Author SpectorSoft
Rating
4.5/5

Pros

  • Time lapse view of monitored computer
  • Can be used to block specific Web pages
  • Can customize monitoring for individual users
  • Possible to access data remotely if user ID on monitored computer

Cons

  • Cannot block user’s current home page
  • Could expose sensitive private information
  • You need physical or network access to the computer to view logs