What applications are there to track a VKontakte user? Programs - keyloggers, choose keylogger.

Here you can see statistics on the time spent in social network VKontakte, for any user on VK (vk.com), or find out who he (a) likes, see the user's hidden friends, find his hidden groups, find out which of his friends was online (perhaps he communicates with him). hidden contact and hidden friends vk are in the menu "Friends", which is available after the user has been added to the watchlist. Find out the user's IP, his browser, open dialogs with whom he is communicating now (menu "Trap"). View hidden date of birth, user registration date (menu "Hidden info"). Find out who added you to the hidden list (menu "Blacklist").

Instructions for use:

1. We go to the page to the person we want to follow. (for example Dmitry Medvedev: vk.com/id53083705)
2. Copy link from the address bar of the browser (select and press Ctrl+C).
3. Paste the copied link into the form below and click "Statistics".

Enter the ID or link to the user's VKontakte page:


Menu available after adding a user:

Online- time/schedule of visits by the user vk.
Avatars- checking likes on avatars, photos of friends and like users.
Entries- find likes on the walls of friends and like users.
Groups- check likes in groups, find hidden user groups.
Comments- search for comments on open walls and VKontakte groups.
Friends- , fixing new/deleted.
Fakes- search for fake user.
Surveillance- fixing friends / subscribers, who was added to whom first (sent a request).

Attention:

Users inactive for more than 2 weeks are deleted. from the base.
To prevent your user from being deleted, go to his statistics, menu item "avatars" and press "Quick search" .
2 weeks (14 days) are counted from the date of the last check.

Random Users:

UserOnlineFriendsAvatarsEntriesGroupsAdded
My page29.08 14:09 25.10 24.10 10.10 14.01.15
Welcome24.11 18:20 21.10 20.10 05.10 02.06.15
Nika Kisa24.10 18:32 06.09 24.10 25.10 10.03.16
Julia Karachevskaya25.10 22:39 23.10 23.10 23.10 10.03.16
Alice Alice26.10 04:06 25.10 25.10 25.10 10.03.16
Active surveillance for: 53235 users

Group monitoring: (temporarily suspended)

Access after authorization (top left "Login VK")

Random Communities:

News ->

16.11 VK banned vk3.city4me.com therefore, authorization did not work on it, added a new one vk4.city4me.com
22.11 Banned from switching to vk4.city4me.com, added vk5.city4me.com to go from VK (invite friends)
17.12 Backup sites didn't work vk-express.ru And vk-spy.ru, corrected. If possible, use vk.city4me.com
19.01 Glitched online - the spy missed some sessions. Corrected, if there are errors - unsubscribe in a personal / comments
30.01 The base has fallen a little, there is no data for the period from 29.01-30.01. Who bought bonuses during this period, unsubscribe in a personal, I'll check and add. Who invited friends invite again. Likes, surveillance, etc. during this period, turn it on and check again.
10.02 + search reach hidden groups, large groups according to the plan, everyone should be there, small ones may not be found.
14.02 + suspects, subscribers in the search for likes by avatars (photos), and slightly improved the search.
03.04 - bug in tracking when all friends/subscribers were added/removed again
05.04 + closing profiles from search engines and unauthorized users (-1 bonus)
08.04 ! the server lay down from about 20:00 to 1:00 (there may be no online during this period)


09.04 - freeze when checking comments in groups, skips stuck groups
15.04 + total online time of all your users, inactive remain in the list on the main
21.05 ! missed some online, corrected the code and reduced the timeout to 6 minutes, while it works clearly

Questions, feedback, wishes, suggestions for improving the service:

Attention:
1. We DO NOT do hacking, we DO NOT read other people's SMS even for a lot of money! Only questions about the spy! (

Perhaps every PC user at least once thought about the safety of confidential data on their own hard drive. Any person stores personal secret information on his computer, but he himself may not be aware of it. For example, through a PC, purchases can be made in online stores using electronic money or plastic card. Such a computer automatically becomes interesting for scammers.

The problem of protecting confidential data is not a single year old and there is no universal solution for it. Currently, there is a fairly wide selection of programs to ensure the security of a computer, for example, various antiviruses, firewalls, or restricting access rights. But you should not completely rely on these methods of protection, because in addition to virus attacks, there is a threat that comes from a person. How to find out what happens to a work computer when the user is on a lunch break or just walked away for a few minutes?

A few minutes is enough for an experienced user to find out a huge amount of information about the owner of the computer. The easiest way to get access to the history of negotiations on various instant messengers and to correspondence e-mail. In addition, in a few minutes you can remove the list of all system passwords in use, as well as view a list of all resources that the owner has visited. Should we talk about unprotected files and folders?

IN this review talk about specialized software products designed to spy on a computer and its user. Such utilities are often used on work computers, to control employees, as well as at home for organizations. parental control or tracking the actions of the second half.

Various firewalls and antiviruses treat these types of applications with suspicion and may consider signs of malware in them. Developers of such utilities indicate this on their websites. However, once the firewall is properly configured, it will stop responding to spyware.

This application will give users the opportunity to receive information about what actions are performed on the computer. The utility can work with multiple accounts operating system Windows also indicates the user name and actions taken by the user when reporting. In the settings, those accounts can be selected, upon activation of which the application will automatically start.

The program generates reports that contain information about all actions performed by the user, including: keys pressed, names of windows in which typing is performed, visited sites on the Internet, names of programs and files launched, as well as the time they were used. Among other things, the utility saves all messages from popular IM clients and takes screenshots at intervals specified in the settings.

The received information can be viewed both in the window of the program itself and as a report in HTML format. It also provides a search among the displayed data and automatic deletion of obsolete information.

Maxapt QuickEye is primarily targeted at corporate users. The program is most effective for viewing and analyzing reports. Thus, managers have the opportunity to quickly find out which of the employees worked and who did not. The application displays a list of all programs launched by the user, takes into account the time spent working with all utilities and how actively they were used. For example, the program window can be open throughout the working day, but the user worked with it for no more than an hour, the program will display all this in the report.

The program groups all running applications into categories, which makes it possible to enter the category of Internet messengers and quickly find out which of the employees spent little time on their work. In addition, the application supports grouping network computers into several categories, which further facilitates the process of working with it.

It is worth noting the ability of the utility to restrict access to selected applications, as well as to compile a whole list of prohibited programs for each employee individually.

Given software tool was previously known as KGB Keylogger. However, the functionality of the utility has not changed from the name change and, as before, the main advantage of this “spy” is the ability to remotely monitor computer activity. During the installation of this application, the user receives detailed information about how to properly configure the operation of the antivirus installed in the system for the correct operation of both utilities.

The Mipko Employee Monitor application is very well organized to work with multiple users, which is a significant plus for system administrators. Monitoring for various computers can be configured in various options. For example, for one user, you can set only application launch monitoring, for another, copy all typed text, etc.

The application is able to work in alert mode, that is, if the user performs certain actions or types certain words on the computer, the program marks him with an alarm icon and sends a warning to the network administrator.

The program allows you to apply special tracking filters, that is, the administrator can create a list of applications whose activity should be monitored, without paying attention to other utilities.

Of course, all this functionality would not be complete without taking screenshots. A screenshot can be taken both for the entire working area of ​​the computer and for the active window. Screenshots can be taken not only after a specified period of time, but also when a new application is opened.

The program is able to intercept messages in all known instant messengers, including: Yahoo!, QIP, ICQ, AIM, Skype, Miranda and others.

With this utility, the user can obtain various information about the use of the computer. The program monitors the contents of the clipboard, marks data on the activity of all applications, creates screenshots of the screen at specified intervals, takes into account the time the computer is turned on and off, tracks data on keystrokes and monitors files sent for printing.

The program starts with a custom keyboard shortcut and does not appear in the list running applications, not in the tray, but impersonates the corresponding folder in the start menu. Therefore, when using this spy, you should delete this folder.

This application has only one, but quite a significant drawback - the program accepts keystrokes only in the English layout, you should keep this in mind when choosing spyware.

The demo version of the utility works only for 40 minutes from the moment of activation, but in some cases this is enough to protect the PC, for example, during a break at work.

One of the main parameters of a spyware program is stealth. After all, if a bright, blinking icon with the name of the application “hangs” in the task manager, the user will understand that he is being watched and will be able to bypass the protection. The developers of the NeoSpy program have done everything to ensure that their application is completely invisible on the computer. When installing the program, you can immediately select a hidden or administrator installation. At hidden installation, the program folders will not be visible on your hard drive, desktop, or start menu. To start it will be necessary to use the command line.

This application, in addition to its invisibility, is endowed with good functionality. The program can intercept messages from popular instant messengers, easily captures the names of all launched applications, and also notes the start and close times. NeoSpy automatically creates screenshots at specified intervals, as well as during the launch of all utilities.

With the help of this spy, you can get detailed information about the activity on the Internet - the addresses of all visited sites, the time spent on the network and the amount of traffic spent.

We can say that the program makes it possible to monitor every user action on the computer. NeoSpy saves all text typed on the keyboard, saves data from the clipboard, tracks the creation and deletion of new files.

Elite Keylogger is completely undetectable by most antiviruses and does not affect the performance of the system as a whole. The application is declared as a means for continuous monitoring of activity for any period of time. Statistics are automatically classified by day, which provides quick and convenient access to administrator information. The utility allows you to create lists of users who need to be monitored.

The program can control the operation of most popular applications for communication over the Internet, captures e-mail correspondence, saves data on the activity of all applications and documents sent for printing. Elite Keylogger can save all received information to a separate folder on a network drive, upload it to FTP server or send by email.

Worth paying Special attention to remove this utility. If the user wants to remove Elite Keylogger, he will not be able to do this even with the help of special utilities, which control the startup of the operating system Windows systems. The only way to remove this application- go to the program and select the appropriate action in the settings.

This program designed to monitor human activity in local network. In addition to network monitoring, the utility also captures other user actions on the computer. The application intercepts the data of most well-known instant messengers, saves a list of all visited sites on the Internet and all the text typed on the computer.

In addition, the program is capable of automatic mode create screenshots at specified intervals, keep a record of all documents sent for printing, perform covert copying of edited files and documents copied to removable media.

The program stores all received information in a database on the administrator's PC, and can also send notifications to the specified computer under certain conditions.

And finally.

There is currently a wide variety on the market spyware and anyone who wants to install such software on a computer will be able to pick up desired application that meets all user requirements. Of course, such utilities are most in demand in organizations where there are serious requirements for the actions of employees at work.

More recently, spyware could only record keystrokes on the keyboard, but now they are able to control all user actions on the computer. Thus, software of this kind develops very quickly, and no one knows what functions will be introduced by developers in new versions of utilities.

In addition to tracking employees and loved ones, spyware can help you organize comprehensive protection confidential data on the computer.

Personal Monitor
YOUR CHOICE
for parental control

Easy to install, simple to use

Mipko Personal Monitor can be installed and used by anyone, as it does not require any special knowledge and skills. Just download the free demo and try it out!

Protection for your child

personal monitor for windows

Free version
for 3 days


What can do

Follow VKontakte

Not only the text of incoming and outgoing messages is saved, but also links to the profiles of the sender and recipient. In addition, Mipko Personal Monitor allows you to conduct selective monitoring of communication with a specific interlocutor. Comparison of this program with similar solutions shows that Mipko Personal Monitor monitors the activity of VKontakte, the most popular social network in Russia, more comprehensively. The reason for this is that our spyware has the most efficient message interception algorithm.

Visible/invisible operation mode

The program has two modes of operation: visible and invisible. Moreover, if you select invisible mode, then users will not notice the work of Mipko Personal Monitor.

Email reports

Instruction

The need to control actions user can be caused by a variety of reasons. For example, you want to keep track of your subordinates or check what your child is doing while working on a PC. Most often, the addresses of visited websites, launched during the operation of the program, and information entered from the keyboard are of interest.

Tracking visited Internet resources is very simple, for this it is enough to view the history (log) folder in the browser. You will see all the sites that the user visited. True, experienced users, having worked on, can clear the visit log or remove individual entries from it.

The most reliable way to control user is the installation of a tracking program on the computer. For example, you can use free program KGB Key Logger. It will allow you to be aware of everything that the user does on the computer. It has a visible and invisible mode, monitors keystrokes, keeps track of visited sites, can take screenshots (screenshots). The intercepted information can be sent to Mailbox. At the same time, the program is absolutely legal, as it is installed on the computer by its owner.

Similar functions are provided by the ExtraSpy Employee Monitor program, which was created to provide management of enterprises with control over their employees. By installing this program on a computer, you will always be aware of what the person working on it is doing.

For remote administration computer, you can use the Radmin program. By installing its server part on the computer on which you want to control the work, you can connect to it via the Internet at any time. A screen that is updated in the current time mode will appear in front of you in the program window. remote computer, you will see everything actions user. In addition, you can view any folders and files, copy and delete information, run and close programs. This program is legal, you can download it from the manufacturer's website: http://www.radmin.ru/.

Related article

If a child spends almost all of his free time on the computer, parents may be interested in what websites he visits, what games he plays and what movies he watches. Sometimes vigilant spouses, in the name of preserving the family and peace of mind, are also not averse to checking what their dear half is doing on the Internet.

Instruction

You can purchase a hardware keylogger - a device that tracks keystrokes on the keyboard. Depending on the model, it connects to a USB connector or is inserted into the keyboard. Reports can be written to a special folder or sent over the Internet to another computer. The price of the device depends on the range of its functions and the amount of memory.

You can use a keylogger software such as Elite Keylogger. The developers claim that the program runs at the kernel level of the operating system and is therefore completely invisible to anti-spyware. Run the program and select one of the operating modes Visible mode ("Visible") or Unvisible ("Invisible"). For preliminary acquaintance and training, it is better to use Visible mode.

On the Logs menu, click View logs and enter the password you will use to view the logs. Mark the date you are interested in on the calendar and click View logs for... The left side of the window will display the user account, the list of keys pressed, the date and time of the event.

After completing the previous steps, test your computer. If the traffic continues to be used uncontrollably, open the command line: "Start" - "All Programs" - "Standard" - " Command line". Type the command netstat –aon and see the list of current connections - they will be marked as Established. On the right side of the window, you will see a list of process IDs - PIDs.

Enter the tasklist command in the same window. You will see a list of running processes, their IDs will be indicated in the second column. By matching the PIDs in the connection list with the IDs in the process list, you can find out which processes are using the internet connection.

If you cannot determine which program it belongs to by the name of the process, use the AnVir Task Manager utility. Run it, find the one that interests you in the list of processes. The information on it will indicate both the executable file and the autorun key in the registry. The AnVir Task Manager utility also shows the current connections, it is very convenient to use it for system diagnostics.

If you need full control over your , install and run the BWMeter program. Open the Details tab and click Start in the Control panel. The program window will list all connections with ip-addresses. Additional program windows will give you full information about traffic. You can enable logging; all information about the traffic used will be stored in text file.

note

This article will be especially useful to those users who use tariff plans Internet connections, which imply a restriction on Internet traffic. Let's first understand what Internet traffic is. Internet traffic is the information that you receive and send when you work on the Internet (incoming and outgoing traffic).

A computer spy program will help you find out what your child or employee is doing on the computer, as well as clarify which sites they visit, with whom they communicate, what they write to and to whom.

To do this, there are spyware - a special kind of software that collects information about all its actions unnoticed by the user.

A spy program for a computer will solve this problem.

Spyware for a computer should not be confused with a Trojan: the first is absolutely legitimate and is installed with the knowledge of the administrator, the second gets on the PC illegally and carries out hidden malicious activities.

Although malicious programs can also be used by legitimate tracking programs.

Spyware applications are most often installed by business executives and system administrators to control employees, parents to spy on children, jealous spouses, etc.

At the same time, the “victim” may know that she is being monitored, but more often than not, she does not know.

Overview and comparison of five popular spyware

NeoSpy

NeoSpy is a universal keyboard, screen and user activity spyware. NeoSpy works invisibly and can hide its presence during installation.

The user who installs the program has the opportunity to choose one of two installation modes - administrator and hidden.

In the first mode, the program is placed openly - it creates a shortcut on the desktop and a folder in the directory Program Files, in the second - hidden.

Program processes are not displayed in the manager Windows tasks and third-party task managers.

Functionality NeoSpy is quite wide and the program can be used both as home tracking and in offices to monitor employees.

Real Spy Monitor

The next spy is Real Spy Monitor. This English-language program not only has tracking functions, but can also block certain actions on.

Therefore, it is often used as a means of parental control.

For each account in the Real Spy Monitor settings, you can create your own, for example, to visit certain sites.

Developers position Actual Spy as a keylogger (keylogger), although the program can do more than just record keystrokes.

It controls the contents of the clipboard, takes screenshots, monitors website visits, and other things that are included in the main set of spies we have reviewed.

When installed, Actual Spy creates a shortcut in the Start menu, so it can be seen by the user.

The launch also occurs openly - to hide the program window, you must press certain keys.

Opportunities Actual Spy is not much different from the capabilities of competitors. Among the shortcomings, users noted that it correctly records keystrokes only in the English layout.



Loading...
Top