Home

User`s Guide - Kernel Data Recovery

image

Contents

1. anew serverS com adar Ean server com SemM2 ee 26 LepedewirE wAlet_25 6 2012 18 22 42be OuGong adrar Boronu servesd com adr Den server comm adnan server com adian server com StEM2 CRW Pw LepedewirE wAlet_25 6 2012 18 V 43ne OuGorg admen served com pareve served com adres serverS com lt admin server com St Mi2 2251 Pw LepidewirE Aiet_25 6 2012 18 R 44ne OuGorg odra erenn serves com lt pir Dne server como adver server com adran ewew server com 2562012 CC DM Pw Lepidew rE vied 25 6 2012 18 32 45m OuGorng aime anan served com i aderon serverS com arene serverS com adteri awew serverS com 2562012 6 33 03 Pw LepedewrE vit 25 6 2012 18 T t OuGorng admen nerves com ade Goena serverS comno adr Een serverS com adm Ayawen server com 7562012 06 3304 FPM A Regewssie G RAehesh Hj See BS Fick Choon Figure 4 12 Information contained in Email History Logs The utility has got the ability to capture all emails that is accessed without using Secure Socket Layer SSL connection Using this tool you can easily get to know the date and time an email was sent or received the subject the contents and even attachments if any to the email Click on a specific email and you will see the content of the email Following are the toolbar buttons that can be used while viewing Email History e SAVE Click this button to save the Email History logs rep
2. ARROWTRIGHT ARROWTFRIGHT ARROWITRIGHT ARROWTRIGHT ARROWTRIGHT ARROWTJRIGHT ARROWJRIGHT A White Paper doc Compatibility Mode MicSumanK 25 6 2012 10 09 31 AM iw VANVVORD EXE White Paper doc Compatibility Mode MicSumanK 25 6 2012 10 24 19 AM ALT ITAS d Expiorer EXE WebContent SOL Storage Manager Sumank 25 6 2012 10 24 20 AM v p B rommso D ron 63 soro r E Fuson faenor Figure 4 5 Information contained in Keystrokes Log Kernel M Lepide Software Private Limited Computer Activity Monitor Following are the toolbar buttons that can be used while viewing Keystrokes e SAVE Click this button to save the Keystrokes logs report in HTML format at desired location e FIELD CHOOSER Click this button to select or deselect the respective columns of report table to have a better view e GROUP BY Click this button to activate the functionality of dragging and grouping the generated logs by selecting column With this software you can be very much assured of the fact that every keystroke and password typed on the computer will be tactfully recorded for you wa Note Keystroke recordings are organized chronologically by Application and by Window allowing you to easily differentiate between what is typed in a word processing document email soreadsheet or Internet browser even passwords 4 1 3 Internet Activity Logs To view all recorded Internet activity just select Internet Activity log from V
3. Activity Monitor appears as shown in the following figure l Figure 2 2 File Menu The following table enlists the single option available in the File menu Exit Closes entire monitoring and recording operation of the software Help Menu The Help menu of Kernel Computer Activity Monitor appears as shown in the following figure Help Help O About Kernel Computer Activity Monitor Figure 2 3 Help Menu The following table enlists the options available in the Help menu Help Opens the user s help manual of Kernel Computer Activity Monitor About Kernel Computer Displays the version and support related information about the software Activity Monitor 2 3 Tool Bar The Tool bar is displayed just below the Menu bar section of the software interface and consists of buttons that offers a convenient method for performing varied functions 2 O O amp Settings Uninstall Figure 2 4 Tool Bar Kernel M Lepide Software Private Limited Computer Activity Monitor Following table enlists the buttons available on the Tool bar of Kernel Computer Activity Monitor em Settings Opens Settings dialog box containing various options for software configuration a O Se Q Help Launches and shows Online Help Manual of the software Help About Displays the program information and copyright information of the software About _ Uninstall Launches uninstallation wizard to uninstall the softwar
4. Computer Activity Monitor software the utility offers Uninstall button available in the tool bar section Click on Uninstall button to launch the uninstallation wizard to uninstall the software Click Yes button to uninstall the product from the monitored PC On successful completion of uninstallation process Kernel Computer Activity Monitor will be successfully removed from the computer system alongwith the logs it made O1 Kernel A Lepide Software Private Limited Computer Activity Monitor 4 Getting Started with the software 4 1 View Log Toolbar Kernel Computer Activity Monitor facilitates you to view every chat or word that the user typed monitor every website that the user visited and control it all in an effortless manner It is very difficult to find any other utility that can meet up the functionality and performance of Kernel Computer Activity Monitor tool No other computer monitoring software gives you the facility of collecting every screenshot and every keystroke with just the click of a button View Log is an altogether different section that lets you view Kernel Computer Activity Monitor logs It automatically open logs saved on the target computer view Logs w Saag SAAI Ley Strokes internet ctay SPDHCLETION Part ory Figure 4 1 View Log Toolbar Following are the essential buttons available in View Log Section that offers a convenient method for performing varied function
5. Enable Monitoring Following are the checkboxes that you need to check in order to create a proper report on different logs e Snapshots Check this option if you want the software to capture snapshot according to the interval you specified e Keystrokes Check this option if you want to enable the tool to capture each key that was pressed e Internet Activity Check this option if you want the utility to record and time stamp all websites visited by the user e Applications Check this option if you want the generated report to contain the information on every application and process launched by the user e Clipboard Check this option if you want to enable software to record text copied to the Clipboard e Email Check this option if you want to record all the emails sent to or received on a particular date e Password Check this option if you want to view the password captured by tool that user used to login to the application e Printer check this option if you want to include the information on the printed document in the report Enable Monitoring Schedule This checkbox primarily plays a key role in turning Kernel Computer Activity Monitor ON OFF to create report depending upon the selection of time period Kernel a Lepide Software Private Limited Computer Activity Monitor Moritoring Schedule J Enable Monitonng Schedule Monitor only Do not monitor From 9 30 30 AM a v Til 6 30 30PM Figure 4 19 Settin
6. HTML format as per your desired location e FIELD CHOOSER Click this button to select or deselect the respective columns of report table to have a better view 4 1 4 Application History Logs As soon as logs are generated you may switch between them using logs selection menu To view recorded applications history make sure you select Applications History log from View Logs selection menu View Logs SES He Sn os Internet Activ Snap Shots D firefox exe ors ee a firefox exe Key Strokes O firetox exe firefox exe B frefox exe Internet Activity twelox exe frefox exe twetox exe LQ Applicati Applications Click to view Applications History firefox exe firefox exe twelox exe tretox exe fwetox exe twelox exe fwetox exe freto exe y firefox exe firefox exe firefox exe A Co a a Clipboard E mail History P Password Printed Documents Figure 4 8 Application History Log Kernel A Lepide Software Private Limited Computer Activity Monitor To view Application History Log entry select it and you will be able to see its contents in the field below Application logs 31 05 2012 keyprowlersetup tmp 31 5 2012 10 44 44 AM C docume 1 Veurnark Vocals T empie THSb Ime k Sumani zi keyprovlersetup tmp 31 4201 2 10 18 00 AM c docume 1 surnank Vocals Vero e 43db8 Imp Sumank googleupdate exe 315 201 2 11 31 01 AM c doc
7. application was used The Keystroke Logs table contains the following information e Date and time of pressing the keys e Window caption and the full path to the program where the information was collected e The user name of the individual that pressed all the keys Dreamweaver exe Macromedia Dreamweaver 8 C DocumeSumank 25 6 2012 11 51 03 AM ICTRLW E WINWORD EXE DELETE lef SPACE IDELETE jw WAINWORD EXE White Paper doc Compatibility Mode MicSumanK 25 6 2012 10 12 29 AM storage SPACE chose BACK SPACE JBACK SPACE BACK SPACE Josevery SPACE much SPACE such SPACE teal BACK SPACE JlatediSPACE DELETE Je SPACE DELETE DELE TE Jadrnew BACK SPACE Jstrator SPACE IDELETEWDELETE WDELETE WOELE TE WDELE TE leultinsteh SPACE IDELETE WRIGHT ARROWERIGHT ARROWIRIGHT AR iw WINWORD EXE White Paper doc Compatibility Mode MicSumanK 25 6 2012 10 20 41 AM is SPACE BACKSPACE SPACE that SPACE drecty SPACE affects SPACE the SPACE storagel SPACE capacity SPACE BACKSPACE BACKSPACE JBACKSPACE JBACKSPACE BACKSPACE jity SPACE and SPACE performance SPACE od BACK SPACE IISPACE 1 SQRight ShiftLISPACE Server SPACE Database CTRL isthef SPACE DELETE DELETE IDELETE iw WINVWORD EXE White Paper doc Compatibility Mode MicSumanK 25 6 2012 10 23 42 AM definingiSPACE RIGHT ARROWJRIGHT ARROWJRIGHT ARROWJRIGHT ARROWJRIGHT ARROWYJRIGHT ARROWJRIGHT ARROWJRIGHT ARROWJRIGHT ARROWJRIGHT ARROW JRIGHT ARROWJRIGHT ARROWJRIGHT
8. change without notice Lepide Software Private Limited provides no warranty with regard to this user manual or any other information contained herein and hereby expressly disclaims any implied warranties of merchantability or fitness for any particular purpose with regard to any of the foregoing Lepide Software Private Limited assumes no liability for any damages incurred directly or indirectly from any technical or typographical errors or omissions contained herein or for discrepancies between the product and the user manual In no event shall Lepide Software Private Limited be liable for any incidental consequential special or exemplary damages whether based on tort contract or otherwise arising out of or in connection with this user manual or any other information contained herein or the use thereof Kernel A Lepide Software Private Limited Computer Activity Monitor 7 4 License Agreement Kernel Computer Activity Monitor by Lepide Software Private Limited Your Agreement to this License You should carefully read the following terms and conditions before using installing or distributing this software unless you have a different license agreement signed by Lepide Software Private Limited The terms and conditions of this License describe the permitted use and users of each Licensed Copy of Kernel Computer Activity Monitor For purposes of this License if you have a valid license you have the right to use a single Licensed Copy
9. eeeeeeeeeeeeeeeaeeeaeeeeeeaeeeaeeeeeeeeeeeeesaeeegeeeaeeeges 18 Br eh Mier CMV Oy LOS peters tase speascm E E E 19 Figure 4 7 Information contained in Internet Activity Log c cece ccccc secs eecceeceeeceeeceeeeeeeaeeceeeceeeeeeeseseaeeeaeeseeeeeeeeeeeaees 20 Figure 4 8 Application History LOG oncoscecsontcamacusascteasceacasansoeocenemsenneetstieadonareaamugnuemeuatonanesaniadecdancesedonatesmnaencoseanesteess 21 Figure 4 9 Information contained in Application History Log cc ecccccc cece eecceeeeeeceeceeeceeeseeeseecseeeeeeeeeeeseeeeseeeeeeeenees 22 Figure 4 10 Information contained in Clipboard Log ccc ecc cece eecceeec eee eeeeeeeeeeeceeeeeeeeeeeaeeeeeeae eee eeeeeeeeeeeeeseeeneeeaeeges 23 Freire el es TMA RISO 086 E eters eset et ages tse ae cose senses oes oti E E E E E E ke 25 Figure 4 12 Information contained in Email History Logs 00 00 cccceccceecc eee eeeceeeeeeeneeeeceeeeeeeeseeeseeeseeeeeeseeeeeeseeeenees 26 Pouc A PEN A TO acer en soca ween jing go eid ba ee evnaa E 27 Figure 4 14 Information contained in Password Log ccccceeccceseceeecneeeeeeeeeeeeeneeeeeeeeeeeseeeeeeeeeeeeeeeeseeeeeaeeeeeeseneeaeeeaees 28 Pree Slo Permits DOC Umi 1G a E E E E E E PE EE N EE E E EE 29 Figure 4 16 Information contained in Printed Documents Log s oseessessenseessessessessessersseserserssesserserssrsersseeserserssees 30 Pow Ae nS N ON o E E EEE 31 Figure 4 15 Settings for Brable MOnitoring sciecncncecensehee
10. every thumbnail In addition every thumbnail highlights the active window caption as well as the user name For scrolling over the Snapshot Logs table you can use both the mouse as well as arrow keys The moment logs are generated you may switch between them using View Logs selection menu To view all the captured screenshots select Snapshots Log I O Snapshot Loge 25 06 2012 Regenerate GO Aetresh Hj Seve L Preview W Side Show Slide Show Interval 1 3 Secole Figure 4 2 Snapshots Logs To view a full size snapshot double click its thumbnail or select the necessary thumbnail and press Preview button Besides this to view snapshots for a certain period select it in from Date Filter Kernel A Lepide Software Private Limited Computer Activity Monitor June 2012 gt AA T A T _ Ea 345678 9 10 11 12 13 14 15 17 18 19 20 21 22 23 ka Ar se gt D sA T gt 24 25 lt 9 T v 3 O Figure 4 3 Date Filter Following are the toolbar buttons that can be used while viewing full sized snapshot Toolbar Button Function oe Closes the snapshot viewing window l g Moves you to the foremost snapshot to the beginning s Presents the preceding snapshot E gt Exhibits the subsequent snapshot gt Moves you to the last snapshot to the end Hi Saves the viewing snapshot In addition following are other key buttons that too play a key role e SAVE Saves the snapshot on the disk Dialog box in whi
11. 1 866 348 7872 Toll Free for USA CANADA Email Support sales nucleustechnologies com for Sales support nucleustechnologies com for Support contact nucleustechnologies com for General Queries Kernel A Lepide Software Private Limited Computer Activity Monitor 6 Troubleshooting 6 1 Common Issues What is the limitation in trial version of Kernel Computer Activity Monitor The trial version of Kernel Computer Activity Monitor works almost same as that of the full version of the software but has some limitation The trial version has some limitations that are as follows You cannot save the captured snapshots There is a blur preview of captured screenshots You cannot run slideshow of captured screenshots You cannot setup automatic logs delivery to your emails 6 2 Frequently Asked Questions 1 What is the purpose of Monitoring Tool The most important purpose of Kernel Computer Activity Monitor is to monitor the users PC activities invisibly In fact the biggest advantage that you can enjoy by using the Monitoring Tool is the report that you receive at regular intervals containing details of all the activities performed on the computer in your absence 2 Can we consider Kernel Computer Activity Monitor user friendly software Considering Kernel Computer Activity Monitor as an user friendly software won t be wrong at all Every single log generated by this utility is generally stored up in the encrypted hidden file The be
12. at you can use when you want to run the program e Type your current password in Old Keyword section e Type your new password in New Keyword section e Type your new keyword again in Confirm Keyword section for successful confirmation of keyword setting Same steps you need to follow to change the password that you generally use to keep the program unhide from user 4 2 7 Delete Database Settings In general Kernel Computer Activity Monitor logs every single keystroke a user types on a keyboard and after saving these data it transfers it via email to a predetermined remote host All logged information is stored in the machine and therefore constant monitoring results in the accumulation of large database that definitely demands for having a proper management Delete Database is yet another important Setting element provided by the software that allows you to delete the info or database that are of no use or you dont want to use it further It uses a powerful algorithm to delete database that are no longer important for you Kernel A Lepide Software Private Limited Computer Activity Monitor settings General Snapshots Clipboard Applications Users Security Delete Database Email Logs Delete complete databace Delete database of selected module Delete Selected Figure 4 26 Delete Database Settings Window Following are the checkboxes that you need to check in for allowing the software to delete database complete
13. ch you should select the location to save the picture will be opened e SLIDE SHOW Starts the slide show presentation of snapshots You must select the particular snapshot from where the slide show will start e SLIDE SHOW INTERVAL Gives immediate access to set the slide show interval duration e PREVIEW Gives instant access to have the clear and enlarged view of a particular selected Snapshot Kernel A Lepide Software Private Limited Computer Activity Monitor 4 1 2 Keystrokes Logs Kernel Computer Activity Monitor software records every keystroke made on the host computer and therefore helps in knowing what applications were used and what was typed The tool is very much capable of capturing each and every key entered and phrase that was typed by an individual Select Key Strokes Log from View Logs section to view all the recorded keystrokes Dreamu CTRL fw WINWO Key Sti keystrokes Click to view Keystrokes History rea att Internet Activity DELETE IDELETE iw WINWO O is SPACE BACKSP BACKSPACE J BACK Application History od BACKSPACE HSI w WINWO B defining SPACE Rit come ARROWJRIGHT AF ipboar ARROWIRIGHT AF fw WINWO 23 ALTITABI E mail History 4 Explorer Password Printed Documents Figure 4 4 Keystrokes Log Kernel M Lepide Software Private Limited Computer Activity Monitor Key strokes are saved by date time and by what program
14. com S612 627 Pw Ss TXI Oog adre Tean erre com atre Duwen verver8 com adre Raana server com ad Ean Er eA com BEM 062812 PM ATXI OuGarng aimn erve com adr Oen erve com aire Renem server com ar wawan serverll com BtM2 eWwrw a T T OwGang crew served com canr On server8 com adre Onn server comm adar Owen serres com 73562012 08 2846 PM q 25 6 2012 18 WD HTML DuGorg sdn a serves com dmr Oen server com adre yenn server com adar vaen serea com 2356202 06W12 Pw q2 6 2312 16 2 2HTML OxsGaang adm een nerve com adnan servers com sdn aenn servers com lt sdm Ewen serrer com 7562012 06 2208 Pw LepedewWre ville 256 2218 DB Bre Ouo edn Ge serves com cd On server com gt ai Dena server com ada Enen server com SeM2eVuUrw Lepedewre ville D6 2ANZIG We Overs grrr serves com ar On serwerf como a En serverS com lt ache On serveril com S6m2e 8 26 rw Lepedew rE valet 25 6 22 1G he Or edn Enn serves com Cadre serverG com gt adra Een perverS comm lt ada Ewen serverd com 25623012 06 32 46 PM Leute rE valet BGI Overs ede En verve com acres cerverS com adr en cerverS com edule serverE com 3622 B32 47 Pw Lepore At 26 2218 Bee adr serverd com adra serverS com gt avin serverS com adar Ew serrer com 362 amp 2248 Pw Lepide wi Aled 256 2012 18 R oie OuGong odna Ean serves com admen serverS com gt
15. creen by taking high resolution screenshots and logs programs that are being run and closed The software records every website visited every video or file downloaded every email sent or received every document printed and much more The software records every keystroke and password typed by the user and offers security options to protect the tool with password such that no one other can view the logs One of the best features of the software is that it doesn t appear in the Task manager in the Process List on the Desktop or in Add or Remove Programs such that the monitored person is unaware of the fact that he or she is being monitored The tool ensures full control over employees helps in achieving better productivity and enhances workmanship The software is beneficial for e System Administrators Helps in determining exactly what took place in the system Kernel A Lepide Software Private Limited Computer Activity Monitor Parents Helps in discovering all the programs run by their children and searching performed in Internet Any user One can determine what was actually going on the computer system in his absence CEOQO s Allows complete control over all computers of the organization Helps in determining actions performed by employee or any other individual on a particular system The software offers easy to use highly interactive self descriptive user friendly graphical user interface such that non technical users can ea
16. does Lepide Software authorize you or anyone else to use Kernel Computer Activity Monitor in applications or systems where Kernel Computer Activity Monitor failure to perform can reasonably be expected to result in a Significant physical injury or in loss of life Any such use is entirely at your own risk and you agree to hold Lepide Software harmless from any and all claims or losses relating to such unauthorized use General This License is the complete statement of the agreement between the parties on the subject matter and merges and supersedes all other or prior understandings purchase orders agreements and arrangements This License shall be governed by the laws of the State of Delhi Exclusive jurisdiction and venue for all matters relating to this License shall be in courts and for a located in the State of Delhi and you consent to such jurisdiction and venue There are no third party beneficiaries of any promises obligations or representations made by Lepide Software herein Any waiver by Lepide Software of any violation of this License by you shall not constitute nor contribute to a waiver by Lepide Software of any other or future violation of the same provision or any other provision of this License Kernel a Lepide Software Private Limited Computer Activity Monitor
17. e directly Uninstall Kernel M Lepide Software Private Limited Computer Activity Monitor 3 Install and Uninstall 3 1 Installing Kernel Computer Activity Monitor After being familiar with the software overview key features and system requirements let us install Kernel Computer Activity Monitor The software is easy to install and involves few simple steps to configure it However before installing the software ensure that the software installer file is available on your computer If the installer file is not available on your computer then you can download it from our safe and secure Website http www nucleustechnologies com download computer activity monitor html After you have downloaded the installer file execute the following steps to install the software 1 Double click the Kernel Computer Activity Monitor installer file Accept License Agreement to continue the installation of the software 3 Follow all the on screen instructions and enable checkbox option for creating System Restore Point 4 Please read the How to Launch instructions carefully to launch the software To complete the installation process Restart your computer message appears on the screen 6 Click the Finish button to successfully install the software wa Note After you restart the computer you can change the software launching keyword from the software settings 3 2 Uninstalling Kernel Computer Activity Monitor To uninstall Kernel
18. elp and Support Service Figure 4 23 Users Settings Window However to add other user account as well you need to take help of following key buttons e ADD USER Click this button to add and specify the user account name in the list of user accounts e REMOVE USER Click this button to remove the specific user account name right from the list of user accounts e REMOVE ALL Click this button to remove all the user account names from the list of user accounis Kernel M Lepide Software Private Limited Computer Activity Monitor xw Note After you click ADD USER button following dialog box will appear on your desktop screen Kernel Computer Activity Monitor Enter user account name Account Descnption Add Cancel Figure 4 24 Add User Window Fill in the user account name along with the description that describes the nature of account Click on Add button and within few seconds the account name you specified gets included in the list of user accounts This simple step helps in adding another target computer of the user account that you entered in the box and want to monitor 4 2 6 Security Settings Kernel Computer Activity Monitor is one such software that provides you with high level of security in order to prevent the user from removing the software The best aspect about this software is that it constantly remain hidden from the task manager the process tab or anywhere else It is nearly impossible to d
19. etect as it is password protected This password protection therefore prevents others from starting stopping the recording process Also it stops from bringing any sort of change in Key logger s configuration settings during your undisclosed monitoring sessions To enable this password protection the tool provides you with a complete Security Setting element that allows you to set the password instantly You can use this Security Setting in order to specify the password for accessing the program To do it you need to enter the password and confirm it in the following given dialog box Kernel az Lepide Software Private Limited Computer Activity Monitor Settings General Snapthots Chipboard _ Applications Users Security Delete Database Email Logs Change Unhede Password Old Password New Password bonim Password Change Unhade Keyword Old Keyword Mey Bevo Loni Keyword Figure 4 25 Security Settings Window Following are the areas that are included to provide the security and protect the program from being tampered e Change Unhide Password This box allows you to set or change the password that helps in keeping the program unhide from the users e Change Unhide Keyword This box allows you to set or change the keyword that you generally use for running the program Kernel A Lepide Software Private Limited Computer Activity Monitor Following is the simple method to change the password th
20. ew Kernel M Computer Activity Monitor Lepide Software Private Limited 4 1 5 Clipboard Logs Most of the computer users follow the simple practice of copying and pasting logins and passwords rather than typing them manually Kernel Computer Activity Monitor has got the ability to even crack into clipboard as well and can record text copied to the Clipboard With this software you can record all clipboard text and save it for later viewing Cipbosd Logs 25 06 2012 _ Explorer EXE HTML Pages Sumank 25 6 2012 10 44 10 AM oath copied 0 Sumant enel Keyvlogoe HTML Paoes Snapshots Settings hire Bi Explorer EXE HTML Pages Sumank 25 6 20120 10 44 45 AM path copied D Sumant Kemel Keylogae HTML Pages Snapshots Settings html _ WINVVORD E XE Snapshots doc Compatibility Mode MicrrSumank 25 6 2012011 18 34 AM A Snapshot Log Section consists of a thumbnail gallery The time when the snapshot was taken is shown for every thumbnail In addition every thumbnail highights the active window caption a well as the user name For scrolling over the Snapshot Logs tab Bi WINWORD EXE Snapshots doc Compatibility Mode MicriSumankK 25 6 2012011 19 57 AM To wew 4 full size smapchot double check its thumbnail of select the necessa thumbnail and press Preview buton Besides this to view snapshots for a certain penod select t in from Date Filter _ Explorer EME NULL Sumank 25 6 2012011 31 19 AM To view a full size snapshot double click it
21. exe frefox exe Sumank Sumank Sumank Sumank Sumank Sumank Sumank Sumank Sumank Sumank Sumank Sumank Sumank Sumank Sumank Sumank Sumank Sumank Sumank Sumank Sumank Sumank Sumank Sumank Sumank Sumank 21 6 2012 12 52 17 21 6 2012 12 52 47 21 6 2012 12 52 49 21 6 2012 12 52 52 21 6 2012 12 53 12 21 6 2012 12 53 22 21 6 2012 12 54 08 21 6 2012 12 54 22 21 6 2012 12 54 28 21 6 2012 12 54 29 21 6 2012 12 54 30 21 6 2012 12 54 39 21 6 2012 12 54 40 21 6 2012 1255 01 21 6 2012 12 55 11 21 6 2012 12 55 14 21 6 2012 1255 15 21 6 2012 1255 28 21 6 2012 12 55 34 21 6 2012 12 55 35 21 6 2012 12 55 36 21 6 2012 12 55 37 21 6 2012 1255 40 21 6 2012 1255 51 21 6 2012 1255 52 21 6 2012 1255 53 E Regenerate G Refresh E Save J Ea Field Chooser Figure 4 7 Information contained in Internet Activity Log Lepide Software Private Limited Kernel M Computer Activity Monitor pete iS 3 With just few clicks you would be able to see or access the actual website link that the user visited In fact all that you have to do is just click the URL in the log and you would automatically reach to the website visited by the user Following are the toolbar buttons that can be used while viewing Internet Activity e SAVE Click this button to save the Internet Activity logs report in
22. gs for Monitoring Schedule Options in Monitoring Schedule Settings are e Monitor Only Check this option if you want software to perform the monitoring operation e Do Not Monitor Check this option if you do not want software to perform the monitoring operation e From Fill the initial time for the data to be included into the report e Till Fill the final time for the data to be included in the report 4 2 2 Snapshots Settings With snapshot history it is very much possible to collect enough facts whether an employee or user is wasting his time or not Therefore it is very important that you check this checkbox if you want to monitor the user s PC use It logs keystrokes entered clipboard details applications opened along with the details of websites visited The user interface is very easy to use and understand It runs hidden in the background and so cannot be terminated easily even from the task manager Kernel A Lepide Software Private Limited Computer Activity Monitor General Snapshots Clipboard Applications Users Security Delete Database Email Logs Lhange Unhide Password Old Password New Password Contin Password Change Unhide F eyword Old Keyword New Keyword Confirm Keyword Figure 4 20 Snapshots Settings Window Following are the checkboxes that you need to check in order to allow the software to capture snapshots for a certain period e Maximum size of snapshots Select this opt
23. ide Software Private Limited Computer Activity Monitor 5 Download Purchase and Register 5 1 Free Trial Download The trial version of Kernel Computer Activity Monitor is available as an evaluation version for free of cost using which a user can evaluate and analyze the features functionalities and capabilities of the software before making actual purchase Free trial version of Kernel Computer Activity Monitor is completely functional and works almost similar to that of the full version such that you can monitor your employees kids or Spouse when you are not watching them The trial version has some limitations that are as follows You cannot save the captured snapshots There is a blur preview of captured screenshots You cannot run slideshow of captured screenshots You cannot setup automatic logs delivery to your emails To overcome all these limitations purchase the full and licensed version of the software Free version of Kernel Computer Activity Monitor canbe downloaded from our safe and secure website http www nucleustechnologies com download computer activity monitor html 5 2 Purchase amp Register Purchase the Full version of Kernel Computer Activity Monitor for capturing and recording every keystroke typed passwords entered emails sent and received chats and much more Purchase the Full version of Kernel Computer Activity Monitor through our encrypted and secure Website hittp www nucleustechnologies com buy co
24. iew Logs section View Logs Internet Activity Co Se Snap Shots amp firefox exe G firefox exe Ep a fretox exe Key Strokes trelox exe gt frefox exe w firefox exe D eaim O E E Internet Activity Click to view Internet Activity History trelox exe a trelox exe amp frel ox exe firelox exe gt firefox exe amp firefox exe a frefox exe amp firefox exe v firefox exe firefox exe firefox exe fvelox exe firefox exe firefox exe Clipboard o E mail History Password L Printed Documents es fretox exe Figure 4 6 Internet Activity Log Kernel A Lepide Software Private Limited Computer Activity Monitor Kernel Computer Activity Monitor facilitates you see all websites visited by the user for the date you selected In fact every entry contains the complete web address URL and timestamp of the activity that indicates the date and timing when that particular website was visited The tool records respective timestamp of all the websites and their respective URL visited in Internet Explorer Firefox and Chrome B Internet Activity Logs 21 06 2012 firefox exe firefox exe firefox exe D firefox exe firefox exe firefox exe P firefox exe firefox exe firefox exe frefox exe W firefox exe firefox exe D firefox exe firefox exe firefox exe frefox exe firefox exe W firefox exe firefox
25. ings General Snapshots Clipboard Applestons Users Security Delete Database Email Logs J Enable Applicaton Fite Monso only tollowang applicabons Do not monitor following appbeahons ps L WProgram Files Adobe Reader 10 0 Rieader Actoh daz exe lose Figure 4 22 Applications Settings Window Kernel M Lepide Software Private Limited Computer Activity Monitor Following are the checkboxes that you need to check in order to allow the software to perform Application recording successtully e Monitor only following applications Check this option in order to specify the list of applications that you wish to be monitored e Do not monitor following applications Check this option to specify the list of applications that you do not wish to be monitored Kindly note there is a white black box where you can enlist all the applications that can be monitored or vice versa to be omitted while recording the user s PC activity Following are other key buttons that you require to click in for performing the required application recording process e ADD Press this button in order to navigate the selected executable application added in the list e REMOVE Press this button to stop the navigation of selected executable applications added in the list e REMOVE ALL Press this button to remove and stop the navigation of all executable applications mentioned in the list 4 2 5 Users Settings Installing and configuring Kernel Com
26. ion to define the quality and maximum size of Snapshots e Snapshots Interval Select this option to set the capturing interval time Kernel A Lepide Software Private Limited Computer Activity Monitor e Take snapshots of active window only Check this option to set the Activity Monitor to take snapshots of active window only e Do not take snapshots when screensaver is active Check this option to set the Activity Monitor to not take snapshots when screensaver is active e Do not take snapshot if desktop is not changing Check this option to set the Activity Monitor to capture all the active windows except when the computer is in idle mode for the set time duration e Do not include taskbar in snapshots Check this option to setthe Activity Monitor to capture Snapshots without highlighting taskbar 4 2 3 Clipboard Settings With Clipboard recording it is lot easier to find out what is happening on your computer in your absence It helps you automatically find out what data the user typed Also you can make use of this recording for identifying and capturing all the text copied to the Windows Clipboard Using Kernel Computer Activity Monitor you don t have to worry about how to perform Clipboard recording as it has got user friendly interface that makes it very easy to use even for beginners Kernel u ge Lepide Software Private Limited Computer Activity Monitor Gere Snapthots Cipdboard ppicabons Uter Securty Delete Database E
27. ly and successfully e Delete Complete Database Check this option if you want to delete the entire database e Delete Database of Selected Module Check this option when you desire to deleted database of particular module Kernel A Lepide Software Private Limited Computer Activity Monitor wa Note When you enable Delete database of selected module Delete Selected is another functionality that you need to operate Delete Selected provides you with a drop down list of selective modules that you need to choose General Snapshots Clipboard Applications Users Security Delete Database Email Logs Delete complete database Delete database of selected module Delete Selected Delete by Date Delete Complete Printed Documents Module Figure 4 27 Delete Database Settings for Selected Module After you select any particular module following are the fields that need to be checked in as per the requirement In fact you need to configure the following fields to view and manage your log files depending upon your needs e Delete by Date Check this option to delete the database of the chosen module for a particular date Kernel A Lepide Software Private Limited Computer Activity Monitor e Delete Complete Check this option to delete the complete database of the chosen module right from the day product started monitoring 4 2 8 Email Logs Settings Email Logs Setting allows you to send reports of recorded ac
28. mailog i xYue ood Upon J Enabie Lacture tet data J Enable Capture mace data Close Figure 4 21 Clipboard Settings Window Following are the checkboxes that you need to check in order to allow the software to perform Clipboard recording properly e Enable Capture Text Area Check this option and set Keylogger to catch and log the data copied to the Clipboard e Enable Capture Image Area Check this option and set Keylogger to catch and log the image copied to the clipboard 4 2 4 Applications Settings Kernel Computer Activity Monitor offers a complete array of features and options in order to make sure that it runs exactly to your need and besides that monitors all the application run by the user The options Kernel A Lepide Software Private Limited Computer Activity Monitor provided by the software further ensure that no user can interact with Kernel Computer Activity Monitor when it is running It doesn t matter what applications the user run in the computer just by enabling Application Filter you will be able to record all the application details especially games and entertainment software which makes the control more interesting In fact with an effective setting of application recording it gets lot easier for you to view not only which application user ran but how long he or spent time accessing it Using Kernel Computer Activity Monitor you get the exact picture of each application run by the person Sett
29. mputer activity monitor html Payment and Delivery Purchase Kernel Computer Activity Monitor software from our authorized resellers which provide number of payment options for your ease Paypal FAX Credit Card E cheque Pay Order etc After making the purchase transaction with our resellers an email is sent consisting of activation details and download link for the Full version of Kernel Computer Activity Monitor comprising of the activation code This email is sent to the email address which you have used while processing the purchase transaction with our resellers We suggest you not to use false email address while making the purchase transaction For any other details related to purchase process software activation process email us at sales nucleustechnologies com 5 3 Support Lepide Software Pvt Ltd provides round the clock technical support for its product range to solve technical and software queries Kernel Computer Activity Monitor software comes with an embedded user help Kernel A Lepide Software Private Limited Computer Activity Monitor manual that can be accessed by clicking Help in the software main window You can also press the F1 key on the keyboard of your computer to access the embedded user help manual of Kernel Computer Activity Monitor We also have live support wherein you can chat with our software experts at http www nucleustechnologies con supportdesk Telephone Support 91 9818725861
30. nctiher exe 31 5201 203 53 09 AM program tiles googie googletoolbarmotiher googlet Sumank windowsclock exe 31 4 2012 10 1829 AM program files kp wandoweclock exe Sumank Q windowsclock exe 31 5 2012 10 38 32 AM c program tiles kp wandowselock exe Sumank mamegs exe 31 5 2012 03 53 01 AM program tiles messenger memsgs exe Sumank mimg exe 31 5201 2 10 38 M AM c program tiles messenger memegs exe Suman w warwrord exe 31 5 2012 10 47 15 AM c program files rrectosolt ofhee othoe 2 waword exe Sumank mereces exe 75201280325901 AM c program tiles wrectosolt secunty chent meseces exe Suman meseces exe 31 4201 2 10 41 40 AM c program tiles rrecrosolt securty chent meseces exe Sumank 31 5 2012 10 19 17 AM docume 1 sumnank Vocals 1 Vero Vve OngGh tmo Suman I homman P rato EF sme gt G Fusca Figure 4 9 Information contained in Application History Log With just few clicks you would be able to see or access the actual website link that the user visited In fact all that you have to do is just click the URL in the log and you would automatically reach to the website visited by the user Following are the toolbar buttons that can be used while viewing Internet Activity e SAVE Click this button to save the Application History logs report in HTML format as per your desired location e FIELD CHOOSER Click this button to select or deselect the respective columns of report table to have a better vi
31. of Lepide Scope of License Each Licensed Copy of Kernel Computer Activity Monitor may either be used by a single person or used non simultaneously by multiple people who use the software personally installed on a single workstation All rights of any kind in the Lepide which are not expressly granted in this License are entirely and exclusively reserved to and by Lepide Software You may not rent lease modify translate reverse engineer decompile disassemble or create derivative works based on Lepide nor permit anyone else to do so You may not make access to Lepide available to others in connection with a service bureau application service provider or similar business nor permit anyone else to do so Warranty Disclaimers and Liability Limitations Kernel Computer Activity Monitor and any and all accompanying software files data and materials are distributed and provided as is and with no warranties of any kind whether expressed or implied In particular there is no warranty for the quality of data recovered You acknowledge that good data processing procedure dictates that any program including Kernel Computer Activity Monitor must be thoroughly tested with non critical data before there is any reliance on it and you hereby assume the entire risk of all use of the copies of Kernel Computer Activity Monitor covered by this License This disclaimer of warranty constitutes an essential part of this License In addition in no event
32. ollowing points e Make sure your firewall allows access to Monitoring Tool or is disabled e Pay attention whether your computer is actually online when it gets to e mailing different logs 9 Once I buy the full version of Kernel Monitoring Tool will still be able to view the logs that were generated when used the trial copy Definitely Yes All the logs and snapshots that you have already collected from the free trial version will be available even after you upgrade the product to the full version In fact the full version furthermore allows you to overcome the limitations of trial version that restricts you from having the slideshow of captured Snapshots and confines you from setting or configuring email notifications 10 How do I get my registration code After you purchase the product by making an online payment you will instantly receive the e mail that includes your registration code 11 Unfortunately lost my registration code what can do to continue using your software No need to worry All that you got to do is just provide your Order ID along with some other details like the e mail address you used to order the product This valuable information can help us find out your info and the registration code provided to you which will be send again to your e mail address 12 Can purchase and make use of this Kernel Computer Activity Monitor if I m in a different country Kernel A Lepide Software Private Limited Com
33. ort in HTML format as per your desired location e FIELD CHOOSER Click this button to select or deselect the respective columns of report table to have a better view 4 1 7 Password Logs Kernel Computer Activity Monitor allows you to capture the user account s login information if a user login into application by using a password In order to view all captured passwords select Passwords log from View Logs section Kernel M Lepide Software Private Limited Computer Activity Monitor ia Password f Click to view Password History Figure 4 13 Password Log To view a Password Log entry select it and you will be able to see its contents in the field below Kernel A Lepide Software Private Limited Computer Activity Monitor P Paced loge 22062017 yee Appi an Upi Led Acces a Ahn onae eae Administ on 72 68 12 11778 PM Taari DAZ J Adin omie b Palmis i ton 22 0 1d el rer wha AL Of Ske e ii Administr aon FEE PE 4 6 PM Toss it Regenerate Ge Asberh FF Sa 23 Field Chooser EL Geoup By Figure 4 14 Information contained in Password Log The product will capture all user names and password secretly Adding to that with this software you also get to know about the date and time when the application was accessed or run for the last time In fact the Passwords Log actually stores all the captured passwords that the user have ever typed or input on the monitored PC In addition Password Log consists of the li
34. osessesseserserseesees 47 5 1 Be NAD OW OA dh ston ese a ate e eset eceigp E E E E ENN 47 IL EA arse caer cass E abana E E E E 47 5 3 SOOM caceiesemee E N E A E ER E E N E oeceeesvse nse AE 47 O EOIN SOG oo tnt hie E A ota E raves tae der E EA 49 6 1 ORMOND AG SUC S gcc ceeneastecousacse E E E E E E N E niece aioe 49 02 Preguently Asked OC IN sao ote eta nnn anne E E E ESE N ES ESAE RN Ee 49 Di E e o E A A AE A E AA O I ETI T 52 7 1 Oy TT IN OIC ss cece 0 cp ee cece ees nace een ene mee as cece nd E eee oes 52 Le TAI pesca are ee my a edo ere cen emcees ner cosa age tere ae aeeenccuiaeapmawenneenantdeaponeteniausaneensosseee 52 De ONC ANNO aaa nace E heeded cee E E E 52 De MCC acc ne cele oases este marie eens eae oe T netec ete 53 Kernel A Lepide Software Private Limited Computer Activity Monitor Table of Figures Figure 2 1 Welcome Screen of Kernel Computer Activity Monitor ccccccceccseccseccneeceeceeeceeeeeeeseeeseeeaeeeeeceeesseeeneeeeeeees 9 Poa Wh INCI oor ss nsseiacrms ese a e E E E ES E E E E 10 Pour 2 TC IV NIN e A E N E A R cde E E E E E E 10 Powe OM A e E dens E E E E E E E ES E EES E O 10 retire eV A Te TOO a EEEE A E 13 Pour ESOS OU 10S ade ere teeters A seem ee A wen Bredicee E EE E R E iaeeeewsseeeeehaueneese 15 BPN e D is EE E se ease raven aco E NEE E E E E A A E A E 16 PU AA IC y oR DOE er e R E E T E E E E tsedceseraseabecass 17 Figure 4 5 Information contained in Keystrokes LOG ccc ccccsccceecceecceec eee
35. profound software tuning and configuration Following are the setting elements that allow you to configure the Kernel Computer Activity Monitor properly e General e Snapshots e Clipboard e Applications e Users e Security e Delete Database e Email Logs Generally the Setting screen featuring different setting elements will look like this General Snapshots Clipboard Applications Users Security Delete Database Email Logs Figure 4 17 Settings Window Each of these elements allows you to manage log files and enable or disable the monitoring of computer 4 2 1 General Settings Enable Monitoring This checkbox plays a key role in turning Kernel Computer Activity Monitor ON OFF for the main manipulation Once you check this option you allow Activity Monitor s engine to work properly and store all the activities into the corresponding logs as per your selection But in case you uncheck this option the Kernel A Lepide Software Private Limited Computer Activity Monitor utility will stop recording Definitely this is a very important setting to temporarily disable monitoring just in case you don t really desire a certain activity to appear on the logs Knabie Montong frate Snapcho Mert mia J table Legale Mordoro J Enable intemet Acity Montong tnabie Appicahons Montonng 7 Enable Opboad Mortons Enable Emad Montonng Enable Password Montone J Enable Purted Document Mortaro Figure 4 18 Settings for
36. puter Activity Monitor Certainly you can Each and every international order that we receive is handled via our payment processor which allows you to use Paypal MasterCard and Visa and therefore you can place your order without facing any difficulty Kernel A Lepide Software Private Limited Computer Activity Monitor 7 Legal Notices This section comprises the legal specification about Kernel Computer Activity Monitor and the company Lepide Software Private Limited 7 1 Copyright Notice Lepide Software Private Limited Kernel Computer Activity Monitor accompanied user manual and documentation are copyright of Lepide Software with all rights reserved Under the copyright laws this user manual cannot be reproduced in any form without the prior written permission of Lepide Software No Patent Liability is assumed however with respect to the use of the information contained herein LEPIDE SOFTWARE PVT LTD All rights reserved 7 2 Trademarks Kernel Computer Activity Monitor is a copyright work of Lepide Software Private Limited Windows 7 Windows Vista Windows XP Windows 2003 Windows 2000 Windows 98 and Windows 95 are registered trademarks of Microsoft Corporation All other brand and product names are trademarks or registered trademarks of their respective companies 7 3 Disclaimer The information contained in this user manual including but not limited to any product specifications Is Subject to
37. puter Activity Monitor in multi user environment can at times be very tricky as in most of the occasions it may require additional knowledge of administering multi user systems User setting is one such setting element that configures Key logger to secretly track all activities of selected or particular computer user and deliver logs to you via Email automatically In fact the software collects all the recorded users activity Here the software provides you with the default list of user accounts of that you would like to be monitored This list may represent several users that are actually system accounts but it is highly recommended to not disable them Kernel A Lepide Software Private Limited Computer Activity Monitor General Snapshots Clipboard Applications Users Security Delete Database Email Logs Monitor only for following user accounts AddUser Remove User Remove All User Account Description Admirsstrator Buit account for admumstenng the computer doman L ASPNET Account used for running the ASP NET worker process aspnhet_wp exe Guest Built in account for guest access to the computer domain HelpAssistant Account for Providing Remote Assistance WUSR_WEB NEETIKA Built in account for anonymous access to Intemet Iniormmaton Services IWAM_WEB NEETIKA Built in account for Intemet Information Services to start oul of process applications SUPPORT_388945a0 This ts a vendors account for the H
38. r e From Enter the email address of the user whose logs report you want to view e Password Enter the real password for SMTP authentication e SMP Server Enter the I P Address if the reports are to be sent through SMTP server e SMTP Port Enter SMTP server connection port Typical values are 25 465 and 587 e Subject Prefix Enter the message subject for the report to be sent e To Enter the email address of person whom you want to send reports After filling up all the required and mandatory fields and check in Requires a secured connection SSL option Checking this option enables you to send a test message as per the specified email settings Click on Test Configuration button Within a matter of few seconds you will see the following message indicating the successful setting of email configuration Kernel Computer Activity Monitor Mail Sent Successfully Figure 4 29 Successful Mail Sending Message Window Successful deliver of Mail Sent message ensures that you as person who wish to see the logs report can log into your mail account and view the report delivered through email Apart from this check on the modules for attachment whose logs report you want to view via email after set intervals that you defined You can specify this sending email interval in Send email after every field This parameter is generally counted in minutes The least time interval you can specify is of 1 minute Kernel A Lep
39. re ne 13 4 1 1 BPS NS LOS cece kee cn ate tenet ote se aero Swern e anette eteemien ce sede gene eae nee usenee ection se nar eenanetoeene 15 4 1 2 TRS SON MS can ch ees wg sec eet es ewes ee see 17 4 1 3 Dae te CU OS as cca cease sence wea aa ee neen smaetatean E E eee sane 19 4 1 4 Appicanon Aby LOSS ene nee on rn E ee enn ee a ene none peer keene 21 4 1 5 OTR eT TVS tree sie pe ne teers sie couse nate eon snc EAA E N E A E E AE 23 4 1 6 PaO LO e tee ee op Sc ene E E en eee ee cee 24 4 1 7 PS SV OG TO cote can gs ea eres cc ee tes ea sehen eae E E tien een ees eee 26 4 1 8 Paned Docume EOS oeren a A seas e5 ola inne oe ations bee an E enon E NE 28 V E MNS eae caus oe bestia etree Ss ere vs ee oe tinted ce ce eens cio carve od T E TEA casera EN AENEA tiara ga edu oan cee E 31 4 2 1 CTS Al SM OG sansa cs aie E E aaa emadeba canbe desineadeeat saStecaanie goto tenluds E 31 4 2 2 DMS OLS 9G CEM secretes ars cee se eee cae E E E gaee stuns E E A O EE 33 4 2 3 i BOAT a E R T E E 35 4 2 4 Applications Semin S egens enen e E E EE E r E E a 36 4 2 5 Use E e E E E center Teer rere rer 38 4 2 6 Seia a SC E E E A N E E AE EN E TEE N NE 40 Kernel Au Lepide Software Private Limited Computer Activity Monitor 4 2 7 Bie ie ACA ASS ye UNS A ETE EAE unneeded E E E T E E E TE 42 4 2 8 Po 5 CU Ss e E EE E E EE E E a SEE E E EERE 45 5 Download Purchase and Register 0 00nseneensensensesessessesseserseosessersessessrseosessessrssrsersersessessessess
40. s Kernel M Lepide Software Private Limited Computer Activity Monitor Snapshots Captures high resolution screenshots of the host computer screen C Snap Shots z Key Strokes Records every keystroke made on a host computer Key Strokes a Internet Activity Internet Records every site that the user visited and how long he or she stayed in Activity Application Records all the programs used when and how long they have been History used for and more ol Application History Clipboard Records clipboard content alongwith the caption of the window from which the text information has been copied as well as the user name Clipboard Email History Records each and every single email sent and received on all major email programs E mail History Password Capture the entire password values typed by the user in any program or PP document Password Printed Records the date and time of printing document printer name alongwith fa Documents the document name Printed Documents In addition following are other important Log Toolbar buttons that are used e Regenerate Recreates the logs for the selected date e Refresh Update and reloads the content of the tables present on the right panel of the main Window Kernel A Lepide Software Private Limited Computer Activity Monitor 4 1 1 Snapshots Logs A Snapshot Log Section consists of a thumbnail gallery The time when the snapshot was taken is shown for
41. s thumbnail or select the necessary thumbnail and press Preview button Besides this to view snaoshots for a certain penod select t in from Date Filter _ Explorer EXE NULL Sumank 25 6 2012011 31 19 AM To view a full size snapshot double click its thumbnail of select the necessary thumbnail and press Preview button Besides thes to view snanshots lor a certain penod select it in from Date Fiter _ Explorer EXE NULL Sumank 25 6 2012011 31 21 AM To view a full size snapshot double click its thumbnail or select the necessary thumbnail and press Preview button Besides this bo view enaoshots for a certain penod select t in from Date Filter w I Regenerate E Relresh E Save EB Fiki Choose 8 Group By gt Figure 4 10 Information contained in Clipboard Log This is a tool to record what you have copied cut to the clipboard Perhaps this software has got the ability to automatically keep record of all your recent entries Each entry in clipboard log has a standard set of additional information like current username application and window caption in which the clipboard activity Kernel M Lepide Software Private Limited Computer Activity Monitor has taken place Adding to that every entry in clipboard log also has the detailed timestamp of the recorded action Following are the other toolbar buttons that can be used by the software for viewing Clipboard History e SAVE Click this button to save the Clipboard logs repor
42. sily operate it without any technical training The software is available as a free trial version such that users can evaluate the features functionalities and capabilities of the software before making the actual purchase 1 3 Salient Features some of the key features of Kernel Computer Activity Monitor software are as follows Lepide Software Private Limited Invisibly takes screenshots of target computer screen at specified interval Records every keystroke made by the user including hidden system keys Monitors all Internet activities on target computer and provides information regarding browser details pages visited visit time alongwith user name Provides complete details on all applications launched on the computer including details like Application Name launched time executable path and Launched By information Captures all clipboard copy paste activities including both text and image performed by the user Logs down all the documents and files that were accessed and viewed by the user including text files video files and image files Provides detailed information about emails sent or received its date and time subject contents attachments etc Tracks all passwords typed by the user Provides information such as Application name last login time of the application and user who logged into that application Provides detailed information about every Print command documents that are printed on the target comp
43. solt Ottice Document Image Writer 25 6 201 2 06 05 40 PM Adrrerusti ator Reade p Microsoft Otfice Document Image Writer 25 6201 2 06 08 0S PM A Regenerate GO Rohesh fa Sa Field Chooser x Figure 4 16 Information contained in Printed Documents Log Definitely you don t want user spend your corporate resources on needless personal prints The tool records all documents being printed from the monitored computer and provide information like e File Name The file name that was sent printers queue e Printer The printer where actual printing of selected document occurred e Print Time The time when the user gave the print command to print the document Following are the toolbar buttons that can be used while viewing Printed Document record Kernel a Lepide Software Private Limited Computer Activity Monitor e SAVE Click this button to save the Printed Document logs report in HTML format as per your desired location e FIELD CHOOSER Click this button to select or deselect the respective columns of report table to have a better view 4 2 Settings Kernel Computer Activity Monitor is a most proficient utility meant for keeping a close eye on your kids or employees The tool can be easily setup and install and can be made invisible Settings Wizard is used to configure a proper setting of software that will get installed on the target computer once it is launched The utility features plenty of setting options for
44. st aspect about Kernel Computer Activity Monitor is that it let you view all the logs in an understandable logical format 3 Does this application affect the computer speed while it performs the required operation No This is one such effective Monitoring utility that acts too smart It runs in the background in order to minimize the resource space Therefore it acquires very few system resources and consequently does not Slowdown the computer 4 What to do when Kernel Computer Activity Monitor occupies extreme system resources The Kernel Computer Activity Monitor is one such versatile software that is configured with plenty of settings In case you are monitoring a computer that is comparatively slow then it is highly recommendable to lower the frequency of taking snapshots to 5 10 minutes Adding to that you may also disable the monitoring of the network protocols or applications that are not so crucial for you 5 Should one consider this Kernel Computer Activity Monitor as Internet filtering program No Kernel Computer Activity Monitor is not meant for filtering This is because the program can never let you stop users from visiting completely illegitimate websites In fact the operation that the software does Kernel A Lepide Software Private Limited Computer Activity Monitor is monitoring and recording the activities that a user performs on his or her PC respectively Kernel Computer Activity Monitor is based on one sole concep
45. st of entries with the following fields e Application Application name run by the user e User Windows username Following are the toolbar buttons that can be used while viewing Password record e SAVE Click this button to save the Password logs report in HTML format as per your desired location e FIELD CHOOSER Click this button to select or deselect the respective columns of report table to have a better view 4 1 8 Printed Document Logs Kernel A Lepide Software Private Limited Computer Activity Monitor Use View Logs selection menu and select Printed Document Log so that you can view all recorded printed document Viewlogs i ra da Printed Document a 2 l Key Strokes Internet Activity Q Application History B Clipboard E mail History Password Printed Documents Click to view Printed Documents History Figure 4 15 Printed Documents Log To view a Printed Document Log eniry select it and you will be able to see its contents in the field below Kernel M Lepide Software Private Limited Computer Activity Monitor fen Printed Documents Loge 2506 2012 User File Name Printer Print Time Adrarusti ator New OpenDocument Spreadsheet 3 Microsoft Ottice Document Image Writes 25 6 201 2 06 04 34 PM Adrrerwstt ator Untitled Notepad Microsolt Office Document Image Writer 25 6201 206 05 13 PM Adrrerustrator Full page lax pari Micro
46. t and that is when people know that they are constantly being watched they become more careful about what they do 6 Do Kernel Computer Activity Monitor work with my other PC applications besides the Internet Yes This Monitoring Tool records activity for all the PC applications including word processors databases communications spreadsheets and even games If you are really concerned about the time your children or employees are spending in doing unnecessary activities then with Kernel Computer Activity Monitor you will be able to observe exactly how they are spending their time 7 Snapshots generated by Kernel Computer Activity Monitor do not fit my screen What to do Usually such condition arises when the monitored PC has a larger resolution than yours To deal with such situation the best approach that you can opt is to save those snapshots to files and view them later 8 don t receive e mails with logs what s wrong with Kernel Computer Activity Monitor lf a situation arises where you dont receive activity logs e mailed to you don t panic The possibility is very high that the e mail server you selected is not performing its role effectively In such scenario best step that you can take is to search for a different e mail server or choose another one This time when you specify the settings of your SMTP server make sure that you have entered everything appropriately Apart from that it is advisable to have a look at the f
47. t in HTML format as per your desired location e FIELD CHOOSER Click this button to select or deselect the respective columns of report table to have a better view e GROUP BY Click this button to activate the functionality of dragging and grouping the generated logs by selecting column 4 1 6 Email History Logs Kernel Computer Activity Monitor makes it lot easier for you to look at all the emails sent to or received on a particular date from a particular person all with just few clicks Use View Logs selection menu and select E mail history log so that you can view all recorded e mailing activity Kernel A Lepide Software Private Limited Computer Activity Monitor View __ Viewlogs ee be ee E mail L internet Activity Application History Password Printed Documents Figure 4 11 Email History Logs The product has got an excellent ability to automatically record every email that is sent or received on a compuier In fact this tool also successfully records the saved email for you to view at any time It let you have remote access to the information that you might require the most It enables you to capture each and every single email and therefore help in finding out anything you want to know Kernel A Lepide Software Private Limited Computer Activity Monitor BA Emal Loge 2506 2012 a TT OuGang adman servestl com adr ea server com sdrrrtaevwee server com ada Ren server
48. tivity secretly at predefined intervals All logs can be easily and successfully sent by email for you to view and read This feature of Kernel Computer Activity Monitor is very effective in situation when you have extra work load but at the same time want to know what your kids or employees are doing on their respective PCs while you are away settings General Snapshots Chipboard Apphcahons Users Secumy Delete Database Email Logs V Enable send logs to email Emal Configuration Login ID Suman From sumank nucleusdatarecovery net Password LL SMTP Server 192 168 70 11 SMTP Port 25 Subject Pretnx tgofhol To surnark nucleusdatarecovery net v Requires a secured connection SSL Test Configuration Email Detads Selec t the module for attachment iv Snapshot v Clipboard v Keystroke 7 Emad history v Internet Activity v Password v Application history v Print history Send email alter every 25 Figure 4 28 Email Logs Settings Window Email Logs is one such important feature that provides the most convenient approach to read logs remotely To setup automatic logs sending to your e mail make sure you check in the enable send logs to Kernel a Lepide Software Private Limited Computer Activity Monitor email option After that following are the predefined areas that you need to specify for configuring the email e Login ID Enter the login user id required when authorizing on the SMTP serve
49. tor software Basic System Requirements Pentium Class Processor Minimum 64 MB RAM 128 MB Recommended 10 MB of free Disk Space for Software installation Enough disk space to store the recovered results Supported Operating Systems Platforms Windows 8 Windows 7 Windows Vista Windows XP Windows Server 2003 Windows 2000 Windows 98 Windows 95 Windows NT and Windows Server 2008 Lepide Software Private Limited Kernel A Computer Activity Monitor 2 Understanding the User Interface 2 1 Welcome Screen of the Software Kernel Computer Activity Monitor offers user friendly attractive graphical user interface To launch Kernel Computer Activity Monitor software type Kernel anywhere in the Windows Explorer When the software is launched following Welcome Screen appears K karneli Computer Activity Monitor DUS Kernel Outpt a Dates A A Hai 04 19 2012 ee ei ws 06092012 L 07 98 2012 08 08 201 03 08 201 1309 2012 1402203 161001 Ley Strokes internet Activity LO p phistion Mistory Figure 2 1 Welcome Screen of Kernel Computer Activity Monitor 2 2 Menu Bar The Menu bar of Kernel Computer Activity Monitor comprises two menus that are further divided into several menu items The two menus are e File Menu e Help Menu Kernel A Lepide Software Private Limited Computer Activity Monitor File Menu The File menu of Kernel Computer
50. uments and settings sumank local settings ap Sumank keyprowlersetup exe 31 5 2012 10 44 42 AM c documents and settings sumank my documents d Sumank GD keyprowlersetup exe 31 5 2012 10 1915 AM ce documents and settings sumank my documents d Sumank O keyprovlersetup exe 31 5 2012 11 34 53 AM documents and settings sumank my documents d Sumank O keyprowlersetup exe 31 5 2012 10 17 57 AM c documents and settings sumank my documents d Sumank dw20 exe 31 5 2012 10 02 47 AM progra 1 common I micros T dw dw20 exe Sumank w20 exe 31 5 2012 10 41 58 AM progra 1 common 1 inicros 1 dw dwi20 exe Sumank Pj eader_sl exe 71 5 2012 10 36 58 AM program tiles adobe veader 10 Oveaderveader_sl Sumank reader slexe 31 5201 2 10 00 09 AM program liles adobe veader 10 OVeaderveader si Sumank aam updates nother exe 31 4 2012 10 39 07 AM program tiles common ties adobe oobe pdapp u Sumank aam updates nother exe 31 5 2012 10 00 31 AM c program tiles common ties adobe oobe pdapp u Sumank olib exe 31 5 2012 10 47 50 AM c program tiles common ties mcrosolt shared othce Z ottib exe J cyberoamctert exe 315 201 2 09 59 08 AM c program tiles eltecore cyberoam client for corporat Sumank J cyberoanchert exe 31 5 2012 10 38 32 AM c progtam tiles eltecare cyberoam chent for corporat Sumank googletoolbarnotihe exe 714 201 2 10 46 49 AM ptogiam tiles google googletoolbarnotiier googlet Sumank googletoolbar
51. umnsehesauacewessuce E AE eE EEE EEEREN e 32 Pisure 4 19 Settings for Monitoring Sched le vescascccsusceranscissadeds Jaden deus E E a 33 PIC ZO SIA PS OLS setings WY NOW gcc ciastats carteecnteclen E 34 Figure 4 21 Clipboard Settings WAN OW sic ixacwwesceedesasecoascies asa a E DEE secatensausegeneaceteusadestuasesseaueeceest 36 Figure 4 22 Applications Settings Window ssesseessessesseesseseessrssesserssrssesseessesseoseeseoseesseeseoseessesseoseeseresessreseoseessees 37 Petre 4029 Users Sets WV INOW sorrise ann tee cat esacetenesceeaeGeacs se tengo E EEE ANE E 39 Figure 424 Add User VVANGOW srcccsagecs cats cicance niece oasenstoetncsantoa ie rori R rae EAT ONE E o idan sa 40 BUS ENC a yc UUM VY NO A E E E O RAT A A AII E I Al Lepide Software Private Limited Kernel A Computer Activity Monitor Figure 4 26 Delete Database Settings WiIndow cccccccccesccseecceeeeeeeceeeeeeeee eee ences eee eeeeeeeeeeeeeeeeeaeeeeeeeeaeeaaeeseeesaneeaaes 43 Figure 4 27 Delete Database Settings for Selected Module cc cecccecccecccneeceeeeeeeceeeeeeeeceeeeseecanceeeeeseneeeeeeeeeeeeeeeges 44 Figure 4 28 Email Logs Settings Window ssnnsensessessessnsensessrssrsersersessessessessrsersessrssrsersersensesseosessrssrsersessrseeseeseeseo 45 Figure 4 29 Successful Mail Sending Message Window cccceccecceecceeeeeeeeeeeeeeeee eee ees eeae eee eeseeeaeeeeeesaeseeeseeeenees 46 Kernel A Lepide Software Pri
52. uter including user name file name printer name and print time Provides scheduled delivery of recorded logs to your email account at specific time intervals Offers password protection User can prevent unauthorized access to the application by setting password to access it Offers various security settings such that the monitoring process cannot be tampered Kernel A Computer Activity Monitor 1 4 Automatically deletes old and outdated logs from the computer in order to save storage space Offers Field Chooser option that allows having a better view of the report by selecting or deselecting columns Offers Save option for saving the log at desired location in HTML format Available as free evaluation version such that user can analyze the features and capabilities of the software for free of cost before making the actual purchase Supports Windows 8 7 Vista XP Windows Server 2008 Windows Server 2003 2000 98 95 and NT operating systems Offers easy to use simple self descriptive attractive user friendly graphical user interface No technical skills required for operating the software Offers round the clock technical support System Requirements Your computer system must have the appropriate configuration before installing and running Kernel Computer Activity Monitor software Following are the minimum system requirements that a system should possess for successfully installing the Kernel Computer Activity Moni
53. vate Limited Computer Activity Monitor 1 About Kernel Computer Activity Monitor 1 1 Brief about this User Manual Welcome to the user manual of Kernel Computer Activity Monitor an apt solution to view everything happening on employee s computer screen This user manual guides users on successfully operating the software It is recommended that novice as well as experienced users should carefully go through this user manual before using the software A user who is well aware of the software can even use table of contents for finding the particular portion of manual The table of contents enlists all the sections described in this user manual from where one can navigate through its different sections The user manual consists of step by step guidelines for using Kernel Computer Activity Monitor software The user manual is intended to guide those users who are using this software for the first time The user manual consists of the following sections for guiding the users e Introduction e User Interface Description e Install and Uninstall e Usage Guidelines e Download Purchase and Register e Troubleshooting e Legal Notices 1 2 Introduction to Kernel Computer Activity Monitor Kernel Computer Activity Monitor is an advanced effective professional and powerful computer monitoring software that helps you in gathering information about the data entered by the user using keyboard performs hidden computer monitoring operation captures s
54. z Lepige Kernel Computer Activity Monitor Increase productivity by Monitoring Employee s Activities PRODUCT GUIDE Kernel M Computer Activity Monitor Lepide Software Private Limited Table of Contents 1 About Kernel Computer Activity Monitor 0 0 ccecccccceecc eee eeeeee eee e cence eee n nese eed EEE GE GE EE HEE GEE EE H SEGA SEGE EEG EG ASEH EEE EEE 6 1 1 Brief about this User Manual ccccccccecccsecccseceeeeceeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeaeeeeeeeeeeesaeeeeeeeseneseaeeees 6 1 2 Introduction to Kernel Computer Activity Monitor c ccc ccccceecceeccecceeeceeeeeeeceeeeeeeeeeeeeeeeeeeeeeeeeeeeeseeeaeeeaeees 6 1 3 SEEE a E E dnguobieonovessa snes E A eo euadau sauteed E T 7 e E ET E IS EE E E A A EEEE TTT 8 Ze MICs ana tme User IS ACC assener i be winde mewie eis terete bine vis E raciobniwas een E br EEES 9 2 1 Welcome SOL CCH OF TNS SOLOW AU seerias Ra E E RE E EE E E RE EEE RE 9 22 M WD e E E E E EE I A E E E A E A E A E A E 9 2 3 TOLDI ee E E E 10 s Dan S E E E E E E E S 12 3 1 Installing Kornel Computer Activity MODMOE sii escsierevendenedusaccmetesiahaabendensosdacmontunbennscuciaoniuduewoniaewanncasenemeareons 12 3 2 Unnstallng Kernel Computer Activity Monitor ccccc cece cece eee eeeceecceeeaeeeeeeeeeeeeeece esse eeeeeeeeeeeeeeeeeseeeaeeenees 12 A etine Stared Wath Ae SOM Wale ei N A anda usdilaeses 13 4 1 bys ge LOS TOD paeeanenee ter tentree E E rer aren ese o

Download Pdf Manuals

image

Related Search

Related Contents

Manual THERA-Trainer coro  CONDITIONING  Outils d`aide `a la conception de circuits - REDS - HEIG-Vd  

Copyright © All rights reserved.
Failed to retrieve file