Realtime Spy

An industry breakthrough, Realtime Spy was the first software to offer real-time remote monitoring of all computer activities by means of the Internet - making activity logs remotely accessible at all times and from anywhere in the world that you may be.

Log in to your secure online cloud account and see what users are doing on your PC as it happens in real-time.  Any device capable of accessing the internet can be used to log in to your account - be it a computer, laptop, tablet, phone, or other - no matter where you are or how far you may be from the computer you are monitoring.

Realtime Spy can be remotely installed on any computer you own and operates in complete stealth without users knowing.  The original and still the best remote monitoring software available, Realtime Spy is the perfect solution for those who need to know what their computer's users are doing at all times.

View Demo  Buy Now Also available for Mac OS X!

Realtime Spy
  • Windows compatible
  • Supports Windows 8, 7, Vista, XP, 200x, NT4

Remote Install and Remote Access

Realtime Spy was designed with powerful remote capabilities allowing it to be installed and used without ever having physical access to the computer you wish to monitor.  Once installed it operates in complete stealth without users knowledge and activity logs can be accessed remotely online from anywhere in the world.

  • Remote Installation, Configuration, and Removal [see how it works]
    Realtime Spy can be remotely installed on any computer you own without physical presence or access needed.  Settings can be changed from your secure online account at any time and will apply automatically to the remote computer without the need to reinstall.  Should you wish to stop monitoring the remote computer you may also diable Realtime Spy entirely through your online account as well.  You never need to physically access the computer for anything.
  • Always Accessible Logs
    Unlike most remote PC programs on the market that require direct access, Realtime Spy stores all logs and settings in your own secure online account.  This means you can view activity logs any time and anywhere in the world regardless if the remote computer is 'online' or not.  Logs are updated every 10 minutes so you will always have up-to-date activity reports of all users.
  • Multiple PC Monitoring [view screenshot]
    Monitor multiple computers you own without any additional configuration.  Every user of every computer you install Realtime Spy is recorded and accessible from your online account.  Usernames are categorized by the computer they are 'on' for easy user selection and viewing of the users activity logs.
  • Real-time Activity, Screenshots, and Keystroke Viewing [view screenshot]
    View user activity in real-time such as applications being used, file activity, websites visited, and more.  You can also see keystrokes typed by your users, as they are being typed, as if you were right there watching.  Screenshots of the computer's desktop can be also be shown every few seconds for a visual view of what is happening on the computer.
  • Works with All Internet Connections
    Realtime Spy can monitor any computer regardless of its Internet connection type and configuration.  Other products on the market will not function with a dial-up Internet connection or behind a firewall, router, or LAN.  Realtime Spy has no issues with these setups and you will always be able to log in to your secure account to view logs.
  • Stealth Operation
    Once installed, Realtime Spy will operate in complete stealth unknowingly to any user of the computer it is installed.  Note that during installation the software will explain that monitoring software will be installed and the user executing the install has the option to cancel.

back to top

 

 

Monitoring Features

Realtime Spy will record virtually everything your users do on the remote PC from including websites accessed, keystrokes typed, printer activity, files opened, and much more.  You will always know exactly what users are doing through the detailed logs of their activity.

  • Real-time Activity Viewer [view screenshot]
    View what users are doing in real-time including opening and closing programs, creating and deleting files, windows opened, websites accessed, documents opened and printed, keystrokes typed, and more - as they are performing the actions.
  • Keystroke Logging [view screenshot]
    Every keystroke typed on the computer will be recorded for viewing.
  • Email Forwarding - PLUS Version only
    All POP3/SMTP emails that are sent or received on the computer can be automatically forwarded to an email address you specify in your settings.  You will always have up-to-date and exact copies of all emails for viewing.
  • Events Timeline [view screenshot]
    Log all user event activity and view it in chronological order exactly as they happened.   Events logged include program starts / stops, websites visited, documents accessed and printed, filtered content, and much more.
  • Screenshot Recording [view screenshot]
    Record screenshots of the user desktop and visually see exactly what users did on the computer screen.
  • Website Logging [view screenshot]
    All websites visited and online searches performed are recorded along with the time, date, and duration it was accessed.
  • Internet Connections [view screenshot]
    All internet connections made and attempted by the user are recorded including the local host/port and the remote host/port of the connection.
  • Windows Opened [view screenshot]
    The window title and application path of the open windows are recorded.
  • Computer Usage [view screenshot]
    Log when the user's computer session started, ended, and for how long they were active and inactive during the session.
  • Chat Conversations [view screenshot]
    Record all AOL (including 9.0 and Optimized), AIM, AIM Triton, GoogleTalk, Skype, XFire, ICQ, Yahoo, Excite, and MSN Messenger chat conversations made by users of your computer.  Both sides of the chat and instant message are recorded so you will have the complete text of any conversations.
  • Application Usage [view screenshot]
    Log every application or game that is accessed on the computer as well as how long it was interacted with during that time.  For instance, you will know if a program was opened on the computer for 3 hours, but it was only 'used' for 10 minutes.
  • Print Activity [view screenshot]
    Everything printed by the user will be recorded for later viewing.
  • File Activity [view screenshot]
    All files created and deleted by the user will be recorded along with those on portable and network drives.
  • Document Activity [view screenshot]
    Log all files and documents viewed by the users.
  • System Information [view screenshot]
    System information of the remote machine is recorded: uptime, memory, ram, and more.  You also have the ability to remotely shutdown, reboot, restart, logoff, or freeze the remote computer as well with a mouse click.

back to top

 

 

Security and Stealth Operation

Security is always a concern with remote based software and Realtime Spy sheds no expense in this area.  The software can be remotely installed, operates completely invisible to all users, and is password protected.  You are the only person who will know it is installed and have access to it.

  • Stealth Operation
    Once Realtime Spy is installed it is completely undetectable and invisible to all users of the computer.  It uses little processing power and will not be visible in any form.  Realtime Spy also uses a 'cloaking' method which allows the install file to be deleted without any interruption in operation of the software or its monitoring.
  • Remote Install
    Realtime Spy can be remotely installed with only minimal configuration needed on your part :

    • Email Install :  Email the Realtime Spy install module to the computer you wish to monitor.  The user only has to execute the install file - they do not need to respond or send any response to start monitoring - they do, however, have to 'OK' the notice that states monitoring software is being installed on the computer.
    • LAN / Network Install :  Easily install Realtime Spy through network shares or login scripts.  Users will only have to 'OK' the installation with a mouse click for it to begin.

  • Password Protection
    All recorded logs and settings are password protected through secure web encryption in your online account.  Due to this your data is never at risk unlike competing products which require a direct connection to the remote computer for this information.  You are the only one with access to your online account.
  • 24/7 Real-time Monitoring
    If the computer is on then Realtime Spy is monitoring  - plain and simple.  Your online account can also be accessed at any time from anywhere in the world regardless if the remote computer is 'on' or not.
  • Remote Administration [view screenshot]
    Remotely shutdown, restart, logoff, freeze, and lockdown the remote computer through your online account at any time.

back to top

 

 

Easy to Use

Realtime Spy is extremely easy to use once it has been installed.  Just log in to your online account to view logs, change settings, and perform remote tasks.  Any device capable of browsing the web can be used to log in to your account whether that be another computer, laptop, phone, tablet, or other.  If you can view a website then you can access your account.

  • Web Interface [view screenshot]
    Your online account is extremely easy to use - just point and click the logs you wish to view same as you would with any other website.
  • Log Management [view screenshot]
    Clear individual logs, all logs, or entire users from your online account in seconds with a few mouse clicks.
  • Graphical Top 10 Charts [view screenshot]
    Display Top 10 activity charts for computer usage (most idle and active users), file usage, website usage, and application usage.
  • Archive Logs [view screenshot]
    Included in your online account is an archive utility that allows you to download logs for local viewing, management, and storing outside of your online account.
  • Easy to Setup [view screenshot]
    Quickly and easily setup Realtime Spy - just enter your username and password and you are ready to go.
  • Accessible Anywhere
    Login to your online account from any device with an internet connection and web-browser - from anywhere in the world at any time.  If you can view a website then you can access your account.
  • Remote Uninstall [view screenshot]
    Remotely uninstall Realtime Spy from your online account from any computer you are currently monitoring - there is no need to have physical access to the computer.
  • Search Logs [view screenshot]
    Search all logs for any keywords or phrases you wish - you will be given a list of results containing matches in seconds.

back to top

 

 

System Requirements

  • Windows NT4, 200x, XP, Vista, 7, and the new Windows 8 compatible Compatible with Windows
  • Pentium Class PC (133mhz or higher)
  • 3MB of hard disk space

back to top

 


 

Purchase Realtime Spy now and start remotely monitoring all activities of any computer you own!  By clicking the buy button below you can purchase, download, and install Realtime Spy in minutes!  Volume pricing for multiple licenses is listed in the right column as well as the order page.

We offer credit card, PayPal, wire transfer, check, and money order purchases.  Just click the buy button below and select your method of payment on the order form for more details.

 

 Buy Now   View Demo 
Secure Online Purchase
Download Immediately! (CD optional)
 Free Online Demo
View the Online Demo Account
Pricing Information
  • Standard
  • $79.95
  • PLUS
  • $99.95
  • ea. additional
  • $19.95
  • large quantity
  • contact us

View Demo

Buy Now

Related Pages