SoftActivity

SoftActivity TS Monitor 4.0 released

March 9th, 2016

SoftActivity announces the release of new version 4.0 of its TS Monitor product.  SoftActivity™ TS Monitor is security software used by companies and organizations worldwide to record sessions on their terminal servers and monitoring users activity.

What’s new in version 4.0 of SoftActivity TS Monitor:

  • redesigned screenshot stamp with user name and date/time that does not cover window caption:
    Activity-Monitor-10-3-screenshot-title
  • improved screenshots of mouse clicks. Now records whole window instead of just a small rectangle around the click point;
  • improved: Log Viewer does not require Administrator rights anymore. To allow a non-administrator user to view logs on the server, assign Read access permissions for the database folder;
  • improved: clean up empty screenshot folders when cleaning up old log;
  • improved: application files are now digitally signed with SHA256 in addition to SHA1 for improved security;
  • improved accuracy of time tracking for visited websites;
  • support of new Outlook 2016 for email recording;
  • fix: sometimes user licenses where temporary lost (until service restart) in case user sessions were terminated on the server;
  • support of the latest browser versions and Windows Server updates;
  • new: support of Hungarian language in Skype;
  • other improvements and fixes

Read More

SoftActivity Keylogger 8.2 released

March 9th, 2016

New version 8.2 of SoftActivity Keylogger monitoring software for parents has been released. It’s a maintenance release. Update is recommended to all users.

Improvements in SoftActivity Keylogger 8.2:

  • redesigned screenshot stamp with user name and date/time that does not cover window caption:
    Activity-Monitor-10-3-screenshot-title
  • improved screenshots of mouse clicks. Now records whole window instead of just a small rectangle around the click point;
  • support of Hungarian language in Skype;
  • improved: clean up empty screenshot folders when cleaning up old log;
  • improved: application files are now digitally signed with SHA256 in addition to SHA1 for improved security;
  • improved accuracy of time tracking for visited websites;
  • other improvements and fixes

Read More

Activity Monitor new version 10.3 released

February 22nd, 2016

SoftActivity announces the release of version 10.3 of its Activity Monitor security software for employees computer monitoring.

Improvements in Activity Monitor 10.3:

  • new: redesigned screenshot stamp with user name and date/time that does not cover window caption:
    Activity-Monitor-10-3-screenshot-title
  • improved screenshots of mouse clicks. Now records whole window instead of small rectangle around the click point;
  • improved Agents update: progress of update is shown on Agent icon; shows notification if the remote computer restart is required to finish updating;
  • improved: support of non-English characters in host names of remote computers;
  • improved: clean up empty screenshot folders when cleaning up old log;
  • fix: possible duplication of Agents in the list;
  • new: support of Hungarian language in Skype;
  • improved: application files are now digitally signed with SHA256 in addition to SHA1 for improved security;
  • support of the latest versions of browsers, IM and email clients;
  • other improvements, fixes and security enhancements

Read More

The futility of manual monitoring

November 29th, 2015

3297533849_a32573b118_zWhat you might have assumed already is now official: human beings have worse attention spans than your common goldfish. Hundreds of thousands of years of evolution, turning us into hyper-alert hunters and gatherers at the top of the food chain, has been undone by less than a decade of Twitter live-streams and Facebook viral stories. Goldfish (who apparently don’t use the Internet – who knew?) can pay attention to what’s in front of them for nine seconds, while your average joe on the street now struggles to stay focused for eight.

It’s just one more piece of evidence showing that people are more distracted than ever; and what technology has broken, technology can hopefully help fix. In business, computer monitoring software isn’t just helpful – it’s essential for overworked IT folks who can’t possibly have eyes everywhere at once.

Indeed, we saw just a few weeks back that in one of the most highly regulated, technical industries around, manual monitoring can be disastrous. In this case, it was airline cockpit pilots who chillingly can’t seem to stay focused on all those buttons and dials on their dashboard while their planes are in flight:Read More

How computer monitoring can help government stay honest

November 23rd, 2015

13334048894_001d3e53d1_zComputer monitoring software can not only prevent data breaches, misappropriation of company or government property or misuse of sensitive information. It can be a key tool in identifying disgruntled or unprofessional employees.

A great example can be found in a political scandal in Canada that shows provincial civil servants were deleting emails, didn’t properly respond to freedom of information requests and then lied about it under oath.

Yes, even in traditionally rules-abiding, by-the-books Canada, government workers can act badly (with or without the direction of their political masters). Tried-and-trusted computer monitoring software is an obvious preventive solution – and it’s long past time for these government agencies to act on it. Using computer monitoring software compatible with any device or operating system, managers can ensure that even the most dishonest civil servants will be kept on their toes.

How does computer monitoring software help them?Read More

Cybersecurity begins with educating your employees

November 16th, 2015

16660796639_5bba104e7f_zIn the workplace, digital security doesn’t begin and ends with the IT guy who set up the password and computer monitoring software on your computer. Every employee in an organization, from the top down, is responsible for keeping a company safe from cyber-attacks. Security should be something every employee takes seriously, and undertakes on a regular basis as part of being a responsible member of the team.

How can employees on the front line do that? We took note of a recent interview with Robert Cioffi, CEO of Yonkers-based Progressive Computing, about ways companies can make their system less vulnerable to attack. First, he talked about the threat:

“[C]yber-criminals are relentlessly targeting the end-user or non-tech savvy person, not the IT experts at companies,” says Cioffi. “Therefore, the end users (employees) are under constant attack and must be ever vigilant.”Read More