The Download.com Installer securely delivers software from Download.com's servers to your computer. During this process, the Download.com Installer may offer other free applications provided by our partners. All offers are optional: You are not required to install any additional applications to receive the software you selected.
A surveillance software to monitor employee activities on the Terminal Server, prevent security problems and dictate how much time the users spend for work and for leisure. Ensuring staff compliance is the primary task of REFOG Terminal Monitor. Tracking and recording what, when and how has been used while connected to the Terminal Server allows administrators manage users more effectively. REFOG Terminal Monitor logs all activities of Terminal Server users, allowing administrators to monitor user obedience to corporate rules. The available time monitor tracks how much time the users spend in front of their PC, while the application tracker records which programs were used and for how long. The chat control module logs all chats occurring in popular instant messaging programs such as ICQ, AOL, MSN and Windows Live! Messengers. Finally, full keystroke recording gives system administrators the possibility to see what the users were typing while connected to the Terminal Server. In keystroke monitoring, all languages and encodings are accomodated, including hieroglyphs, left-to-right and right-to-left, Arab, Hebrew and Cyrillic among many others. REFOG Terminal Monitor helps prevent security leaks by immediately telling administrators when the users type particular key phrases. The alerts can be sent immediately by email if the user types one of the words or phrases from a pre-defined list. All users can be monitored individually. Thorough or filtered log views are available, allowing glancing at a summary of user activities or looking into a specific issue in full detail. Printable HTML reports are also possible. The logs can be helpfully stored on the Terminal Server, emailed, or uploaded to a remote location over FTP. Built-in access rights management restricts log access to authorized staff only. It is possible to set up a password to protect access to the log files.