Invisibly logs and secures all activity on a PC and across a network. All references to the program are encrypted and hidden. Password protected interface allows review and print of results. Install and update settings across networks in real time, monitor application usage, hide folders, log keystrokes, instant read-outs of individual machines at any given time.