-
STAR logs keystrokes, user name, passwords, visited URLS, path names, access times and windows title of the active application. - All invisible!
access times  active application  encrypted textfile  internetsession  logfile backdating  log URL  path names  visible logging  windows title 
www.stealthactivityreporter.net - 2009-02-07
|
laptop
laptops
notebook
robocalls
computer service
raleigh
bartolini
forest
robo calls
suspend
wake
networking
ups
computer repair
support
durham
corriere
monitor
mailboxes etc
|
|