Editor: Ensure your computer's security by monitoring all activity on your computer, capturing keystrokes, programs, websites and screenshots.
Completely invisible and easy to use, all information captured is stored in an encrypted log file. The log file can be sent secretly at scheduled intervals to any specified email address. All activity in Internet Explorer can be monitored, and Web pages are cached for viewing offline.
Screenshots can be taken at given intervals, capturing everything that is currently on the screen. Monitor your computer while you are away, retrieve lost information, monitor your children's activity. Features: Capture keystrokes; capture programs used; capture Websites in Internet Explorer; capture screenshots; encrypted log file; secretly e-mail log files; invisible stealth mode; unique Playback mode lets you view captured keystrokes/programs/Web pages/screenshots in real time; run silently at startup; auto-capture at startup.
And you can get it in .
Screenshots are not available currently.
What's New in iSpy 2.6
Release notes are not available currently.
No additional system requirements.