Credit to Counter spy
Employee Watcher
Type Surveillance Tool
Type Description Surveillance Tools are software applications that monitor and capture data from computers including screenshots, keystrokes, web cam and microphone data, instant messaging chat sessions, email, visited websites, programs run and files accessed and files shared on a P2P (peer to peer) network. Many Surveillance Tools can run in stealth mode, hidden from the user, and have the ability to store captured data for later retrieval by or transmission to another computer. A key logger is one simple, standard type of Surveillance Tool.
Category Commercial Key Logger
Category Description A Commercial Key Logger is a program that captures and logs keystrokes as they are entered on the computer for the purpose of monitoring the user. The logged data, which may be encrypted, is saved or sent to the person who installed the key logger. These applications often run in stealth mode and are invisible to the user that is being monitored. Such key loggers are sold commercially and may be used legitimately if deployed by authorized administrators and disclosed to the persons being monitored, as in a business environment. The use of a key logger to monitor persons without their knowledge has been ruled illegal in at least one jurisdiction.
Level High
Level Description High risk threats are typically installed without user interaction through security exploits, and can severely compromise system security. Such threats may open illicit network connections, use polymorphic tactics to self-mutate, disable security software, modify system files, and install additional malware. These threats may also collect and transmit personally identifiable information (PII) without your consent and severely degrade the performance and stability of your computer.
Advice Type Remove
Description This product records and saves the actual text of both-sides of AIM, Yahoo, ICQ, MSN, Trillian, PalTalk, and AOL instant messages.
Add. Description This product records and saves the actual text of both-sides of AIM, Yahoo, ICQ, MSN, Trillian, PalTalk, and AOL instant messages. Advance features also log passwords, emails, keystrokes, programs used, and Web site activity. Built-in Email allows secretly emailing the monitored data to your email address (if you don't always have physical access to the PC your monitoring).
Author UserFriendlyProducts
Author Description This product has Built-in Time and Date stamps all activity. Built-in printing feature. The program runs totally hidden to the average PC user. Built-in Keyword/Phrase Alerts send you an email (including the chat conversation) whenever a user or the person their chatting to types a word or phrase (like 'I don't really like working here' or 'I stole from the company') you set up as an alert. Versio
Author URL download.com/3001-2144_4-10325456.html
File Traces
%windows%\Generic Installer Uninstaller.exe
C:\windowsupdate\ufp\ew7\csrss.exe
C:\windowsupdate\ufp\ew7\smss.exe
initializer.exe
%windows%\Employee Watcher 8.63 Uninstaller.exe
C:\windowsupdate\ufp\ew7\initializer.exe
C:\windowsupdate\ufp\ew7\svchost.exe
Employee Watcher 8.63 Uninstaller.exe
v8install_employeewatcher.exe