Is there a program for tracking actions on a computer with the following features?

Need a program to monitor actions on the computer of a stranger with the following functionality:

1) you Can see what file / program opens on the computer
2) you Can see when I open these files (date and time)
3) the Program is recording keystrokes of the keyboard (like a Keylogger, for example ardamax keylogger. Suggesting further, the Board will say: ardamax is bad because it is impossible to see which files were opened if nothing is entered from the keyboard. That is, if the attacker just opened the file and nothing was introduced into it, in ardamax is not fixed)

The function of "recent documents" is not an option, since the attacker can easily clear the list of recently opened documents.
July 4th 19 at 23:58
9 answers
July 5th 19 at 00:00
Such programs have. Called JETLOGGER.

1) you Can see what file / program opens on the computer
2) you Can see when I open these files (date and time)

programs.png

+
3) the Program is recording keystrokes of

keylogger.png
July 5th 19 at 00:02
The virus view. Usually themselves of velosipedah.
"Usually velocipede" what does that mean? - Sydnee.Kling commented on July 5th 19 at 00:05
: Every now and then. The challenge for the company, where there is a regular programmer. - Jaqueline.Parisian commented on July 5th 19 at 00:08
July 5th 19 at 00:04
Cosmolite StaffCop. Well, I think the legality of your actions won't discuss - it's your business. So I kind fits your Salaam.
PS. Not for publicity. Personal experience.
To protect yourself - Sydnee.Kling commented on July 5th 19 at 00:07
: Can you come up with the excuse better. Monitoring employees. - Jaqueline.Parisian commented on July 5th 19 at 00:10
: It actually is like. - Sydnee.Kling commented on July 5th 19 at 00:13
Elkin Drin. Well I say, let's leave the legality aside. These things are, and you need to keep track of employees. We have to work with a StaffCop'averted a major drain of information to competitors. Take it and try and use it. - Jaqueline.Parisian commented on July 5th 19 at 00:16
: sucks you have a job, times the old rivals merge. - Jaqueline.Parisian commented on July 5th 19 at 00:19
People betrayal for different reasons - elenora_Carroll commented on July 5th 19 at 00:22
Yes no. It's simple - a bad culture in the company, then motivation is low, which implies low labor efficiency, and therefore small income, which leads to low wages. It is a vicious circle. Organize processes within the company, make it more open to people (employees). - raou commented on July 5th 19 at 00:25
I will not feed - elenora_Carroll commented on July 5th 19 at 00:28
: not on the merits of writing - raou commented on July 5th 19 at 00:31
Staff sucks. Stakhanovite taxis. - elenora_Carroll commented on July 5th 19 at 00:34
July 5th 19 at 00:06
Restrict physical access to a PC, or OS. All! Point.

to track actions on the computer of a stranger
1. Do not reinvent the wheel.
2. No need to "catch" employees on the bait: "PC "important" data," as the fish from the river is not ethical towards them.
3. Don't do Honneypot - it is not good to apply to employees of the company!
And the men do not know ... about the sharing of access to the OS.

In my experience, unhealthy such needs often arise at this trivial reason. - Sydnee.Kling commented on July 5th 19 at 00:09
Business is tough, he doesn't know regret. As a rule, the introduction of SMP ends with the layoffs of several people who quietly either steal something, or work on the side. - Jaqueline.Parisian commented on July 5th 19 at 00:12
: well, in General, the goal is always not the one doing SB...
Usually are aiming to: prevent leak of com. information.
What makes the SAT? Buck the leadership.
How? Puts here are traps to catch (to catch) people and give them leadership.
The task was - not to dismiss, but to prevent!
I.e. dismissing several people, they can not solve the problem.
That's what the problem is! - Sydnee.Kling commented on July 5th 19 at 00:15
: Well, why not? First, no man - no problem :) second, others will think. What do you think, for what purpose put the dummy cameras? (almost indistinguishable from the real one - she and the little red light and it moves). The problem of preventing leaks - it may be decided, depending on the size of the office and the allocated budget. Do not give money to the DLP and work as it should... - Jaqueline.Parisian commented on July 5th 19 at 00:18
: "Well, why not? First, no man - no problem :) second, others will think."
I.e., exaggerating Your quote: it is easier then one dummy squinting to hang when you log on and write a sign: "He tried to steal anyone.company data, but... he COULDN'T! But.... MAYBE YOU CAN DO THAT?!" :D
Cheaper and the effect will be stronger))) - Jaqueline.Parisian commented on July 5th 19 at 00:21
: Cool idea, but impractical :) Although kind of option use it - when You see the words "Attention, the room is under video surveillance" You are actually looking through the eyes of surveillance cameras or believe in the word, what it is? - elenora_Carroll commented on July 5th 19 at 00:24
in this case, especially without any options. Search - you can, but can not find, and then run into problems from SAT.
Same as: "In the laboratory without him.protection do not enter - possible virus outbreak!" There have even search is not necessary: either trust me, or check)
In any case: the best protection against data theft is the impossibility of carrying out the theft. But to give the opportunity to work with the data and not allow the partial (or full) data leakage - it's fantastic!
Only a substitution of concepts (avtosignalizatsy of proper nouns (names) through an ID or through a change of topics when communicating on a project using EXT.korp. network via auto-translator) for each of the employees of one Department can save you from data theft, reducing a full understanding of the process of working on the project this employee, leaving him to understand only part of it, over which it operates (micro-project).
Ie, one will try to talk about forest animals that he fed, and the other is about city building and infrastructure, although both can do the same (or different). The result: they can't understand how one dock to another and fit it in principle. And to make the old company out - will be even more unclear: what is this nonsense, where and how to apply.
Now it may look a bit strange, but in the future, for sure will work in various major companies. - raou commented on July 5th 19 at 00:27
July 5th 19 at 00:08
Usually these things use SMP - Monitoring System Users. But SMP monitors open files is useless, it's too low-level thing, one office opens and closes hundreds or thousands of files in the process. But there is key-logging, crooked truth - the text of the report is usually mixed. If you want exactly what you need, you will have to write yourself.
July 5th 19 at 00:10
we are now talking about DLP
July 5th 19 at 00:12
userlock.ru does such a software functionality under the client, for example
PR-I like sites, it would be worthwhile to pay attention to the design of this site and system analysis reviews.
And besides, I wanted to see a block diagram of a full-featured surveillance for possible threats. But unfortunately.... I did not see...
And without it - it's just all words....
Summary of PR-a: unsatisfactory. - Sydnee.Kling commented on July 5th 19 at 00:15
: with zero budget all Gud ) - Jaqueline.Parisian commented on July 5th 19 at 00:18
July 5th 19 at 00:14
I would advise You to look at opencarry solutions. For example there is Pupy
Pupy
colleagues recently advised quazar
quazar
July 5th 19 at 00:16
Idler a good thing, but open files it can not be monitored, because ideologically he is the heir of the Stakhanovite. Directs development where people, who previously led the team of Stakhanovite, but did not agree in their views on the future roadmap - Sydnee.Kling commented on July 5th 19 at 00:19
What you intend under the monitoring of open files?
We are not the heir of Stakhanovite, even in the presence of the head in our ranks of this company. - Jaqueline.Parisian commented on July 5th 19 at 00:22
: Author needed log file monitoring - what are the files opened by the program, even if they did not write anything. Such things are necessary, but very rarely - for example, when there is a strange program that looks for its settings, God knows where.
About Stakhanovite is you me throw. Me the name to call a person, who is now engaged in Interim, and before that worked at a Stakhanovite? He - suddenly - it may be Your head :) Inter is something that could be a Stakhanovite, if he develops as I would like a group. No, you have interesting ideas. Make the interception of mail, Yes to SSL, but to any client, not just Outlook, I will consider the replacement of the Stakhanovite on Idler hundred CALs, Carl! And so it is with me for a SMP is not worth arguing - before the introduction of Stakhanovite I even conducted the study :) - Sydnee.Kling commented on July 5th 19 at 00:25
: Yes, web client is mandatory - I often interface with Stakhanovite Linux get along. Yes, there is some feature here - do not send a message, the screen does not look... But operational supervision is, and I usually need it - Jaqueline.Parisian commented on July 5th 19 at 00:28
: The dispute is not a grateful thing!)
But the question was:
1) you Can see what file / program opens on the computer
Here is a link to the program interface:
"https://www.kickidler.com/ru/for-it/docs/section-m..."
The picture you see to the right all running programs and files, if you hover on any element from this list, the icon will appear to download video. That means you can upload the video according to a certain program for the user for the desired period and see what he was doing there. Even if you just opened the file, the information is there.

The name I can articulate). Andrey Ignatov great specialist and Manager. But the program is not written in a couple of months, and a competitor analysis was conducted. Launched in may 2015 and it would be foolish in entering the market to recruit an experienced person, if possible.

About email interception:
1. There is a Keylogger;
"https://www.kickidler.com/ru/for-it/docs/section-m..." in the filter, enter Outlook and all correspondence is visible.
2. There is a video with the screens of the monitors;
Upload the video on any app, website or program and all can see that to whom and where.
To implement shadow copying of transferred files, etc. is possible, but honestly not enough requests for such functionality, there are more interesting ideas. - Jaqueline.Parisian commented on July 5th 19 at 00:31
: The web client will be, but not for ease of viewing with Linux(for more pleasant buns), since we already supported it distributions). Here is the list:
"https://www.kickidler.com/ru/for-it/docs/installat..."
Now in beta support for Mac, server for Apple to write, of course, will not). - elenora_Carroll commented on July 5th 19 at 00:34
: My links do not correctly inserted, you will need to scroll a bit) - raou commented on July 5th 19 at 00:37
Alexander, a Keylogger is a Keylogger. This is undoubtedly a useful thing, especially if you are not mixing the characters like a Stakhanovite. The text is certainly readable, but let's say the password is necessary to calculate the fuzzy correlation. But I need the letter. With headers with attachments. In addition, there is the Stakhanovite such a feature as a grid of contacts - shows how many emails for example was made and sent at the interval to a specific contact. Andrey corresponded much on the subject of the necessity of intercepting the mail - I was going to conduct a little test drive, but decided against it - the problem is that works quite a lot, and I am one. Therefore, the more the work takes on the server - the less to do it to me. Idler more suitable for those who have a classic SB - operators looking at the monitors, I look at them once, I need more offline data that I can look and not "raw" video. Then the screenshots need to check for the interval and then crash...

If you want to chat - I don't think our talks here all interesting - my mail in profile. - elenora_Carroll commented on July 5th 19 at 00:40

Find more questions by tags AntivirusesMonitoringInformation securityviruses