Blog - Page №17 | Spyrix

Blog - Page №17


Kids\' Internet safety - 5 myths and truths

There has been so much alarm about the safety of kids online so much so that one is tempted to believe every story that pops up on the internet about kids. Agreed! There are pedophiles and cyberbullies. However, they do not exist in every page on the internet. There is still some good for kids online and this has prompted some experts to champion the argument against ‘techno-panic mindset’. To adequately protect these kids, one needs to be acquainted with the facts on kids’ safety.

Read more


Two approaches to security in the examples of two IT companies

I would like to tell you about different approaches to security in the two successful IT-companies. The difference in the approach can be explained by many factors. The countries where the companies are situated, and industries (one of them is a competitive game company, the second one is a monopoly of the social network).

Read more


Game time control

I’ll tell you about technical means aimed at limiting your child’s time at the computer. (We won’t be speaking about parental control of porn, social network sites). I don’t offer a ready solution, but I would like to discuss first. Or perhaps it was realized a long time ago. I'll tell you how we do it in our family. The children note down the time with an alarm clock, and I look through logs and send SIGSTOP, SIGKILL and IRL sometimes.

Read more


Password for geeks – completely mixed up

If you are afraid of keyloggers and if you can spell your password by heart, there is an unusual way of typing passwords that can increase its security. If there is a usual text field (with stars instead of letters, so that no one would see), you can type the password letter by letter, but out of sequence, clicking the mouse in different spaces instead of control keys. But I offer to make password input mixing automatic by setting single-letter cells.

Read more


All in One Keylogger review

Introduction: When you install any software into a computer system, you have to follow a set procedure. This usually goes like this. You will encounter the Welcome option. On this option, choose “EULA.” You will have to specify the destination folder. Go to “Additional.” After you confirm your choice, you have to click on “Finish.” This is the usual installation procedure. You can experience the same procedure when you try to install the ‘All in One Keylogger’.

Read more


Spytech SpyAgent Standard Edition Review

Installation: You have to follow the given steps to install the Spytech SpyAgent Standard Edition Keylogger program. On the Spytech SpyAgent Setup tab, you have to choose Welcome. You should move on to ‘Important Notes’. These notes contain information about the keylogger. It also explains how to use the software and how to purchase it. This takes you to the next step, EULA. You have to choose the destination folder and select SpyAgent Installation type.

Read more


SoftActivity Keylogger review

Installation: You will encounter the following screens during the installation of this software, “SoftActivity Keylogger.” The first option is the Welcome option followed by EULA. You have an option to choose from the Full or Viewer Installation type. You have to create a password and proceed to Setup Logging Options. All the options are the usual ones except the “Setup Logging Options.” Here you can check up to three boxes while configuring the SoftActivity Keylogger.

Read more


REFOG Personal Monitor review

Installation: On clicking the setup file, you will have to choose from English, French, German, and Spanish languages. This is a good feature of this software. The remaining part of the installation is a routine mater. You will have to pass through the following screens while installing the REFOG Personal Monitor. The first step is the Welcome. Then you have to go to “EULA.” On the Product Information tab, you have to choose the destination location.

Read more


Perfect Keylogger review

Installation: On running the installation file, you will need a password to decrypt it. You have to enter the password provided by the makers of the software, Blazing Tools Software. You have to wait till it confirms the identity. You will next experience a “User Account Control” window. This will ask you to confirm the changes on the computer. You have to click on the “Yes” button and launch the setup program.

Read more


Elite Keylogger review

Installation: Initially you have to choose Installation Language between English or Russian. The procedure will prompt you to choose EULA. Go to the “Warning” tab. You have to create a system restore point here. You have a choice to choose the components from various modes such as Invisible, Visible, Help file, and Logs Viewer. There is an option for automatic uninstallation. The computer will prompt for a restart. You have to do so.

Read more