Ensure your computer's security by monitoring all activity on your computer, capturing keystrokes, programs, websites and screenshots. Completely invisible and easy to use, all information captured is stored in an encrypted log file. The log file can be sent secretly at scheduled intervals to any specified email address. All activity in Internet Explorer can be monitored, and webpages are cached for viewing offline. Screenshots can be taken at given intervals, capturing everything that is currently on the screen. Monitor your computer while you are away, retrieve lost information, monitor your children's activity. Software is great for employers as well. Employers can monitor employees computer activities and make sure company time is used wisely and inappropriate material is not being assessed. Software was enhanced and is now compatible with Gmail. Software will run invisible in real stealth mode and can auto capture on startup in stealth mode. Stealth System Surveillance also has a unique playback mode that lets you play all activities back in real time as if you where standing right behind the computer screen watching. In summary, Stealth System Surveillance will capture, record, and store all keystrokes, websites, programs used, and take screen shots at set intervals. Software can also send the log files to any email address remotely invisible or you can access the encrypted log file by entering the software through hotkey and password protection. Stealth System Surveillance runs in real stealth mode and undetectable by antivirus and spyware programs. Stealth System Surveillance is completely safe to use and will not harm your computer and will not lag the system.