Don’t forget to Subscribe to our RSS feed
LIVE AND CONTROL FEATURES:-
- Real Time Screen Viewer - SniperSpy allows you to watch the remote PC's screen like a television live in your browser.
- Remote File Browser - Silently view the entire file system of the remote PC and download any file you wish.
- View Active Processes - View a list of running processes on the remote PC. Kill any process you choose.
- Launch Application or Web Address - Covertly launch any application or URL in the browser of the remote machine.
- Send Message to User - Send a discreet "Message from Admin" alert to the user at anytime. They can even reply.
- Reboot / Shutdown / Logoff - Remotely reboot or shutdown the PC or choose to logoff the current user from Windows.
ADDITIONAL FEATURES:-
- Remotely Deployable - Allows you to install the software from any location using a simple file you easily create.
- Locally Deployable - You can still install SniperSpy to a local computer. Simply run the exe module locally.
- Optional Remote User Alert - You select whether or not the remote user will be notified that they are being monitored.
- Anti Spyware Blocking - Forcibly block programs that could be a potential threat to SniperSpy's stealth operation.
- Remote System Information - Retrieves system info such as CPU class, memory status, operating system and more.
- Log Viewing Enhancements - Unlike the rest, SniperSpy breaks logs into pages and gives easy checkbox selection.
- Searchable Logs - Are you worried about specific keywords? Type them into the search to search ALL logs!
- User Filter - Log viewing screens can show results from all users or results from a specific user.
- Remote Uninstall - When your spying project ends you can remove SniperSpy through the Online Control Panel.
SYSTEM REQUIREMENTS:-
- Windows 2000, 2003, NT, XP, Vista & 7
- Pentium or AMD 433mhz or Better Processor
- 64MB RAM
- A Standard Dial-up (56k) or High-Speed Internet Connection
DOWNLOAD SNIPERSPY KEYLOGGER FOR MAC
DOWNLOAD SNIPERSPY KEYLOGGER FOR WINDOWS
Subscribe And Get Ethical Hacking Book!





