Frequently Asked Questions
Here you will find answers to common questions regarding Realtime-Spy.
Click here for Realtime-Spy's Help Documentation
Click here for Realtime-Spy's Installation Guide
Realtime-Spy has been tested on, and is fully compatible with Windows NT/2000/XP/Vista/7/8/8.1/10/11 (32 and 64-bit), macOS, MacOS X 10.6+, Chromebook, and Chromium-based browsers. It is always recommended you have all the latest service packs and security updates installed, however.
Your antivirus software may have corrupted the logging module you created and downloaded. Please ensure the file is around 100-115kb, disable your antivirus, and try configuring and downloading a new logging module.
You will need to distribute the Realtime-Spy module you created to your computer you want to monitor. The file you created and downloaded from your member's area is the file you will send and run on other computers you own. For detailed e-mail and network deployment steps please refer to Realtime-Spy's help documentation.
Unlike other monitoring packages, Realtime-Spy is VERY small in size (100-115KB) and will take only a few seconds via email(even on dialup) and only an instant over cable/network connections to download.
While Realtime-Spy runs invisibly unless configured otherwise, the installation informs the user they are installing monitoring software, to prevent unauthorized usage.
To view your activity logs for Realtime-Spy simply point your browser to http://www.realtime-spy.com/members/ . You will be prompted for your username and password - enter these as given to you when you purchased Realtime-Spy.
Absolutely not! Every user has their own unique username and password that only THEY know. You must specify your username and password to login and view activity logs for your Realtime-Spy software.
Yes, you can use the Realtime-Spy archive utility in your member's area to download logs from your account for future viewing and use.
Absolutely. Unlike other remote monitoring products, Realtime-Spy does not care if the monitored PC is behind a firewall or router, or if the PC is on a network, cable, or dialup connection. You will be able to ALWAYS access your logs via your webspace. No need for IP addresses, port numbers, or directly connecting to the remote PC!
Once you start monitoring a PC your computer and its logs will appear in your account. Please wait a few minutes from when the file is first executed for the first sets of logs to appear.
Simply use the password form under the 'Account Management' section in your member's area. This password change will effect remotely deployed Realtime-Spy modules - if you change your password they will not longer update your webspace with logs until you reconfigure their passwords.
Please use the 'Remove Computer' function in your member's area. To access this, select a computer you want to remove from the computer selection screen, then click 'Remove Computer'.
Yes, just copy the Realtime-Spy file you configured to your portable drive. Then copy it from the drive/disk/media to the PC you want to install it on - then run the file.
Make sure you are entering the username/password EXACTLY as given to you (the password and username are case sensitive). If this does not work please contact us to have your password reset.
First, you should ensure that the software is
still running on the remote PC.
If it is not, then re-run the logging module you created to restart monitoring.
Second, verify that you have not changed your password after creating and installing
the module on the target computer. Changing your password will cause the remote
module to be unable to access your log storage account.
If you are unable to uninstall the computer via your member's area It is advised you first run the stop-rts.exe file on the remote PC (this file
is available here - password: spytech) - once you run this, wait a minute
or so - then re-execute the logging module you created on the remote PC - this
will restart the monitoring.
The admin commands can take a few moments to take affect and will only work as long as the remote computer is online and active. When a command complete the 'command pending' message will vanish, signifying the command was received and executed.
Most email clients/servers reject executable (.exe) attachments. To circumvent this you can use the 'Compress to ZIP' option when creating your logging module, and send the zip file to your remote computer. You can also place the .exe into a document file (just drag the .exe icon into the document and save it) and send it that way.
Some antivirus or antispyware may interfere with Realtime-Spy's installation and operation. If you experience an antivirus/antispyware conflict please view our exclusion instructions to learn how to exclude Realtime-Spy from your antivirus/antispyware. Excluding Realtime-Spy will allow it and your antivirus/antispyware software to work together without any conflicts. If you need assistance with doing this please contact us.
Your Realtime-Spy account can hold up to 500 screenshots at any given time. 500 more screenshots can be added to your storage limit for $19.95. You can increase your storage capacity as many times as you need.