Description from the Publisher
and much more! Completely invisible and easy to use, all information captured is stored in an encrypted log file. The log file can be sentsecretly at scheduled intervals to any specified email address. All activity in Internet Explorer can be monitored with webpages being cached for viewing offline. Screenshots can be taken at given intervals, capturing everything that is currently on the screen.