- Grouping of the intercepted information into categories
- Good file-activity monitoring
- Both sides interception in 3 of 5 messengers
- Good visual surveillance
- Weak URL interception
- Not enough stealthiness level
- Low filtration
- No e-mail monitoring
Today we are reviewing Golden Eye monitoring software.
To install the program you need to pass through 5 screens among which you need to read and accept EULA, specify the installation folder, decide whether you want setup to create an icon of the program on your desktop or not, and to confirm your choice. We do all this, and once the installation process is finished, we leave "Launch Golden Eye" item marked and click "Finish" button.
The main window of the program has 5 sections, namely: General, Report, Monitoring, Options and About. "General" section allows a user to choose between Invisible and Normal modes and has information about such buttons as: "Start Monitoring", "Stop" and "Hide". Intercepted information, listed in "Report" section is grouped into categories. This feature, in addition to such tools as "Search", "Replay Screenshots" and "Delete Selected Records" buttons makes log-viewing really convenient. "Monitoring" section allows user to configure screenshots', web-sites', chats' and other monitoring capabilities, while the "Options" section lets a user to configure "general" program behavior, such as enable or disable password protection, assign a hotkey, specify the folder for log-files' saving, etc. The last section in the list ("About") contains information about the keylogger, its vendor and has the "Uninstall" button. "Start monitoring", "Stop" and "Hide" buttons are located below the main screen and can be accessed from any of the sections.
The main advantages of the program are good file-activity monitoring (4 of 5 main file-activity operations are logged), not bad chat conversations interception (3 of 5) and good visual surveillance options.
Unfortunately, the program has disadvantages that are, unfortunately, very substantial: keylogger intercepts only URLs visited in IE, does not log e-mails sent and received, has very weak filtration options, no parental control tools and only one method of remote log-files' delivery — by LAN. The stealthiness level of the product is also below the middle, as it is really easy to find its directory.
Summing up we can say that despite the program's substantial disadvantages it will come in handy for all the groups of users as its functions are enough to monitor users in almost all the range of its computer activities.