Skip to main content

BlackBox Security Monitor – Monitor user activity on a network

BlackBox Security Monitor is a kind of spy application software that allows administrators to monitor and oversee user activities on other computers on a network.

The software guides the administrator through a short wizard type program via which the administrator adds computers and users to monitor on BlackBox Security Monitor. It’s possible to monitor activities of only specific users. The program than monitors the following activities and events on the computers:

  • Every Program launched: when program was started/ended, what is the program name, what is the text in program title
  • Every Web site visited: the web site address, when it was, even the IP address
  • All Web Searches: what was this search for
  • Computer usage time
  • All E-Mails sent and received
  • All Web Mails sent and received on HotMail/LiveMail, YahooMail, Google GMail, AOL Web Mail
  • Instant Messengers chat and conversations via Windows Live Messenger, AOL, Yahoo/ICQ, Jabber, etc
  • All keystrokes typed
  • Record screen captures in color and high resolution with highest compression rate available
  • Total network traffic

blackbox-monitor

If any of these activities triggers an alert, as configured by the administrator for instance, a user exceeds network traffic limit, BlackBox Security Monitor will issue warnings on the administrator’s email or cell phone. The alerts include a summary of events that caused the alert along with a brief usage history.

Several different reports creating options are available from within the program. The administrator, for example, can generate reports for

  • 10 Most popular programs
  • 10 Most popular Web sites
  • 10 Most popular searches on the Web
  • 10 Most active Instant Messenger users
  • 10 Most active E-Mail users
  • etc.

BlackBox Security Monitor offer business enterprises and home networks alike a free solution for robust computer monitoring. It should be noted that the software can also be used to monitor activity on a single computer but the lack of stealth makes it unsuitable to be used as a spying tool. This is not a limitation or flaw because the software is not designed to be used as such.

Comments

Popular posts from this blog

How to Record CPU and Memory Usage Over Time in Windows?

Whenever the computer is lagging or some application is taking too long to respond, we usually fire up task manager and look under the Performance tab or under Processes to check on processor utilization or the amount of free memory available. The task manager is ideal for real-time analysis of CPU and memory utilization. It even displays a short history of CPU utilization in the form of a graph. You get a small time-window, about 30 seconds or so, depending on how large the viewing area is.

How to Schedule Changes to Your Facebook Page Cover Photo

Facebook’s current layout, the so called Timeline, features a prominent, large cover photo that some people are using in a lot of different creative ways. Timeline is also available for Facebook Pages that people can use to promote their website or business or event. Although you can change the cover photo as often as you like, it’s meant to be static – something which you design and leave it for at least a few weeks or months like a redesigned website. However, there are times when you may want to change the cover photo frequently and periodically to match event dates or some special promotion that you are running or plan to run. So, here is how you can do that.

Diagram 101: Different Types of Diagrams and When To Use Them

Diagrams are a great way to visualize information and convey meaning. The problem is that there’s too many different types of diagrams, so it can be hard to know which ones you should use in any given situation. To help you out, we’ve created this diagram that lays out the 7 most common types of diagrams and when they’re best used: