ActMon CM is the all-round state-of-the-art Computer and Internet recording software, useful at both home and organizational levels. It is an effective monitoring utility which can locate your problem area without being located itself. It tracks all the computer activities and applications, including keyboard strokes, passwords, incoming and outgoing chat conversations, emails, and visited websites.
Features which make it unique are its powerful keyboard logger - so powerful, it even logs the keystrokes entered during Windows 2000/XP login. And ActMon has a unique "kernel-level" file protection: Files are not just hidden! They are completely inaccessible to unauthorized users. Files cannot be removed or manipulated by an unauthorized user or so called spyware "cleaner" applications or any other Windows software!
View all computer activities with the built-in screenshot recorder. It displays the current window or program that is running on your computer. All information is stored in strongly encrypted, compact log files, that can be easily archived. ActMon can hide the logs on the monitored PC or send them via network or email.
The monitoring can be opted to be invisible to the user and ActMon is protected against manipulation: The program runs completely maintenance free. Activity data is sensitive data, and ActMon prevents unauthorized access to the log files and screenshots using the strong U.S. government approved AES/Rijndael 256-bit encryption. The interface is comprehensive and user-friendly. It has a wizard-driven installation making it extremely easy to set up and use. The setup is password protected thereby preventing unauthorized uninstallation.
The PRO Edition has flexible network functions to send and receive reports via the Internet or the corporate LAN. It is a better alternative to standard filtering and blocking software because those who brought this tool for you made this tool not only user-friendly but a friend of the user too.
» version 5.20 - posted on 2005-02-14
Windows Login Keystroke Logging, 256-Bit AES Encryption, Endless tape like rotating log file, FireFox support, MSN Messenger Support
Use of ActMon Computer Monitoring (hereinafter "SOFTWARE") is contingent on your agreement to the following terms:
1. GRANT OF LICENSE
You have 30 days to evaluate the SOFTWARE. After 30 days, you must either delete the SOFTWARE or register it. You may not use the unregistered version of the SOFTWARE for any purpose other than trial and evaluation.
2. LIMITATION OF LIABILITY
IN NO EVENT WILL IOPUS BE LIABLE TO ANY PARTY (a) FOR ANY INDIRECT, SPECIAL, PUNITIVE, INCIDENTAL OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, DAMAGES FOR LOSS OF BUSINESS PROFITS, BUSINESS INTERRUPTION, LOSS OF PROGRAMS OR INFORMATION, AND THE LIKE), OR ANY OTHER DAMAGES ARISING IN ANY WAY OUT OF THE AVAILABILITY, USE, RELIANCE ON, OR INABILITY TO USE THE SOFTWARE, THE IOPUS SERVICES AND INFORMATION, VARIOUS DIRECTORIES AND LISTINGS OR ANY OTHER INFORMATION, EVEN IF IOPUS SHALL HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES, AND REGARDLESS OF THE FORM OF ACTION, WHETHER IN CONTRACT,TORT, OR OTHERWISE; OR (b) FOR ANY CLAIM ATTRIBUTABLE TO ERRORS, OMISSIONS, OR OTHER INACCURACIES IN, OR DESTRUCTIVE PROPERTIES OF ANY INFORMATION. BECAUSE SOME STATES OR JURISDICTIONS DO NOT ALLOW THE EXCLUSION OR THE LIMITATION OF LIABILITY FOR CONSEQUENTIAL OR INCIDENTAL DAMAGES, IN SUCH STATES OR JURISDICTIONS, IOPUS LIABILITY SHALL BE LIMITED TO THE EXTENT PERMITTED BY LAW.
3. DISCLAIMER OF WARRANTY
THE SOFTWARE IS PROVIDED AS IS WITHOUT WARRANTY OF ANY KIND. TO THE MAXIMUM EXTENT PERMITTED BY APPLICABLE LAW, IOPUS FURTHER DISCLAIMS ALL WARRANTIES, INCLUDING WITHOUT LIMITATION ANY IMPLIED WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, AND NONINFRINGEMENT. THE ENTIRE RISK ARISING OUT OF THE USE OR PERFORMANCE OF THE PRODUCT AND DOCUMENTATION REMAINS WITH RECIPIENT. TO THE MAXIMUM EXTENT PERMITTED BY APPLICABLE LAW, IN NO EVENT SHALL IOPUS BE LIABLE FOR ANY CONSEQUENTIAL, INCIDENTAL, DIRECT, INDIRECT,
SPECIAL, PUNITIVE, OR OTHER DAMAGES WHATSOEVER (INCLUDING, WITHOUT LIMITATION, DAMAGES FOR LOSS OF BUSINESS PROFITS, BUSINESS INTERRUPTION, LOSS OF BUSINESS INFORMATION, OR OTHER PECUNIARY LOSS) ARISING OUT OF THIS AGREEMENT OR THE USE OF OR INABILITY TO USE THE PRODUCT, EVEN IF IOPUS HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
4. HIGH RISK ACTIVITIES
The Software is not fault- tolerant and is not
designed or intended for use in hazardous environments requiring fail-safe performance, including without limitation, in the operation of nuclear facilities, aircraft navigation or communication systems, air traffic control, weapons systems, direct life-support machines, or any other application in which the failure of the Software could lead directly to death, personal injury, or severe physical or property
damage (collectively, "High Risk Activities"). IOPUS expressly disclaims any express or implied warranty of fitness for High Risk Activities.
5. SCOPE OF GRANT
You may not reverse engineer, decompile or disassemble the SOFTWARE. IOPUS shall retain title and all ownership rights to the SOFTWARE.
This SOFTWARE is protected by copyright laws and international copyright treaties, as well as other intellectual property laws and treaties.
IOPUS is not obligated to provide maintenance or updates for the SOFTWARE. However, any maintenance or updates provided by IOPUS shall be covered by this Agreement.
The unregistered evaluation version of the SOFTWARE may be freely distributed provided that it is not modified and the original archive remains intact with all accompanying files and provided that no fee is charged (except for any reasonable fees necessary to cover costs of distribution media). Should a fee be charged or any of the distribution package need to be modified you must contact IOPUS for explicit written permission.
BETA versions of the SOFTWARE may not be distributed without explicit written permission.
ACTMON Software, a division of iOpus Software GmbH 2005