Activity Monitor 7.0 released

August 2nd, 2012
  • new: View screenshots in sync with reports in Central Logs Database [screenshot]:
    • select a program and view all screenshots for this program in Top Programs report  [screenshot]
    • select a website and view a history of screenshots taken during visits of this website in Top Websites report [screenshot]
    • view screenshots at the bottom of the screen as you navigate through history of used programs, emails, chats, etc.
    • double click a screenshot thumbnail in the bottom panel to view it full size
    • zoom in/out screenshots, view as slide show [screenshot]
    • recommended setting now is to take screenshots from active window only instead of full desktop. It is now default
  • new: View History button added in every tab in the Monitoring window that opens Central Log Database for this computer and user
  • new: screenshots from remote computers are now downloaded together with logs. Get Agent Screenshots command removed. Click Get Agent Log instead
  • new: Options – Location tab: removed folders for screenshots and exports. Screenshots are now stored in the Central Log Database folder under SCR subfolder
  • new: Improved compatibility with antivirus products. Now it’s easy to exclude Agent folder from scans in your antivirus to avoid any positive detection
    with future updates of your antivirus product
  • Fixes since version 6.5:
    • fix: database conversion error on some computers: “error in statement near s”
    • fix: Activity Monitor crashed on some computers when monitored PC’s IP address changes
    • fix: Adobe Reader hanged on some computers with Agent installed resulting in user unable to open PDF files
    • fix: compatibility issue with Microsoft Security Essentials antivirus caused extremely slow file downloads and copying
    • fix: rare crashes when displaying some HTML email messages
    • fix: on some monitored computers Administrator users could find recorded screenshots by searching for jpg files in Windows
    • improved: support of more than 65K rows for export to Excel 2007 or newer
    • fix: error message on computers with MS Outlook 2010 64-bit about no default email client

Internet Use Monitoring Software: How to Control Internet Use –

July 25th, 2012

No doubt, the Internet has dramatically improved overall performance and management for various companies from virtually all business fields. The World Wide Web provides multiple opportunities to optimize a wide selection of day-to-day business activities, operations, transactions as well as various specific tasks, while allowing to spend less time and energy on their accomplishment. However, there is also a drawback of providing unlimited Internet access at the workplace, as employees tend to abuse their related privileges and use company IT resources for personal needs during office hours.

As you probably know, the Internet has a lot of distractions, and a large number of employees get easily diverted from the tasks they are supposed to do by various unrelated things, like online shopping, games, social networking, chatting, forums and many others. This creates a big concern for many employers as it may lead to significantly decreased staff productivity and a range of other crucial issues, such as sensitive corporate information leakage, liability risks, fraudulent activities, etc.

Are you also concerned with your employees abusing their Internet access on the workplace? Actually, the key to solving this issue lies in Internet monitoring software solutions use. The modern IT market may offer you a wide selection of programs and applications that are rather efficient in tracking employee computer and Internet activities to let employers and managers know instantly, when inappropriate use of company IT resources takes place. is an ideal place to find related solutions with the fullest possible functionality, yet at a reasonable price.

Our Activity Monitor is an all-in-one, advanced Internet use monitoring software solution designed to provide total control over your office computers and LAN. Operating as a surveillance camera, it records every single computer move in real time. The built-in high-end keystroke recorder allows you to find out everything your employees type in their emails, chats, social media, etc. And enhanced document security option means that you can see all file transfers performed on USB flash drives and external HDDs.

Whether you need to know how to control Internet use of employees who work remotely from home or during business trips via RDP, then our SoftActivity TS Monitor is an obvious choice. It is specifically designed for monitoring user activities in Windows Terminal Server sessions, Citrix shared desktop and others. You can use it in tandem with Activity Monitor to enjoy absolute control over your both local and remote staff.


Program to Control Internet Usage – Activity Monitor

July 24th, 2012

Employee activity monitoring seems to be one of the hottest trends among many business owners nowadays. Unlimited and unrestricted access to company’s IT infrastructure along with indisputable benefits has caused a substantial issue of Internet abuse during working hours. Recent researches show that over 80% of employees regularly use the Internet at their workplaces for personal purposes and almost 60% do it every single day. That’s why, many employers and managers consider that monitoring Internet usage within their corporate network is a key element to solving this crucial issue.

In such a way, today there is a high demand in stealth computer and Internet tracking software and one of the most powerful and effective among them you can easily find online at All our products have gained multiple awards from various authority Web rating projects including Softonic, TopTenReviews, Tucows, Snapfiles, etc.

We suggest you to take advantage of our Activity Monitor – a full-fledged, yet easy-to-use program to control Internet usage within your company LAN in an absolutely secret and invisible mode. This powerful spyware system will provide you with the most detailed information on what is going on in your local network, while giving your users no little signs of the fact that they are monitored.

The whole employee monitoring solution consists of two modules: a server part that is typically installed on the main administrator’s computer and client parts (Agents) – for all computers on the network that are supposed to be monitored. What’s also important, any network-connected computer can be easily monitored from a remote location. In such a manner, you can always have your hand on the pulse of every computer move within your office LAN, without leaving a workplace or when you’re away.

Instead of spending a fortune on video surveillance cameras, smart cards or any other visible monitoring solutions that obviously create a negative and uncomfortable atmosphere of being inspected and spied, install our smart stealth Internet usage monitoring software Activity Monitor today.


LAN Spy Software, LAN Spy Program – Activity Monitor

July 19th, 2012

Technological change made almost any of modern businesses dependent on computer and Internet resources. However, some employees tend to abuse their computer use during working hours that results in overall decreased productivity and critical information leakage. That’s why, it’s highly important for business owners and managers to use LAN spy software solutions to monitor employee online activities and the whole computer usage.

If you’re browsing the Internet in your search for a highly efficient and yet affordable LAN spy program, you’ve come to the right place! Here, at SoftActivity, you will be provided with one of the best LAN spy software Activity Monitor coming with necessary features and options included to have your hand always on the pulse of your office computer use.

From now on by installing our advanced LAN spying program on all computers within your network, you can have a clear picture of the way your employees use company computer and Internet resources: whether they are surfing the Web for personal needs, are engaged in social networking, shopping, playing online games, communicating with friends, etc.

Based on the turnkey IntelliSnap technology, this award-winning LAN spy program from SoftActivity also allows to see snapshots of remote desktops taken at any predefined time intervals. What’s also important, our monitoring software works in a completely secret mode – users can not neither terminate Activity Monitor Agent in Task Manager without specific administrative rights, nor see logs recorded.

If you are wondering what your employees are doing when they are supposed to be working, powerful and full-featured LAN spy program Activity Monitor is what you really need. Take ultimate control over every aspect of your office LAN, find out more about every single move performed with the Activity Monitor network monitoring tool.


Stealth Computer Monitoring Software, Monitor Computer Remotely with SoftActivity

July 3rd, 2012

There is an extensive variety of computer monitoring solutions available on the online market today, but you need to know that not all of them are created equal. Many cope well with the task of recording activities performed, however they always leave signs that some spy program is installed on a computer and its user is being under surveillance.

From the ethical, precautionary or any other point of view, there is a high chance that this fact will not satisfy you. If it is not enough to simply get records on user activities and you need software to track computer usage in an absolutely secret mode, then stealth monitoring solutions can be an ideal option for you. SoftActivity takes special pride by offering you all-in-one stealth computer monitoring solutions – SoftActivity Keylogger, Activity Monitor and SoftActivity TS Monitor – easy-to-use programs that will provide you with the deepest insight into what your users are doing when you are away.

Based on the latest IT spying technologies, all of our computer tracking programs represent smart tracking engines that run absolutely invisibly in the background and secretly record all activities being performed on a particular computer or network, from websites visited to keystrokes typed. Your children, students, employees or any other group of computer users will continue using the Internet and doing other activities without knowing that you’re monitoring them.

With our stealth computer monitoring programs you get highly effective tools to ensure around-the-clock parental supervision and guidance, prevent your students from doing unauthorized activities during studying hours, protect your business and intellectual property from information leakage, eliminate fraudulent activities and personal computer abuse. Whether you need to monitor your computer remotely and in a secret mode, is the only right way to go.


Control Remote PC with Software Solutions from SoftActivity

June 29th, 2012

No matter what type of a business you run, if you wish to maintain a profitable and competitive venture you should work hard as well as keep your staff working efficiently every single day. As a proactive business owner you need to ensure unparalleled working environment for your employees and provide all necessary facilities that may help them make their job as required. Computers connected to the Internet are among those indispensable options that may benefit business in terms of improved productivity and communication between existing and prospective clients.

While enjoying unrestricted computer and Internet access some employees may abuse this essential advantage during office hours. Unfortunately, this is a common case and may affect overall business performance dramatically. You shouldn’t be dazzled by a quiet working atmosphere within your office and better take some efforts to control remote PC activity in real-time.

SoftActivity is here to provide you with top-notch quality computer monitoring solutions that allow to track all computer activities within the entire office network. Our team of IT professionals worked hard to create all-in-one computer applications that are designed to make overall tracking as easy as 1-2-3. Simply install an agent module on computers you’d like to monitor and get real-time detailed statistics on websites visited, emails sent and received, keystrokes typed, programs run, etc.

With Activity Monitor you can spy on any remote PC connected to your office LAN that will help eliminate employee Internet abuse and increase overall productivity. From now on tracking remote PC performance is not a complicated task with our full-featured application that may become an indispensable feature of your office life.


Internet Monitoring Programs at SoftActivity

June 28th, 2012

The Internet has become an indispensable component of our everyday life that provides plenty of opportunities to share information, make purchases or run a business. It also provides an extensive entertainment range starting from various social networking websites and online games and ending with chat rooms. Some people used to spend hours in front of their computer screen chatting, playing or just surfing from site to site without realizing that they actually waste their precious time. In fact, the internet addicted people of all ages look for every opportunity to surf the Internet and may even misuse unrestricted access to the Internet during office hours.

This is where powerful internet monitoring programs come into play as ideal solutions for computer usage tracking. If you suspect that some of your employees waste their office hours on non-work related activities or take part in mission-critical business information leakage, SoftActivity is here to offer advanced employee activity monitoring software to create more healthy corporate environment.

Activity Monitor is a feature-rich software solution that allows not only to track the computer performance of your employees, but also provides real-time reports of any network activity within your LAN. Rest assured, that our computer monitoring software works in a stealth mode, so you can view all on-screen activity while staying absolutely undetected.

With our turnkey program installed on all network computers you will be able to keep a watchful eye on your students or employees remotely. Activity Monitor will keep track of the information about chatting, playing, browsing and emailing in a special log file on your administrator’s PC. Moreover, no specific knowledge and skills are required to use our solutions. Simply browse through for more detailed information about our products.