Programs for covert surveillance. Need a keylogger? What types of spyware are there and where to download them

Today on the Internet you can find many of the most different programs for tracking your phone, which work on the Android platform. But are they effective? That is the question. The main advantage of all programs is that they are easily and simply installed on mobile phone. You can track your phone using a computer via email, where all the information from the phone comes. Also, all applications only work in hidden mode, and it will be very difficult to detect them on a mobile phone. Let's look at the five most popular spyware programs that can be found on the Internet:

  1. Cell Phone Spy PRO+;
  2. talklog;
  3. TrackView;
  4. FlexiSpy;

Talklog

Let's start with the Talklog app. The program has the following features:

  • call log. You will receive a full report of all calls to your email;
  • audio recording telephone conversations. Each conversation can be recorded and then saved on the server;
  • receive SMS messages. You can intercept all messages from your phone;
  • phone location;
  • web browser. You can get history from your internet browser;
  • applications. Talklog can also keep track of and monitor applications on your phone;
  • audio control. The program allows you to turn on the microphone on your phone.

This is the whole list of possibilities « programs" to spy on your phone Talklog. Not enough, isn't it?

Cell Phone Spy PRO

The Cell Phone Spy PRO + program is mainly aimed at convicting a loved one of cheating. It works almost the same as all other spyware programs. But it is worth noting that the effectiveness of this program may be at risk, because during startup it requires entering a password and thus can be easily removed from the mobile phone. Despite this, Cell Phone Spy PRO+ will detect the phone's location, calls and messages.

TrackView

The TrackView spy program is capable of tracking the location of a mobile phone, viewing messages and listening to calls, listening to ambient sound, and also viewing a picture from the camera. This program Perfect for monitoring your child's phone. The only negative is that the application's functionality is small, so if you need a program with extensive functionality, then it is best for you to install another mobile spy.

FlexiSpy

FlexiSpy stands out among the first three described programs for spying on a phone. This application has many more features than the first three. All data will be sent to your personal account on the website. In addition to all the known capabilities of any mobile spy, FlexiSpy can also crack screen lock passwords, passwords electronic mailboxes and applications. In addition, you will receive notifications when the owner of the phone visits prohibited places. But it is worth noting that none of the above mobile spies guarantee the safety of information from third parties.

Service VkurSe

The VkurSe service not only guarantees the safety of all transmitted data from third parties, but also has a huge list of capabilities. Such as:

Just look at the entire program list. No other " program" to spy on your phone. This is why most users choose VkurSe mobile spy. The program was created not only to track and find the location of the phone, but first of all, this is one of the ways parental controls, as well as protecting your phone from theft, increasing employee productivity, finding a device if lost, and much more. See for yourself, the VkurSe phone tracking application.

With our service you will always be aware of everything that happens with the mobile phone and its owner!

Probably everyone wanted to follow someone at least once. Today I will show you how you can monitor your computer without breaking the law, although only your own computer, or your work computer if you are an administrator.

Why monitor your computer? You don’t have to go far, parents often want to have complete control over their children and are ready to check what their children are watching while they are not at home.

Introduction

Hello friends, today everyone can feel like an “agent” who can fully control everything that happens on their computer. Especially if there is only one computer in the house and you are curious, then this is your day.

Just imagine, you are a jealous husband or wife, you go to work, and your other half sits at the computer all day, and when you return, there is an ear-to-ear smile on their faces. And then you think, is this such a joy because I returned home or something else was interesting. Now you can sit down at your computer and see what happened on it throughout the day.

For everyone, this is a question of morality. Therefore, be careful, this can harm your relationship; you yourself must be aware of your actions and all possible consequences.

Let's look at another option: you are strict parents who control your child and have left home on business. And the child immediately ran to the computer, when they returned, he immediately threw the computer, saying it was not interesting. Quite an interesting situation, isn't it? And you quietly sat down at the computer and looked at the report on all the actions that were performed on it by the child. Thus, they made sure that he didn’t do anything terrible there.

Don't you have enough examples? Okay, you are a curious child who is kicked out of your parents’ room in the evening, but you are wondering what Mom and Dad are watching when they kick you out. Here again, everything is in your power, but be prepared to get hit in the neck if your parents find out that you are spying on them.

I hope you are an adequate person and understand that you cannot use programs of this kind on other people’s computers, for this you can be punished by law. Therefore, I say again, we use the spy program only on our computer.

Of course, if you have your own company with employees and at some point you want to control their work, then please install a tracking program on all work computers and directly via the Internet see what your employees want at work.

Computer tracking software NeoSpy

Before you start installing the program, let me tell you a little about its powerful capabilities.

Of course, the main essence of the program is to control everything that happens on the computer. It closely monitors the user, who suspects nothing, and stores progress reports in several convenient formats. If you need free surveillance and don't want to pay for it, then this great program, but to get the report you will need to go to the computer every time.

And if you have paid version program, then you can view all reports directly online. From any other device.

The NeoSpy program integrates so well into the system that it can not only broadcast to online mode everything that happens on the computer you are monitoring, but also take pictures from the web camera.

During the tracking process, the application records everything that is typed on the keyboard, that is, all correspondence can be seen at any time without problems. Everything that was on the clipboard is saved.

If something is copied on the computer being monitored, the program will see it and make a copy for itself. It will give you all the secrets about traffic on the Internet, each site will be recorded and you will be able to see what the user did on it.

You can set a time interval for screenshots and then the program will take a screenshot every minute, if you want, it will take a screenshot every ten seconds, and then you can see everything that happened on the computer in the form of pictures, a small comic book.

Download computer spying software

Available versions of the program, all sources lead to the official website and have been tested for security

I will show you the downloading and configuration process in detail in the video review at the end of the article, so just scroll through and see how to properly configure the program for total computer surveillance.

Greetings!
Surprisingly, I see that there is genuine interest in the question, how to monitor your phone husband or wife - apparently, the topic of infidelity these days is more relevant than ever, and to uncover it we will continue to look various possibilities To monitor a person through a phone - for example, a child - or your apartment - today there will be a slight development of the theme of the spy service from Google. Our guest" special program spy for phone related to use existing account from Google, which all smartphone users have on Android based.

In general, I found two such programs - WardenCam and TrackView. The advantage of the first is that you can also connect your account to it in Dropbox service and save videos from your phone to it. But from experience, it is not supported by all gadgets; in particular, my Nexus 7 did not want to work with it. Therefore, I will show in detail only the second one - TrackView.

This is not just a program for organizing video surveillance via a mobile phone - with its help you can create full phone spy, with which you can track its location, watch the picture from the camera, listen to the sound and even give commands into the device’s microphone. Many may say that following a person through a phone is unethical. Agree! But it can also be used for good purposes - for example, put it in your car while you go out to buy bread and, in case of theft, quickly track its location using GPS. Or turn on your child’s phone and be aware of where he is given time is located, or again, left in your apartment and used as a surveillance camera. Moreover, you can use this program as a free walkie-talkie - talk through the microphone with other phones connected to your account.


So, first of all you need to download from Play Market free spy program TrackView and install it on all Android devices that we will monitor - it could be a smartphone, tablet or even a TV set-top box - then you can monitor the apartment even using it, if, of course, a webcam is attached to it. There is also a version for installation on Apple products or on a computer under Windows management. They can be downloaded from the official website of the program.

The second condition is that the same Google account, which you registered in order to use the services of this corporation - Play Market, Youtube, Gmail etc. — Any will do.

And finally, thirdly, for all gadgets to work, the Internet must be working - WiFi or mobile does not matter, the main thing is that it is always on.

Launch the application and log into your account on all devices.


After each phone or computer is added, it will begin to appear in general list. I added mine to the system samsung phone and a Nexus tablet.

Opposite each of them is a control panel with three functions - viewing images from the camera, viewing geolocation data and controlling the microphone.

1. Camera

Here we find ourselves in the window for viewing the image transmitted by the built-in camera of the corresponding device. There is also the opportunity to call up another control panel - to change the camera, record video, or activate a microphone on the device for transmission to it voice messages.


2. Geolocation

We go back and click on the pointer icon - a page with Google maps will open, which will display the current geographical location of this object, which is determined either on the Internet or by GPS module, depending on what is activated on that phone.

3. Sound signal

By clicking this button we will create on another gadget sound signal call.

Now let's go through the menu in top panel programs. In the second tab with the “Play” icon, you can view and play files recorded in memory.


Under the next icon - exclamation point— there is a message filter setting, where you can configure the ability to receive notifications from a particular device.

In the fourth point, you can enable motion detectors - if this function is activated, then with any detected movement in the field of view of the camera, an alert signal will be sent to other devices. Here you can configure so that this signal does not sound.

Phone tracking via SMS

There are other interesting and more versatile software solutions to organize surveillance of a child’s phone, including via CMC. One of them is the SMS Mobile Spy program. This mobile spy is built exclusively for parental management needs. To install on Android you need to download it from Play Store. When you first log in, you will be required to enter your Email and password.

After this, you will not only have access to a map of the phone owner’s movements, but you will also be able to read messages sent from it.

Another one similar program for phone - Spy To Mobile. Its job is to intercept incoming and outgoing SMS, contact list and call history that it sends to your Personal Area on the SpyToMobile.com server. To download intercepted data, the mobile phone must also be connected to the Internet via GPRS or Wi-Fi. However, the advantage is that Internet access may not be constant, and data will be transferred as the smartphone goes online. I provide demo videos that show the installation process and the user account on their website.

These are some interesting programs with the help of which all computers, laptops and phones can be combined via the Internet into one tracking system - use it!

Sometimes it is important to know what is happening to the computer in your absence. Who does what on it, what sites and programs it includes. Special spy programs can report all this.

Spying on someone is, to say the least, not good. Or even criminally punishable (violation of the right to confidentiality and all that)... However, sometimes it won’t hurt to know, for example, what your child is doing at the computer in your absence or what the employees of your organization are doing when there are no bosses. Or maybe they are watching you?!!

Computer and mobile devices have long been exposed to dangers from all sorts of viruses. However, there is a class of software that, without being malicious, can perform the same functions as, for example, Trojans - keep a log of application launches on the system, record all keystrokes on the keyboard, periodically take screenshots, and then send all the collected information to the one who installed and configured surveillance of the user.

As you understand, today we will talk specifically about spyware, their work and detection methods.

Differences from viruses

In the field antivirus solutions The class of spyware is known as "spyware" (from the English "spy" - "spy" and abbreviated "software" - " software"). In principle, some of the applications that will be discussed below are perceived by antiviruses as malicious, but in fact they are not.

What is the difference between real spyware and computer tracking programs? The main difference here is in the scope and method of operation. Spy viruses are installed on the system without the user’s knowledge and can serve as a source of additional threats (data theft and corruption, for example).

Spyware programs for monitoring a computer are installed by the user himself in order to find out what another user is doing on the PC. At the same time, the user himself may be aware that they are being monitored (for example, this is done in some institutions to record the working hours of employees).

However, in terms of operating principles, spyware is essentially no different from any Trojans, keyloggers or backdoors... So, we can consider them some kind of “defector viruses” that have switched to the “light side” and are used not so much for stealing information from a PC to control its operation.

By the way, in the West the practice of introducing tracking software on users’ computers corporate networks and on home PCs is quite common. There is even a separate name for this kind of program - “tracking software”, which allows, at least nominally, to separate them from malicious spyware.

Keyloggers

The most common and, to a certain extent, dangerous looking spyware are keyloggers (from the English “key” - “button” and “logger” - “recorder”). Moreover, these programs can be like independent viruses, which are introduced into the system, and specifically installed utilities tracking. There is essentially no difference between them.

Keyloggers are designed to record the presses of all buttons on the keyboard (sometimes also the mouse) and save the data to a file. Depending on the operating principle of each specific keylogger, the file may simply be stored on a local hard drive or periodically sent to the person conducting surveillance.

Thus, without suspecting anything, we can “give away” all our passwords to third parties who can use them for any purpose. For example, an attacker could hack our account, change access passwords and/or resell them to someone...

Fortunately, most keyloggers are quickly detected by most antiviruses, since they are suspiciously intercepting data. However, if the keylogger was installed by an administrator, it will most likely be included in the exceptions and will not be detected...

A striking example of a free keylogger is SC-KeyLog:

This keylogger, unfortunately, is detected by the antivirus at the download stage. So, if you decide to install it, temporarily disable the protection until you add it necessary files V " White list":

  • program executable file (default: C:\Program Files\Soft-Central\SC-KeyLog\SC-KeyLog2.exe);
  • executable file of the tracking module, which will be created by you in the specified folder;
  • library (DLL file) for hidden data processing, the name of which you also set at the settings stage and which is stored by default in the C:\Windows\System32\ folder.

After installation you will be taken to the setup wizard. Here you can ask mailing address, to which data files should be sent, name and save location executable modules intercepting the keystrokes mentioned above, as well as the password required to open the logs.

When all settings are made and keylogger files are listed trusted programs antivirus, everything is ready to work. Here is an example of what you can see in the log file:

As you can see, SC-KeyLog displays the titles of all windows that the user is working with, mouse button clicks and, in fact, keyboard clicks (including service keys). It is worth noting that the program cannot determine the layout and displays all texts in English letters, which still need to be converted into a readable Russian-language form (for example,).

However, keylogger functions can be hidden even in popular non-specialized software. A striking example of this is the program for changing the text layout Punto Switcher:

One of additional functions This program is “Diary”, which is activated manually and, in fact, is a real keylogger that intercepts and remembers all data entered from the keyboard. The text is saved in required layout and the only thing missing is intercepting mouse and click events special keys keyboards.

Plus Punto Switcher as a keylogger in that it is not detected by antivirus and is installed on many computers. Accordingly, if necessary, you can activate tracking without installing any software or additional tricks!

Complex spies

A keylogger is good if you only need to know what the user enters from the keyboard and what programs he launches. However, this data may not be enough. Therefore, more complex ones were created software systems for comprehensive espionage. Such spy complexes may include:

  • keylogger;
  • clipboard interceptor;
  • screen spy (takes screenshots at specified intervals);
  • program launch and activity recorder;
  • sound and video recording system (if there is a microphone or webcam).

So that you can better imagine how they work similar programs, consider a couple free solutions this direction. And the first one will be free Russian-language system observations called (attention, antiviruses and browsers may block access to the site!):

The program features include:

  • intercepting keyboard keystrokes;
  • taking screenshots (too frequent by default);
  • monitoring running programs and the time of their activity;
  • PC activity monitoring and account user.

Alas, this complex for tracking a PC is also detected by antiviruses, so to download and install it you must first disable the protection. During installation, we will need to set a key combination to call the program interface, as well as a password for accessing the collected data. After the installation is complete, add the entire folder with the spyware to the antivirus “white list” (by default C:\Documents and Settings\All Users\ Application Data\Softex) and you can activate the protection back.

Softex Expert Home will launch in background and will not create any shortcuts or active icons anywhere. It will be possible to detect its operation only by pressing the hotkey combination you have specified. In the window that appears, enter the access password, first of all go to the “Settings” section on the “Screenshots” tab and increase the minimum interval between shots, as well as the timer interval (by default, 2 and 10 seconds, respectively).

Such a spy is quite enough to monitor your home computer. In addition to the features already mentioned above, Expert Home has a function remote viewing statistics, which allows you to view logs via the Internet. To activate it, just click the button to connect to the server in the “Internet monitoring” section, and then wait for the computer ID and access password to be issued, which you will need to enter on the developers’ website:

It is worth clarifying that in the free mode, statistics are stored on the server for only one day. If you would like to access more long period, then you will have to pay from 250 (7 days) to 1000 (30 days) rubles per month.

Another free comprehensive computer monitoring program is:

Despite the fact that the name of the program includes the word “keylogger”, in fact it has much more capabilities. Among them:

The program itself is not detected by the antivirus, however, with active heuristic algorithms, its “suspicious” activity is detected. Therefore, it is best to install and configure it with protection disabled.

During installation preliminary preparation not required (the only thing you need is to choose for whom the program is being installed and whether its icon should be displayed in the tray). However, after installation, you need to add the program folder (by default C:\WINDOWS\system32\Mpk) and its executable file MPKView.exe to the antivirus exclusions.

When you launch it for the first time, the settings window will open. Here we can change the language from English to, for example, Ukrainian (for some reason there is no Russian...), set our own keys for quickly calling the program (by default ALT+CTRL+SHIFT+K) and a password for entering the control panel.

That's all, actually. The main disadvantage free version The program is its limitations in some aspects of tracking (not all programs are available, for example), as well as the lack of the ability to send logs by mail or via FTP. Otherwise, almost everything is good.

Spyware isn't just for desktop computers, and for mobile platforms. If you want to know what your child is doing on a tablet or smartphone, you can try using the free multi-platform tracking system KidLogger.

Sniffers

The last, and most insidious, means of espionage can be the so-called sniffers (from the English “sniff” - “sniff out”). This class of programs is scientifically called “traffic analyzers” and is used to intercept and analyze data transmitted over the Internet.

Using a sniffer, an attacker can connect to a user's current web session and use it for his own purposes on behalf of the user himself by replacing data packets. If you are very unlucky, then with the help of a sniffer they can “steal” your logins and passwords for entering any sites where traffic encryption is not used.

Those who are most at risk of becoming a victim of a sniffer are those who use one or another public network to access the Internet (for example, a point Wi-Fi access). Also, users of corporate networks with an overly “entrepreneurial” administrator may be under theoretical threat.

So that you can roughly understand what a sniffer is, I suggest considering a representative of this class of programs developed by the popular team NirSoft:

This sniffer is intended mainly for intercepting data packets on a local PC and serves more for good intentions (like network debugging). But its essence is the same as that of hacker tools.

A person who understands the principles of data transmission over network protocols and understands what kind of information is transmitted in a particular packet, can decrypt its contents and, if desired, replace it by sending a modified request to the server. If the connection is over a simple HTTP channel without encryption, then a hacker can see your passwords right in the sniffer window without having to decode anything!

The problem is aggravated by the fact that previously there were sniffers only for desktop operating systems. Today, for example, there are numerous sniffers for Android. Therefore, an attacker analyzing traffic can be practically anywhere (even at the next table in a cafe with free Wi-Fi! A striking example of a sniffer for Android can be called mobile version popular sniffer WireShark:

Using this sniffer and the Shark Reader log analysis program, an attacker can intercept data directly from a smartphone or tablet connected to a public access point.

Countering spies

So we learned how the main types of spyware work. And a logical question arises: “How can you protect yourself from surveillance?”... This is a “difficult, but possible” task.

As you can see, almost all spyware programs can be detected by antivirus software. So the first step is to update antivirus databases security software installed on you. In addition, be sure to open the “white list” of your antivirus package and see if it allows files with suspicious names located in system folders.

If you use the mentioned Punto Switcher (or its analogues), be sure to check if someone has turned on “Diary” without your knowledge.

If no suspicious parameters are found either in the antivirus settings or in Punto Switcher, you can resort to scanning the system with special antivirus scanners. I recommend using programs that I have personally tested more than once and .

In addition, you can check those working in this moment processes using special antivirus dispatchers tasks. An example of this can be called free utility. This tool allows you not only to see the names and addresses of all running processes, but also to quickly assess the degree of their maliciousness (even potential).

The hardest thing is to counteract sniffers. If you cannot completely refuse to use public networks, then the only type of protection may be the use of sites that support the encrypted HTTPS data transfer protocol (most social networks now have it). If the site or service you need does not support encryption, then, as a last resort, you can organize a secure data transfer tunnel using VPN.

conclusions

As you can see, installing and monitoring any computer is not so difficult. Moreover, you can do this completely free of charge using small programs. Therefore, if you use public networks or you work on a PC that is used by several users, then theoretically there is a chance that you are already being watched.

Excessive carelessness and trust can cost you, at a minimum, the loss of passwords from your accounts on social networks, and, in worst cases, for example, the theft of money on your electronic accounts. Therefore, it is important to follow the principle of “trust but verify.”

If you yourself decide to spy on someone’s computer, then you should honestly warn the user about this. Otherwise, if espionage is detected, you can earn a lot of problems on your head :) Therefore, before you spy, think twice about it!

P.S. Permission granted to freely copy and quote. this article provided that open active link to the source and preservation of the authorship of Ruslan Tertyshny.

Spy programs

Exist different kinds spy programs: keyloggers, screenshots, geolocators, information collectors, Internet spies and others. Some universal programs combine several functions, which facilitates information processing. There are also more specific programs aimed at achieving more specific goals: audio, video surveillance of a hidden nature, password selection for Wi-Fi networks, taking pictures from your device's webcam, listening to conversations in popular programs(Skype, Zello, etc.), backup all information from the user’s portable media, saving information from USB drives and many others. Let's look at the most popular of these programs.

RealSpyMonitor

Spyware can not only monitor, but also deny user access to programs and sites. Filters can be configured both by site address and individual requests(for example, block access to all sites using the word “porn” on your home computer). There is also an option to access only authorized sites, blocking access to other Internet resources.



Realspy interface is not Russified


However, this program also has some disadvantages. One of the drawbacks is that the program is completely unable to work with Russian-language operating systems. When recording keystrokes, hieroglyphs are written in log files instead of Russian characters. This is understandable, because the program is not Russified. The second drawback is the high cost of the program, which is also important.

Snitch

This program is not much different from similar programs that deal with remote control and administration, but there is still one significant difference: it operates in a “hidden” mode. All information, collected by the program, sent directly over the Internet. This program is very convenient to use for remote monitoring of your computer or your company’s computers, which can be located both in the office and at home for employees who work remotely. The program has the ability hidden installation, which can help in installing it on remote computers. A special feature of the program is that even if the user does not have an Internet connection, the program still collects information and sends it immediately when connected to the Internet.



Snitch Interface


The program monitors all keystrokes, mouse clicks, sites visited, programs used, as well as files opened and edited. All information is systematized and presented in a convenient form: it is possible to build graphs and reports. You can find out the operating time in each program, the number of hours spent on social networks or games. And tracking file operations will allow you to monitor the safety of proprietary information. However, there are also significant disadvantages: after installing the control module, it is very difficult to disable it, because it is hidden deep in the system. The same problems arise if it is necessary to remove it. Absence fine tuning Tracking each computer separately is very inconvenient, since there is no need to collect all the information about some users.

Download Snitch

PowerSpy

The program is almost a complete analogue of Snitch, differing only in some elements. Unlike the program described above, it has the ability to download reports to FTP server or sending by mail, and works in completely hidden mode. You can call the administrator part of the program only in advance established combination keys

MaxartQuickEye

A program that allows you to collect detailed information about actions performed on the computer. It will be a great help to the boss he faces difficult choice about the reduction of employees. By analyzing reports built on the information collected by the program, it is easy to track the working time spent by each employee. Moreover, real data will be taken into account, and not just the time during which this or that program was open. Even working programm was open all day, but the user spent all this time in in social networks, or by playing games, all this will be reflected in the reports. Based collected information You will get the real amount of time spent by employees on work, and not just time spent at the computer, wasting their pants.


Working time schedule


In addition to the information collection function, the program can create a list of allowed and prohibited programs for each user and limit the operation of programs by time.

MipkoEmployeeMonitor

EliteKeylogger

According to the creators of the program, EliteKeylogger easily interacts with many antiviruses. This is very convenient, because antivirus programs define almost all spyware as “potentially dangerous”. In addition, an important advantage of the program is that it works at a low kernel level in the system and in no way reduces its performance. The program, unlike other keyloggers, has a wider arsenal: there are functions for tracking files sent for printing; programs with which the user works; tracking postal correspondence user; saving correspondence in the most popular messengers(ICQ, Jabber, MSN, AOL, AIM). An equally important feature of the program is working with operating system user accounts, which allows you to monitor each user separately.



Elite Keylogger


The program can send the received information by mail, copy it to a folder in local network or upload to an FTP server. Reports are stored for the period specified in the program or until the file reaches the specified size. Disadvantages: common problems with installation on operating rooms Windows systems 7 and 8. After installing the program, drivers sometimes crash various devices, also some antiviruses block the program.

ActualSpy 2.8

A program that is no different from many other spy programs. Collects data about the user and his system, systematizes and sends information to the user over a local network or to remote server. Periodically, problems arise with antiviruses, especially Kaspersky.

Conclusion

All of the above programs help the user perform certain tasks to monitor computer work. Some have a wider range of actions, some are more narrowly specialized. The main thing is to decide on the tasks assigned to you and choose the necessary program. IN NeoSpy program All necessary modules for monitoring computer operation are provided, including creating pictures from a webcam and geographical tracking of the computer on which the program is installed. Internet traffic tracking will help you keep track of the sites your child visits and what they type. search queries. And reports viewed on a computer or via the Internet will help you quickly get necessary information in a form convenient for you. Also worth noting is Mipko Employee Monitor, which alerts the system administrator about entered words from the list. Another program is Maxart Quick Eye, which can not only track, but also prohibit user actions. You can create black and white lists of programs. The only thing left to do is choose the desired program and install. And your computer will be under control.