Full featured list

User Interface

Almost real time database environment.  When viewing records, a simple click of the mouse will refresh the database showing the most current records for all computers on the network.  Allowing you to “virtually” walk around from computer to computer seeing how they are being used.

User friendly graphical interface that even beginners can master.

Easy point and click reporting video porno.

White Box Basics

Over a dozen items of information are recorded including user, application, keystrokes, date, start time, end time, elapsed time, active time, inactive time, copy/cut/paste contents, application title, application location, and more.

All information is either encrypted, password protected or both.

Records all application use, and the keystrokes typed.

Almost every feature of Black Box can be turned on, or off, giving you the ability to determine exactly how the computer is monitored.

Block certain activity from being recorded!  Don’t want to monitor specific programs, or monitor activity during certain times of the day?  No problem!
Uses the latest in software technology to provide the fastest, most reliable software available.

Easy visual confirmation that White Box is running.  You can display one of two program icons in the systray, both serving different functions.  However, they both tell you that White Box is running on the computer – without requiring you to actually sit down at the computer and type in the program access hot keys.

White Box is specifically designed for use on heavily used computers / networks.

No recurring monthly fee’s for use.  You pay a one time fee.

Powerful Reporting

All information is saved into a fully searchable database.  Searches can be made by user, application, date, time, keystrokes, window title or any combinations of these.

Chart reports can be instantly created to reflect exactly how the computer is being used.  Either bar or pie charts can be created.

Database records and charts can be printed.  Charts can be printed in color or black and white!
The quick report window gives you the option of printing individual records of computer usage.  No need to print 1000 records, when you only need a couple!

Database records can be exported to HTML documents, allowing users to browse records from your company’s intranet, or over the Internet.

Computer usage productivity can be determined by a a few clicks of the mouse.  Easily determine if the computer is primarily being used for Internet access, work activity, or playin games!

Stealth Technology

White Box runs completely invisible.  When in Stealth Mode it will not show in the taskbar, task manager, or alt + tab window.

There is no unneeded background processing.  White Box only processes information while the computer is being used.  If the computer is sitting idle, so will White Box.  No mysterious hourglass mouse pointers will appear, or hard drive activity will happen – White Box never gives away the fact that something is running in the background.

White Box creates random length, random character titles.  Sniffing software won’t be able to search out White Box based on it’s name, to shut it down.

Restrict access to the folder where White Box is located.  When a user tries to do something in the White Box folder, White Box will automatically close the Explorer window.

Restrict access to the computer registry.  When users try to browse through the registry using regedit, Black Box will automatically close the regedit window.

White Box won’t record any activity that happens within White Box.

Networking

Computer activity can be saved to a database across almost any network setup.

UNC or mapped drives can be used.

White Box can save to a password protected share.

Hidden shares can also be saved too, in fact we recommend it!

If the remote database becomes unavailable, White Box will automatically default to another database.

White Box automatically logs in to the remote computer, completely hidden in the background.  No password dialog windows will open.  If the remote computer is unavailable, White Box will automatically switch to another database.

Security

Access to White Box is password protected.

Access to the White Box database is password protected.

You determine the program access hot keys.  If you don’t want to use the default program access hot keys you can change them to any of a couple hundred possibilities.

If you plan to inform computer users of potential monitoring, White Box gives you the option of creating a custom warning screen.  Access cannot be gained into White Box from this warning screen.

White Box runs virtually undetectable in the background.  Making it virtually impossible to detect and close.

Plus Alert

The Alert add-on gives you the ability to monitor for specific activity.  Based on either words or specific programs.  Records that trigger the Alert add-on will be saved to a separate section of the database that only contains Alert activity.  Giving you instant access to questionable activity, without having to comb through all computer records.

Almost instant emails!  White Box plus Alert will email you when questionable activity takes place if you select this option.  This is great for addressing issues as they arise, instead of days or weeks later!