A few, including Net Nanny, Safe Eyes, and OnlineFamily.Norton, can log IM conversations. Any attempt to get online when access is blocked simply fails-again, with no message or warning.- Next: Comprehensive MonitoringĪlmost every parental control product logs attempts to visit blocked sites, and most can log all sites visited. A weekly grid like what you find in K9 Web Protection 4.0, NETBLOX, and most other parental control systems lets you define just when Internet blocking occurs. You can choose to block all Internet access or selected protocols–e-mail, FTP, Kazaa, and so on. Messages to or from a blocked contact simply don't go through. This feature specifically applies to AIM, ICQ, Yahoo!, MSN, or MySpace chat, Here, too, it's stealthy. It can also block all contacts except those listed. Like OnlineFamily.Norton Spector Pro can block specific IM contacts. There's no warning page when the app blocks a Web site-navigation simply fails. To block a Web site found in the Web activity list, you just click a button you can also enter sites manually. Spector Pro doesn't include the category-based Web site blocking found in Net Nanny, Safe Eyes 5.0, and most parental control systems. Spector Pro launches from an unusual startup location and doesn't show up in Task Manager. The program files likewise get random names. It stores its data files with gibberish filenames and a random extension in a random-named folder, different for every installation. Promise or no, however, the program is designed for stealth. ![]() There's even an option to display a warning at logon. During installation you must agree that you own the computer and that you'll notify users they're being monitored. ![]() ![]() There's no question that you could use this program to spy on a rival colleague or wayward spouse, but SpectorSoft makes you promise not to. Best Hosted Endpoint Protection and Security Software.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |