Covert Ops | Desktop Scout 5.21
Report a Bad Link
The surveillance logs can be viewed in real-time from a remote computer, so you can monitor your kids or employees remotely from the comfort of your own workstation. You can even watch or control the users desktop, transfer files, start and stop programs, launch web sites and documents, log off, restart or shutdown the computer remotely.
The program incorporates a high level of security and data privacy measures. Access to the program and logs is restricted by an administrator password, network traffic is encrypted to prevent eavesdropping, and logs are compressed and encrypted before storage. The program runs as a Windows service, which makes it impossible to for users without administrator privileges to disarm or uninstall.
MGID NEWS FEED: