Track Who’s Using Your Windows Computer When You’re Not Around
The common response is to secure a computer with a password. But sometimes that’s not enough or, in the case of family PCs, not possible. Fortunately, there are several ways to see what’s happening on your PC when you are not around.
Who’s Using Your Computer? Have A Look!
The easiest way to tell who is using your computer is to snap a photo. There are several ways to do that, butthe best is iSpy, an open-source software that I’ve recommended in the past. You can download iSpy for free from the software’s website.
As you may have guessed, iSpy uses your webcam to keep tabs on your PC, and it specifically offers motion tracking and automatic photo/video capture. This makes it a fully automated system that you can set up once and forget. Here’s how to get started.
After installing and launching the software, look for the Add button in the upper left hand corner. Click it and then hit “Local Camera.”
This will bring up a video source menu with a number of tabs. By default it should select the “Local Device” tab which will include a drop-down list of webcams currently connected to your PC. Select the webcam you want to use and also adjust the resolution as desired. Since you’re not looking to record constantly, you should select a relatively high resolution like 1280×720 or even 1920×1200. Once done hit “Ok” to add the camera.
Now the edit menu will appear. There’s a lot here, so it can be confusing, but there’s just a few settings you need to worry about.
First, go to the Motion Detection tab. Make sure the “Use Detector” drop-down menu has the “Two frames” setting selected. Your window should appear as below.
Now that you have motion detection set up, go to the “Images” tab. Here, check the “Local saving enabled” box. That will save your photos to your computer so you can view them later.
There is a flaw in this plan, of course. The person snooping may notice the webcam is on and go searching for the photos taken. You can get around this by going to the “Alerts” tab. In the “Select Action” drop-down box you’ll see the option to send an alert via email, SMS or Twitter. Photos can accompany these alerts giving you an instant look at the perpetrator.
You have to be a subscriber for this to work, however. A basic (one user) subscription can be had for $7.95 per month or $69.95 per year. Alternatively, you can set the iSpy media directory to a networked drive. That will make the photos harder to find, but there’s no way to receive alerts for free.
Something else you may worry about is iSpy’s visibility, as the default window is large and obvious. Never fear. All you need to do is close the program, then start it again using the iSpy (Silent Start) executable. You should find this easily with a Windows search. The program is still visible in the system tray, but by the time someone sees the tray item, you’ve already caught them red-handed.
Finally, iSpy will work while you have your computer locked by a password if you’re logged in to your account. The software will not work at first boot (before you log in) or if your user account is logged out.
Log Every User
Most people think keyloggers are malware. That can indeed be the case, but keylogging utilities can also be used for perfectly legitimate purposes. In fact, it’s one of the best ways to monitor your PC while you’re away. Unless a webcam, which can be circumvented with various old-fashioned techniques (wear a mask, throw a bag over it, unplug it, etc) a keylogger is very difficult to get around.
Of course, you’ll need legit software to do this, and it’s probably not a good idea to download the first free tool someone recommends. In the past we’ve had good experiences with Elite Keylogger (our review), Revealer Keylogger and All In One Keylogger.
Beaware that any keylogger is going to cause havoc with your antivirus. That’s because it does the same thing as malware trying to steal your passwords. Beware that you’ll need to whitelist the keylogging software and that you’ll need to disable your antivirus during installation.
All three of the options listed here ask you to spend money for their full version. However, Revealer Keylogger does provide limited functionality for free. The other two ask you to fork over some cash after their trial expires.
Take Automatic Screenshots
Another option that’s less detailed, but easier on your antivirus, is an automatic screenshot application. There are a few ways to set this up (you can even use hotkey scripts) but the easiest solution is TimeSnapper, a tool that takes a screenshot automatically every few seconds. You can download a free 30-day trial. The program’s $24.95 full license is $24.95 for an individual user.
This program is very simple. Once installed, it automatically takes screenshots every few seconds. Trial users can only take them every 10 seconds, but full version users can choose a custom interval. These captures don’t impact the way other applications work so there’s no way for someone who doesn’t know it’s running to suspect anything is amiss. The only way to tell it’s running is to examine the system tray, as it does leave an icon there while active.
TimeSnapper would be useful even if it only took screenshots, but there’s more to it than that. The program lets you play back screenshots in chronological order to see what happened while you were away. There’s even a reports function that will tell you how much time has been spent with various programs on your PC. While it’s intended to monitor your productivity, these features can just as easily be used to track how your PC is used.
Conclusion
These three applications accomplish similar goals, but there’s nothing to prevent you from using all three for the ultimate in PC monitoring. Installed in tandem, there’s no aspect of your PC that would go unmonitored; you’d know even if someone sat down, tried to log in, but failed to guess your password.
Do you monitor your PC, and if so, what tools do you use? Share your secrets in the comments below.
Image Credit: Shutterstock Source: www.makeuseof.com
No comments:
Post a Comment