Windows
Mac OS
Mobile

Latest news: November 12th, 2016 - We have found a new undetectable keyloggers for you. RSS Feed

Home>Testing policy

Testing policy

The table reflects how monitoring applications have performed during the tests carried out by our team.

The overall rating is calculated on the basis of how applications have scored within the 6 groups. Each group contains a list of functions that either are fully implemented or are absent at all in tested applications. Understanding that functions are not equivalent and some of them are more important than other ones we have assigned points to each of the function setting maximum of 20 points and minimum of 0 within the group. The points were assigned with priority of the functions within the group on the basis of the current trends in the monitoring applications development and our own experience. Below you can see how the points were assigned:

OS Support (total – 124)

  • OS X 10.10 Yosemite - 20
  • OS X 10.9 Mavericks - 19
  • OS X 10.8 Mountain Lion - 18
  • OS X 10.7 Lion - 17
  • OS X 10.6 Snow Leopard - 10
  • OS X 10.5 Leopard - 10
  • OS X 10.11 El Capitan - 10
  • OS X 10.12 Sierra - 20

Security (total – 80)

  • Invisible after installation - 10
  • Password protection - 20
  • Accessed by keyword - 15
  • Accessed by hotkey combination - 15
  • Configurable self-removal - 10
  • Configurable warning message - 10

Monitoring (total – 284)

  • System logon (password) - 10
  • Alphanumeric keys pressed - 18
  • System keys pressed - 6
  • Created files - 16
  • Deleted files - 16
  • Renamed files - 16
  • Opened files - 18
  • Clipboard - 10
  • Started applications - 20
  • System logon - 20
  • System logoff - 20
  • Printer queue - 18
  • Mouse clicks - 7
  • Sounds - 10
  • System inactivity time - 20
  • Screenshots - 16
  • Adjustable screenshot frequency - 14
  • Adjustable screenshot quality - 13
  • Desktop or window shot option - 10
  • On-mouse-click screenshots - 6

Online Monitoring (total – 162)

  • URLs opened in Safari - 20
  • URLs opened in Firefox - 16
  • URLs opened in Chrome - 13
  • URLs opened in Opera - 16
  • Emails in Mail - 18
  • Screenshots of visited web-sites - 11
  • YahooIM chats (2-side) - 17
  • AIM chats (2-side) - 17
  • Messages (Bonjour) chats (2-side) - 17
  • Skype chats (2-side) - 17

Reports (total – 150)

  • Monitoring certain users option - 10
  • Events duration - 15
  • Monitoring certain apps option - 16
  • Search by keywords - 12
  • Several days report building - 16
  • Logs sent via email - 20
  • Logs sent via FTP - 17
  • Logs sent via LAN - 16
  • Logs copied to a portable device - 12
  • Maximum log-files' size - 8
  • Automated clearance of log-files - 8

Other (total – 66)

  • Reaction to a specific keyword - 15
  • Monitoring scheduler - 13
  • Programs' blocking - 17
  • Websites' blocking - 17
  • 5+ languages - 2
  • 2-5 languages - 2

Points total – 866

If you have any questions or ideas you are welcome to share them with us using this contact form.

Home>Testing policy
IMPORTANT! Installing computer monitoring tools on computers you do not own or do not have permission to monitor may violate local, state or federal law.