http://i5.tinypic.com/4yug61i.jpg

Real Spy Monitor can monitor all PC activity including keystrokes typed, web sites visited, windows opened, program executed, screen snapshots, files/docs accessed and more. It can also record instant messenger conversations including AOL, ICQ, MSN, AIM, Yahoo Messenger, and capture web mail content from MSN, Hotmail, and Yahoo. The program can run in semi-stealth mode (visible in Task Manager) and automatically send logs to a specified email address. Additional features include screenshot capture and content filtering. The program does not include any documentation. Because it is sold commercially, most anti-virus vendors do not detect them. The most common form of a commercial monitoring tool comes in the form of a keystroke logger, which intercepts keystrokes from the keyboard and records them in some form of a log. This can then be sent to whoever installed the keystroke logger, or keylogger, onto the machine.

Powerful logging features:
Keystrokes typed - Record all keystrokes typed that include username ( who typed them ), time ( what time user typed them ), windows title ( which windows they were pressed in )
Websites visited - Record all websites title, websites address, time ( what time user visited them) ,username ( who visited them )
Windows viewed - Capture every windows title that were active, including username, time, application pathname ( the pathname where the application is )
Program executed - Track every application/executable filename and its pathname including the time user start/terminate application.
Screen snapshots - Automatically captures screen shots of the desktop or active window at set intervals.
Files/Docs accessed - Record the filenames and its pathnames that were accessed by user, including username and time ( what time user accessed them)

Powerful Report feature
All logs that was recorded will be listed in "Report Form". In this "Report Form", You can select the log you want to view, find the important information in large numbers of logs ( Find feature ), clear up the useless and unnecessary logs, make your own Log-Report with HTML File Format, execute all recorded application, audio file, flash file, picture file, video file etc.

Content filtering feature
Application filtering - You can select any executable file in your hard disk and block them from execution by your children or employee or someone else.
Websites filtering - You can enter a full website address or you can also enter a keyword that any websites containing in filtering list box. Once the Internet explorer address box contained them, your Internet explorer will be closed. Also you can allow only the URLs and keywords that were listed to be accessed.

Perfect Security feature
Stealth Capabilities - Run Real Spy Monitor in total stealth mode, it even can not be found in task list under Win9x system. ( the user will not know that it is running! )
Windows Startup Configuration - Load Real Spy Monitor on windows startup for a single user or all users ( perfect for multiple users of a PC )
Active Mode - Real Spy Monitor will already be monitoring when it is started.
Access Password Protection - Only the master of this product can be allowed to start/stop monitoring while it is running.
Stealth mode notice - inform user of the PC that Real Spy Monitor is going be running in stealth mode, and remind you the hotkeys to bring Real Spy Monitor out of stealth mode.

Email log delivery feature
Real Spy Monitor can send you recorded logs through e-mail delivery at set times - perfect for remote monitoring! You can set your own email subjects and select what type of logs you are ready to send. We have set a default ISP Mail Host that supports SMTP feature for you. Of course you can also set you own Mail Host that supports SMTP feature to send recorded logs for you.

User and PC actions time tracking
Real Spy Monitor will ALWAYS ( Real Time ) logs the current Windows user, the time and date for every PC actions.

Automatic log clear up
Real Spy Monitor can automatically clear up unnecessary or outdate logs from machine to save your disk space after a certain amount of data have been logged.