This is a monitoring tool for both networked and personal PCs. It lets companies and individuals track use and abuse easily and invisibly using password-protected encrypted log files. You can deploy this tool using e-mail. Simply send an e-mail to the person using the computer you want to monitor. The software will then be installed silently on this computer and the person will never notice that this program is running.