http://www.geckomonitor.com

Similar documents
User Guide Online Backup

ecstudent-ts Terminal Server How to Use

IBM/Softlayer Object Storage for Offsite Backup

1. Open Thunderbird. If the Import Wizard window opens, select Don t import anything and click Next and go to step 3.

ecfshome-ts Terminal Server How to Use

How to Setup OSX Mail to POP an Exchange Account

User Guide. Time Warner Cable Business Class Cloud Solutions Control Panel. Hosted Microsoft Exchange 2007 Hosted Microsoft SharePoint 2007

MICROSOFT OUTLOOK 2011 GETTING STARTED AND HELP RESOURCES

Initial Setup of Mozilla Thunderbird with IMAP for OS X Lion

1. Open the preferences screen by opening the Mail menu and selecting Preferences...

Remote Viewer Recording Backup

Neoteris IVE Integration Guide

Welcome to EMP Monitor (Employee monitoring system):

Shentel (Shentel.net)

1. Navigate to Control Panel and click on User Accounts and Family Safety. 2. Click on User Accounts

HOW TO RETRIEVE FILES FROM THE TARGET ANALYTICS FTP SITE

Move Your to AT&T Website Solutions

SOS SO S O n O lin n e lin e Bac Ba kup cku ck p u USER MANUAL

Here are the steps to configure Outlook Express for use with Salmar's Zimbra server. Select "Tools" and then "Accounts from the pull down menu.

How to use SURA in three simple steps:

Getting started with IMAP for Aggi What is IMAP?

Initial Setup of Mozilla Thunderbird with IMAP for Windows 7

How To Restore Your Data On A Backup By Mozy (Windows) On A Pc Or Macbook Or Macintosh (Windows 2) On Your Computer Or Mac) On An Pc Or Ipad (Windows 3) On Pc Or Pc Or Micro

RSCCD REMOTE PORTAL TABLE OF CONTENTS: Technology Requirements NOTE

Virtual Office Remote Installation Guide

PCRecruiter Resume Inhaler


Configuring Outlook 2013 For IMAP Connections

Netscape Setup Instructions

Outlook Express POP Instructions - Bloomsburg University Students

Installing Remote Desktop Connection

Sending an Encrypted/Unencrypted Message. Let's Begin: Log In and Set Up Security Questions. Create Additional ProMailSource Accounts:

USING YOUR GMAIL ACCOUNT FOR SCRUBBING YOUR REGULAR OF SPAM Beginners Kaffee Klatch Presented by Bill Wilkinson

Outlook Express. Make Changes in Red: Open up Outlook Express. From the Menu Bar. Tools to Accounts - Click on. User Information

Outlook Web Access End User Guide

Neoteris IVE Integration Guide

Installing LearningBay Enterprise Part 2

How to Setup and Connect to an FTP Server Using FileZilla. Part I: Setting up the server

User guide. Business

Exchange 2003 Mailboxes

FORWARDING (directed to a non-gcccd account) Revised 3/22/13

Pentagon Message Exchange Setup Guide: All Devices

Abila Grant Management. Document Management

HOSTED DESKTOP MANUAL

Setting Up Your FTP Server

This information is provided for informational purposes only.

BOTTOM UP THINKING SETUP INSTRUCTIONS. Unique businesses require unique solutions CLIENT GUIDE

Configuring Outlook 2013

Student Mail Access. Introduction. Option One: Using an Client

UNI - WINDOWS. How to... Access your University on your Windows Computer. Introduction. Step 1/1 - Setting Up Your Windows Computer

Accessing your Staff (N and O drive) files from off campus

Configure Outlook 2007 for Brandeis Gmail

Getting Started with Your New Services

NAS 225 Introduction to FTP Explorer

Outlook 2010 and 2013

How do I Install and Configure MS Remote Desktop for the Haas Terminal Server on my Mac?

Vodafone PC SMS (Software version 4.7.1) User Manual

PC Instructions for Miller LiveArc Software

Guide for Alumni. Transferring Office365 s to a Personal Account

ACCOUNTS EXPLAINED GMAIL

Fasthosts Internet Parallels Plesk 10 Manual

Before You Begin: NOTE: Please read each step of these instructions carefully as not all steps include accompanying pictures.

HOW TO CONNECT TO FTP.TARGETANALYSIS.COM USING FILEZILLA. Installation

Safe internet: Getting Started Guide

How to recover IE Client

Setting up your King s account on your Windows phone

Getting Started with Microsoft Outlook with Exchange Online Software from Time Warner Cable Business Class

Safe internet for business use: Getting Started Guide

Technical Support Set-up Procedure

Remote Desktop Instructions for the Remote PC Running Windows Vista

IsItUp Quick Start Manual

Lytecube Technologies. EnCircle Automation. User Guide

IT Quick Reference Guides Using Windows 7

Grapevine Mail User Guide

Cryptshare for Outlook User Guide

Choic Small Business Installation Guide DigiPortal Software, Inc.

THUNDERBIRD SETUP (STEP-BY-STEP)

-lead Grabber Business 2010 User Guide

DESKTOP CLIENT CONFIGURATION GUIDE BUSINESS

How to Set Up Your. Account

Sendspace Wizard Desktop Tool Step-By-Step Guide

Windows XP Pro: Basics 1

Moving from Yahoo! Mail to AT&T Website Solutions

Using Google Docs in the classroom: Simple as ABC

Table of Contents. Rebit 5 Help

ACCESSING YOUR CHAFFEY COLLEGE VIA THE WEB

1 Login to your CSUF student account and click on the Settings icon ( ) at the far right.

COX BUSINESS ONLINE BACKUP

Configuring your client to connect to your Exchange mailbox

Installation Guidelines (MySQL database & Archivists Toolkit client)

BULLGUARD BAckUp GUIDE

Plesk 11 Manual. Fasthosts Customer Support

You must have at least Editor access to your own mail database to run archiving.

Adding ECA Marketing to your safe-senders list

Bitrix Site Manager ASP.NET. Installation Guide

Instructions for accessing the new TU wireless Network

Advanced Event Viewer Manual

Transcription:

http://www.geckomonitor.com We've aimed to make Gecko Monitor as user friendly and easy to use as possible, but in case you're running into problems this guide will take you through the functionality of the application. This user manual is broken up into the following sections: 1. Quick start guide 2. Settings 3. Screenshots 4. Keystrokes 5. Websites 6. Applications 7. Printers 8. Clipboard 9. Files 10. Timeline 11. Email Reports 12. Save Reports 13. Uninstall 1. Quick Start Guide To get started using Gecko Monitor follow the following quick start instructions. If you want to learn about each function in further detail move on to its corresponding section... 1. Download Gecko Monitor from the website. Once the installer is downloaded double click the install_gecko.exe file. This file can usually be found in your downloads folder. 2. On the final screen of the install wizard you can choose whether to run Gecko Monitor or not. If you're are running windows with administrator rights you may receive an error message. If you do, right click the desktop icon and click 'Run as administrator'. 3. When you run Gecko for the first time you'll be asked to provide a password. Please don't forget this password as you won't be able to retrieve it at a later date. Once you set your password Gecko will open for the first time. 4. You can start monitoring straight away by clicking the 'Start Monitoring' button. You can then re-open Gecko at any time and view the logs by pressing the default key combination K of control+alt+f12. It is recommended that you configure Geckos settings before you begin monitoring.

5. Click settings to configure Gecko Monitor. 6. You can choose your own show/hide short cut and if Gecko starts on Windows start up on the first settings tab. Please remember your show/hide short cut. 7. You can also choose whether you want Gecko to be shown or hidden in the windows tray while monitoring. If you check this option, you can double click the icon in the tray and enter your password to open the application. 8. You can also set up remote email reports on this screen: To set up remote email reporting make sure 'Send logs via E-Mail' is checked at enter the email address you would like to send the reports to in 'Send mails to:' You will need to enter your SMTP details to allow Gecko to send the reports. If your email account is with Gmail you can leave the settings as they are and enter your email address and password.

Gecko Monitor needs this information because it uses your account to send and receive the logs. If you're uncomfortable with entering this information you can set up a new free email account with gmail or hotmail and use that to send the reports. If your email account is with Gmail the settings should be: SMTP server: smtp.gmail.com SMTP port: 465 Username: Your email Password: Your Password If your email account is with Hotmail the settings should be: SMTP server: smtp.live.com SMTP port: 587 Username: Your email Password: Your Password If your email account is with Yahoo the settings should be: SMTP server: smtp.mail.yahoo.com SMTP port: 995 Username: Your email Password: Your Password Remember to click 'Send test mail' to check your settings and check for email in your inbox. The reports will be attached to the mail as an attachment. 9. These steps should suffice for an initial set-up of Gecko Monitor. Click 'Start Monitoring' to hide the application. The system is now being monitored. 10. To view the logs simply enter the secret key combination at any time, followed by your password. 2. Settings The settings window is where you can configure Gecko Monitor. We covered a couple of the functions in the quick start guide. On the 'General' tab you can also change your password, uninstall the application and choose whether you want Gecko Monitor to be hidden or shown when monitoring. Screenshots settings tab

On the screenshots settings tab you can change how often you want screenshots to be taken. You can change the time in between screenshots and whether the screenshots are taken whenever a new window is focused. Keylogger settings tab The keylogger tab allows you to choose whether you see backspaces or whether they delete the last character in keylog reports. The latter is recommended. Websites settings tab/files settings tab If there's certain websites or files you want to ignore when monitoring you can enter them here. You can also add * as a wildcard at the end or beginning of the website/file. e.g. if you want to ignore everything from the BBC website you'd add: *bbc.com* Printers settings tab Here you can choose which printers you want to monitor. 3. Screenshots The screenshots tab shows you what's been happening on screen. Each screenshot is labelled with the date, time and the name of the active window. You can filter the screenshots by date using the calander. Double click a screenshot to view it in full screen mode. Right click to delete.

4. Keystrokes Applications that have been typed in are shown in the panel on the left, along with the date and time of when it was used. Clicking an application will expand the panel into sub categories (if it's a web browser it will expand into websites). Clicking a section will show you the keystrokes entered. 5. Websites

The websites tab show you all the web requests made from the computer, along with the date and time of the visit. You can go to a website by right clicking the desired entry. You can also delete the entry or add it to the ignore list. NOTE: The websites tab shows all web requests, not just websites. This means you may see requests from applications updating, antivirus updating, websites requesting additional data etc. 6. Applications The applications simply shows the applications that have been used, in the order that they have been used. The date and time is shown on the right. This tab also shows the title of each application bar. This can be handy when viewing web browsers as it will show you the full title of the website visited. 7. Printers

The printers tab will show you all print jobs from the computer. You can choose which printers are monitored in settings. From right to left the tab shows you the name of the printed document, the amount of copies, the printer name and the date and time of when the document was printed. 8. Clipboard The clipboard tab shows you anything that has been copied (Control+C) onto the clipboard. It does not show if that item has been pasted. The application that the item has been copied from is shown on the left and the copied information is shown on the right. 9. Files

The files tab shows you any file activity, including created files, moved files, deleted files, opened files and saved files. From left to right the tab shows you the operation that was performed (delete, save etc), the path of the file, and the date and time of the file operation. 10. Timeline The timeline tab shows you a snapshot of what has happened on the computer in chronological order. You can choose the date using the calender. The time is shown on the bar running through the middle. You can drag the timeline left and right using the slider at the bottom. This will show events that have happened. Screenshots will be shown at the top and applications, websites and keystrokes at the bottom. You can click an entry to be taken to the corresponding tab. PLEASE NOTE: Timeline only shows a brief overview of what has happened, it will not show everything. To see precise reports use each tab. 11. Email Reports To set up remote email reporting make sure 'Send logs via E-Mail' is checked at enter the email address you would like to send the reports to in 'Send mails to:' You will need to enter your SMTP details to allow Gecko to send the reports. If your email account is with Gmail you can leave the settings as they are and enter your email address and password. Gecko Monitor needs this information because it uses your account to send and receive the logs. If you're uncomfortable with entering this information you can set up a new free email account with gmail or hotmail and use that to send the reports. If your email account is with Gmail the settings should be:

SMTP server: smtp.gmail.com SMTP port: 465 Username: Your email Password: Your Password If your email account is with Hotmail the settings should be: SMTP server: smtp.live.com SMTP port: 587 Username: Your email Password: Your Password If your email account is with Yahoo the settings should be: SMTP server: smtp.mail.yahoo.com SMTP port: 995 Username: Your email Password: Your Password Remember to click 'Send test mail' to check your settings and check for email in your inbox. The reports will be attached to the mail as an attachment. 12. Save Reports To save the reports (you can then copy them to disk or email them etc) click the save reports button in the bottom right hand corner. You can then choose which reports will be saved. When you click save you choose the location and name of the saved report file. The reports will be saved as a zipped folder which can be opened by right clicking and clicking extract or unzip. You can then open the folder and double click each report to view it separately. 13. Uninstall To uninstall Gecko Monitor go to settings the click 'Uninstall Gecko Monitor' on the general tab. This will completely remove the application from your computer. Thank you Thank you for choosing Gecko Monitor. If you have any further queries, comments or ideas for the next version you can contact us using the contact form on our website: http://www.geckomonitor.com/contact.html