Icon of program: Peek and Spy

Peek and Spy for Windows

By SysGemTrial versionUser Rating

Key Details of Peek and Spy

  • See another terminal and take control or let the user have control.
  • Last updated on April 2, 2017
  • There have been 2 updates
  • Virus scan status:

    Clean (it's extremely likely that this software program is clean)

Developer's Description

See another terminal and take control or let the user have control.
Peek and Spy lets a privileged user see exactly what is on another user's terminal and then permits him to either take control of that terminal to fix the problem from his own or let the user have control while he gives any needed instructions. If the Peek and Spy user chooses to fix it himself, his input can be displayed on the user's screen to show him/her how it was fixed. Now system managers can solve user problems (especially remote ones) without having to go to the user to solve them. Where PEEK informs users they are being watched, SPY doesn't. In addition, SPY gives system managers documented proof of security breaches and provides a tool to lock out unauthorized users.

When a system manager can see a user's screen he/she will not have to depend on that inexperienced user to determine their exact problem or describe it accurately over the phone. Nor will he waste time going to the user's terminal. He can see the screen repainted as it was before he started watching with whatever error messages were on it. The terminal attributes and characteristics are also correctly displayed. And the user gets to see the correct handling for the difficulty he/she had. Peek and Spy solves the problem of how to give personal attention to users and trainees at a distance and permits remote, interactive training and demonstrations.

Concerning security, Peek and Spy allows the privileged user to see and log everything done by another user using any one of four journaling options. Peek and Spy can log the observed user's session actions to an output file. It also permits locking out a user's keyboard in the case of a security breach. With Spy the user is not aware he/she is being observed.

Explore More