! Use Hide My IP to change your IP and clear your browser cookies, allowing you to access any website that has banned you such as eBay, Craigslist, and many browser-based games.

How It Works

When you browse the Internet normally, your computer makes a direct connection to the websites you visit. With Hide My IP running, an anonymous proxy server is set to relay information between you and the websites you visit, hence web sites see the fake relay IP and not your real IP address.
Where are these fake IP addresses located? Hide My IP selects a random IP from a list of hundreds of anonymous fake IPs from all over the world. The chosen IP is then automatically installed into your web browser, e-mail client, game, or other application you specify Hide My IP to work with, allowing you to surf the Internet and use Internet-based software while remaining totally anonymous.


Control Your Computer with Your Cell Phone.

Remotely Control Your PC from Anywhere with Your Cell Phone!

Have you ever been away from your desktop and needed some information that was on it? Have you ever needed to shutdown your computer or do something underhanded while away? In this post I am going to show you how to control your PC from your Cell Phone.

There is a program called CellPC that allows you to perform operations on your home/work PC via your cell phone or wireless device quickly and easily. Imagine being able to shutdown, restart, or logoff your PC remotely... search files on your computer and then send them to your cell phone... view a realtime screenshot of your computer at anytime... lockdown your computer... send a message/note/reminder to your computer... and much more!

CellPC Top Features:

    Perform Shutdowns, Restarts, Logoffs
    View a Screenshot of your Computer
    Search for and Retrieve Files
    View and Close Open Windows
    Customizable Commands Editing
    Be Alerted when your Computer is Used View and Close Open 
    Applications
    Send Messages to your Computer
    Lock and Unlock your Computer
    Secure Command Execution
    Log all Access Attempts and Commands
    Disable/Enable Commands at will



How does CellPC Work? 
 Will CellPC Work for Me?

CellPC can work with any Windows computer as long as it has a steady internet connection while the software is running.

If you want to verify that CellPC will work with your device, contact the CellPC support team so you can send them a test message from your phone.

Remote Spy Software - Monitor any PC from Anywhere

Before monitoring software can record activity, it must be installed onto the computer it's going to monitor. In most cases, you have access to your computer and can simply walk up to it and install the program. But in some cases, you can't get to your remote computer to install the software such as a distant employee PC.
Realtime-Spy is a remote spy software solution that requires no physical installation, and is the first product to allow you to truly view activity logs from any location at any time!

It is the latest in high-tech surveillance and remote spy software that allows you to remotely install the monitoring system on any computer you own and access the activity logs from anywhere at any time via your own personal Realtime-Spy Webspace! No remembering long IP addresses or directly connecting to the remote PC - all you have to do is point your browser to your personal webspace address to view logs from any machines you deploy Realtime-Spy on! Realtime-Spy can log and record anything a user does on your computer, as well as display, in real-time, what users are doing and typing.

Realtime-Spy Top Features:
How Realtime-Spy Works

RealtimeSpy provides a remotely installable spy software without the use of IP addresses or direct connections to the PC(s) you are monitoring. View the image below for more information.



Once installed on the computer you wish to monitor, RealtimeSpy will connect to the RealtimeSpy Server to send all activity logs of the computer in real-time. If the computer is offline then it will queue (hold) the logs till the next time it is online. The entire transfer process is done silently and no notifications are given during the process.





 

Bypassing Firewall using Httptunnel.

Httptunnel creates a bidirectional virtual data path tunneled in HTTP requests. The requests can be sent via an HTTP proxy if so desired. This can be useful for users behind restrictive firewalls. If WWW access is allowed through a HTTP proxy, it's possible to use httptunnel and telnet or PPP to connect to a computer outside the firewall.


Here is how htc sends data to the destination:
  1. Open TCP connection to hts
  2. Send HTTP POST with a large Content-Length
  3. Send TUNNEL_DATA packets until POST Content-Length would be exceeded.
  4. Send TUNNEL_PADDING packets to exactly satisfy Content-Length - 1
  5. Send TUNNEL_DISCONNECT (1 byte)
  6. Close TCP connection
  7. Go to step 1

Here is how htc gets data from the destination.
  1. Open TCP connection to hts
  2. Send HTTP GET
  3. Wait for response from hts
  4. Read TUNNEL_DATA, then TUNNEL_PADDING, TUNNEL_DISCONNECT packets
  5. Close TCP connection
  6. Go to step 1
Tunnel creation and destruction


This can be useful for users behind restrictive firewalls. If WWW access is allowed through a HTTP proxy, it's possible to use httptunnel and, say, telnet or PPP to connect to a computer outside the firewall.

How to download complete websites and save on Pc.

When you discover an interesting website and want to copy a complete website to view it locally without internet connection. If in hurry, you can backup entire website on USB drive and view it afterward. Can be useful even if you want to save thousands of images from a webpage in one click.

HTTrack is a tool to save all the webpages from a specified website. The website downloaded when viewed offline looks exactly as it appears online. An exact mirror of the website is downloaded on your HardDisk with all the styles, background images and alignments keeping intact. The links pointing out of the page are also taken into consideration means those pages are also downloaded. For example: You have to download all the MP3 songs, Flash, videos or only some of them using Filters from a website all at once then WinHTTrack is a feasible option.

The sites downloaded can be used in your regular browser and there are no waiting times to load another page as all the pages are already stored offline in your Local Disk. Moreover, no active Internet connection required to access it. Personally, I used it to show  research pages of my Project to the concerned professor where internet connectivity was poor.

How to download complete website?

Enter Project name and Category (It can be anything according to the site you are downloading). Next the Base Path where the site will be downloaded.
More than one URL can be entered to be downloaded. Specify them in the box. You can specify filters to download specific extension of files like MP3, JPG or PNG from Set Options buttons.


Then Press Finish to start copying. You can prefer to shutdown PC after downloading is completed  as it may take few minutes depending upon the size of files hosted on site.
Now, to view the downloaded website go to the output folder and click on index.html file (general name) or open the HTTrack Website copier program and click Browse Sites from File menu.

Download HTTrack 


Folder Lock Without Any Software

Folder Lock With Password Without Any Software-
Paste the code given below in notepad and 'Save' it as batch file (with extension '.bat').
Any name will do.
Then you see a batch file. Double click on this batch file to create a folder locker.
New folder named 'Locker' would be formed at the same location.
Now bring all the files you want to hide in the 'Locker' folder. Double click on the batch file to lock the folder namely 'Locker'.
If you want to unlock your files,double click the batch file again and you would be prompted for password.
Enter the password and enjoy access to the folder.


if EXIST "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}" goto UNLOCK
if NOT EXIST Locker goto MDLOCKER
:CONFIRM
echo Are you sure u want to Lock the folder(Y/N)
set/p "cho=>"
if %cho%==Y goto LOCK
if %cho%==y goto LOCK
if %cho%==n goto END
if %cho%==N goto END
echo Invalid choice.
goto CONFIRM
:LOCK
ren Locker "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}"
attrib +h +s "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}"
echo Folder locked
goto End
:UNLOCK
echo Enter password to Unlock folder
set/p "pass=>"
if NOT %pass%==type your password here goto FAIL
attrib -h -s "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}"
ren "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}" Locker
echo Folder Unlocked successfully
goto End
:FAIL
echo Invalid password
goto end
:MDLOCKER
md Locker
echo Locker created successfully
goto End
:End