PC Agent for Linux


PC Agent for LinuxPC Agent for Linux monitors and records the activities of all users on a Debian based Linux system unnoticed. The monitoring captures all common activities like keystrokes, Clipboard, visited websites and screenshots. PC Agent for Linux is specially designed to send the records in several different ways.

System requirements:
Linux distributions based on Debian, CPU x86/x64

Screenshot

PC Agent for Linux

Download and try out for free

DownloadVersion 2.1

Order your license key

Buy NowSingle License $ 89

User monitoring

Keystrokes

Keystrokes

Records all keystrokes, shortcuts and hotkeys.
Clicks

Clicks

Records mouse clicks.

User logon/logoff

User logon/logoff

Records the logon and logoff of users with additional information.

Clipboard

Clipboard

Records the text and file names which will be copied to the clipboard by the user. This happens usually by the use of the context menus «Copy» and «Paste» or with the shortcuts CTRL+C and CTRL+V.

Screenshots

Screenshots

Captures screenshots of the windows which will be moved in the foreground and then in the specified interval. The motion detection as well as adjustable values for the size and quality can reduce the size of the records.

File operations

File operations

Records the names of files which will be opened or deleted by the user.

Device monitoring

Power state

Power state

Records the power state, for example, standby and hibernate mode and battery state on laptops.

Data medium change

Data medium change

Records mounted or unmounted storage media with additional information.

Internet monitoring

Visited web pages

Visited web pages

Records the URL of the web page which will be visited by the user with a browser. The following browsers are supported:

Browsers, which uses the Mozilla Engine (as e.g.: Firefox, Iceweasel); browsers, which uses the Blink Engine (as e.g.: Google Chrome, Opera); browsers: Epiphany, Konqueror.

Sending records

PC Agent for Linux is specially designed to send the records in several different ways.

More features

Selective user monitoring

Excludes users from the monitoring or monitors only certain users.

Automatic uninstall

Uninstalls the monitoring as soon as the monitoring starts on or after the specified date.

Delete records automatically

The records can be deleted automatically. This is helpful to avoid additional effort to delete the records manually.

Protection against unauthorized use

The control-center can be protected with a password against unauthorized use. This password is required to start the control-center on the monitored computer. This feature is only available with a valid license key.

Filter records

The records can be filtered by many criteria. The filtering is very quickly and easily to use. It is usually only one click necessary.