Guestbook  
Write a comment for this guestbook entry. Back to Guestbook | Administration
Sign the Guestbook:
18262) IP logged  Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; FunWebProducts)  View Web Page 
RS-Technologies  
rstechnologies555(at)gmail.com
Location:
Pakistan
Thursday, 17. April 2008 19:27  Write a comment Send E-mail

Stealth Activity Monitor (SAM)


7. Q: Who may use SAM ?

A: 1) Companies use it to track down unauthorized use of their PC and / or printers.
2) Employees use it to guard their PC at work, in the lab or at home.
3) PC support personnel uses SAM to "see what the users really did instead of what they said they did" and find solutions faster
4)Teacher use it to find intruders in the school network.
5) Parents use it to get an idea of their kids PC, Chat, MP3 or Web habits instead of using blocking software.
6) PC power users utilize SAM to log their own PC / internet work for later reference.
7) ...and many more situations where SAM can help you !
Comments:
Name:
Password: