Secretly Monitor & Control PCs with SnoopStick
I just learned about a sneaky little device called the SnoopStick which allows you to monitor and control access to computers and laptops from anywhere, anytime. It is available for $60.
According to the web site:
- Simply insert a SnoopStick device into a USB port on the computer you want to monitor.
- Run the 60 second setup program. This installs the secret monitoring systems on the target computer.
- Remove the SnoopStick and take it with you. You can now use your SnoopStick device to monitor and control that computer from any other computer, anytime you like.
The SnoopStick monitoring components are completely hidden, and there are no telltale signs that the computer is being monitored.
Any time you want to see what web sites your kids or employees are visiting, who they are chatting with, and what they are chatting about, simply plug in your SnoopStick to any Windows based computer with an Internet connection and a USB port. SnoopStick will automatically connect to the target computer.
Monitor both sides of IM conversations in real time or tell SnoopStick to display recent activity. Check the sender and recipient of every email sent or received. View the websites your kids or employees have been visiting. Call up a screen capture any time to see exactly what they were (or are) looking at. You can even log the user off, disable internet access, set time restrictions or even turn the computer off. All using your SnoopStick from any computer.
Oh my goodness - this is really scary. I can just imagine all sorts of unscrupulous uses for this, which SnoopStick acknowledges:
SnoopStick was created primarily to help parents supervise their kids online activities. We realize however, that there are possibilities for abuse.
To that end, they've developed an "inoculator" program that you can run on your computer to guarantee that no one will be able to install SnoopStick without your permission. If someone does try to install it, the installation will fail and you'll be notified of the attempt via email.
Source: Internet Guide for the Legal Researcher, July/Aug 2007