Skip to main content

BlackBox Security Monitor – Monitor user activity on a network

BlackBox Security Monitor is a kind of spy application software that allows administrators to monitor and oversee user activities on other computers on a network.

The software guides the administrator through a short wizard type program via which the administrator adds computers and users to monitor on BlackBox Security Monitor. It’s possible to monitor activities of only specific users. The program than monitors the following activities and events on the computers:

  • Every Program launched: when program was started/ended, what is the program name, what is the text in program title
  • Every Web site visited: the web site address, when it was, even the IP address
  • All Web Searches: what was this search for
  • Computer usage time
  • All E-Mails sent and received
  • All Web Mails sent and received on HotMail/LiveMail, YahooMail, Google GMail, AOL Web Mail
  • Instant Messengers chat and conversations via Windows Live Messenger, AOL, Yahoo/ICQ, Jabber, etc
  • All keystrokes typed
  • Record screen captures in color and high resolution with highest compression rate available
  • Total network traffic

blackbox-monitor

If any of these activities triggers an alert, as configured by the administrator for instance, a user exceeds network traffic limit, BlackBox Security Monitor will issue warnings on the administrator’s email or cell phone. The alerts include a summary of events that caused the alert along with a brief usage history.

Several different reports creating options are available from within the program. The administrator, for example, can generate reports for

  • 10 Most popular programs
  • 10 Most popular Web sites
  • 10 Most popular searches on the Web
  • 10 Most active Instant Messenger users
  • 10 Most active E-Mail users
  • etc.

BlackBox Security Monitor offer business enterprises and home networks alike a free solution for robust computer monitoring. It should be noted that the software can also be used to monitor activity on a single computer but the lack of stealth makes it unsuitable to be used as a spying tool. This is not a limitation or flaw because the software is not designed to be used as such.

Comments

Popular posts from this blog

How to Schedule Changes to Your Facebook Page Cover Photo

Facebook’s current layout, the so called Timeline, features a prominent, large cover photo that some people are using in a lot of different creative ways. Timeline is also available for Facebook Pages that people can use to promote their website or business or event. Although you can change the cover photo as often as you like, it’s meant to be static – something which you design and leave it for at least a few weeks or months like a redesigned website. However, there are times when you may want to change the cover photo frequently and periodically to match event dates or some special promotion that you are running or plan to run. So, here is how you can do that.

69 alternatives to the default Facebook profile picture

If you have changed the default Facebook profile picture and uploaded your own, it’s fine. But if not, then why not replace that boring picture of the guy with a wisp of hair sticking out of his head with something different and funny?

How to remove watermark from an image or picture

A watermark is any recognizable text, logo or pattern that appears over an image to identify the owner of the image and generally used to prevent unauthorized reuse of the image. Watermarks are usually transparent and can be difficult to remove. The difficulty or ease of removal depends on the content of the image and the position, color, size etc of the watermark.