Remote Laptop Spyware
LAPTOP SPYWARE > Remotely Spy on YOUR Laptop or Notebook

Below you will find FAQs for the follow:


1. What will appear on my credit card bill? All purchases will appear on your credit card statement from "DiGITAL RIVER.", our payment processor.

2. What payment methods are accepted? We accept Visa, Discover, MasterCard, American American Express, Personal/Business Check, Cash, Money Order, PayPal, and Direct Wire Transfers.

3. Can I purchase by postal mail? Yes, begin the order online by selecting your options in the drop down menu when purchasing and you'll receive additional directions for mailing in your payment.

4. Can I purchase over the telephone or with a money order? Yes, purchasing over the telephone or by money order is easy. Just select the option in the drop down menu when purchasing, further instructions will be given for you to proceed..

5. Do you offer your software on CD-Rom? CyberSpy, our local monitoring solution is available on CD-Rom, but RemoteSpy is not due to it's remote installation capabilities. Receiving a CD-Rom with your purchase is as easy as selecting the CD-Rom option while placing your purchase. The selection of a CD-Rom with your purchase carries a small additional fee.


1. CyberSpy is not logging my AIM Instant Messenger what's wrong? This usually happens when you are using an unsupported AIM add on. There are several of these, however the most common is DeadAim. Addons of this sort typically alter the messenger and can cause CyberSpy to not recognize it anymore. To fix this you can either uninstall the AIM addon or use the keylogging function along with the snap shots to view instant message conversations.

2. Should I uninstall the trial version before installing the full version?
Yes, it is important that the trial version is uninstalled before trying to install the full version of CyberSpy. This will make sure that there are no conflicts between the versions.

3. How do I start using CyberSpy?
Simply install, and run CyberSpy and you'll be greeted by a quick and easy configuration wizard screen. Need assistance with more advanced features? Then please don't hesitate to ask for assistance at our helpdesk.

4. What email clients are currently supported by CyberSpy?
Currently CyberSpy directly supports Outlook, Outlook Express, and AOL up to 9.0 SE. All other email clients will have their typed or composed email recorded via the Keylogger.

5. Will anyone be able to access CyberSpy once I have installed it? No one has access to CyberSpy except you. You are able to create your own personal password and hotkey to access your account to ensure that the logs remain private until you have time to view them at a later date.

6. What operating systems is CyberSpy compatible with? Currently CyberSpy supports the following Windows Operating systems, versions 98/98SE/2000/ME/NT/XP and Vista!

7. I use the hotkey to access CyberSpy, but nothing happens? CyberSpy is probably not running. Double click the CyberSpy icon to load CyberSpy then click "Start" to commence monitoring. Be sure to click 'Start' again next time you stop monitoring, to ensure it stays running. If you exit the software, it will no longer be monitoring.

8. CyberSpy is not logging my Instant Message conversations what's wrong?
Make sure that you have enabled recording of Instant Message conversations under the general logging tab in the configuration area.


1. What internet connections is RemoteSpy compatible with? RemoteSpy in completely compatible will all local area networks, cable, dsl, adsl, and dial up connections. The upload speed for log files may vary depending on the type of internet connection.

2. Is my RemoteSpy account protected? Can anyone access it? RemoteSpy uses a plethora of security measures to maintain the safety and confidentiality of your personal information. Sensitive information transmitted between you and our website can only be accessed with your username and password.

3. Can RemoteSpy be installed from external drives or CDROMS? Yes, RemoteSpy can be installed simply by copying the monitoring executable generated from your configuration to any pc. Simply copy the file to a disk and run the file on the pc you intend to monitor. The installation is completely stealth and runs instantly.

4. How do I view the recorded data in my members account? Upon purchase, each RemoteSpy user is given detailed instructions on how to access their account. This email well tell you how to register your username and password and login details. If you have lost your username and password you may retrieve it here simply by entering your email address. It will be sent to you immediately.

5. What operating system is RemoteSpy compatible with? RemoteSpy is compatible with all web browsers and is fully compatible with Windows 98/2000/ME/NT/XP and Vista. We currently do not support the monitoring of MAC Computers, but RemoteSpy can easily be pre-configured from a MAC computer and then delivered to a Windows based pc for monitoring.

6. What happens when a user clicks on the whatever.exe? RemoteSpy is completely stealth and designed to install without warning. Once the executable is clicked the monitoring application will be started instantly. There are no signs or warnings whatsoever.

7. How do I uninstall RemoteSpy once I am done using it? Remote Spy can be easily uninstalled by logging into your RemoteSpy control panel, selecting a user and clicking uninstall. This will completely stop the monitoring process and uninstall RemoteSpy.

If I purchase RemoteSpy, do I get unlimited use of the software? Once you complete your secure online purchase and access your RemoteSpy account you are given 365 days access to this account. You may log as many users on a computer as you want. You will receive an email notice when your account is due for renewal a week prior to it expiring.

9. Will a firewall stop RemoteSpy software from working? In most cases a firewall will cause other products to be blocked however, RemoteSpy uses a special feature to send the logs to our server. Our remote spy software also features an optional advanced firewall bypassing feature that you can enable for increased firewall bypassing. A firewall in most cases will not stop RemoteSpy from transmitting recorded data.

10. How Do I change my password? You can change your password at any time via the "Edit Details" area inside of your administration control panel online. Note: Changing your password will require you to deploy a new spy module to any computers currently being recorded, as the passwords must match for secure log uploading.

11. Can I change my existing username? Unfortunately, you cannot change your username once you have created it. So be sure to choose something that you like.

12. How often do the logs update? Log data is synchronized in 10 minute intervals as long as the computer is online and connected to the internet. Upon first deployment logs will appear within a few minutes.

13. Is it possible to use RemoteSpy on MAC computers? Currently we do not have support for monitoring MAC computers. If you use a MAC but would like to monitor a PC then simply use the web-based spymodule creator to pre-configure your spymodule for delivery to the PC you wish to actively monitor.

14. Once I have created the Remotespy executable module, can I use that same module/file to monitor a few different machines?
You do not need to create an additional module for each additional computer that you wish to monitor. However, it is required that you have the appropriate number of licenses purchased to monitor each additional computer.

15. Where do I download my RemoteSpy software? Accessing your RemoteSpy software is as easy as logging into your administration area and utilizing the "Create Spymodule" option. In this area you can easily pre-configure and download your spymodule that you will send to and have executed on the computer you wish to monitor.

More Support...

I need further assistance please help... (NOTE we do not answer questions about illegal spying or where it has been answered above. Thanks!)


License Agreement

1. You may use the program on a single computer at one time. You may not copy the program and accompanying materials except for backup purposes to use in support of using the program on a single machine at one time.

2. You may only install this software on a computer that you own, or on a computer from which you have consent of the owner to install this software.

3. You may not make copies of the program for sale or distribution.

4. This software is copyrighted, and all rights therein are reserved for CyberSpy Software. Purchase of this product does not transfer any right, title, or interest in the software except as specifically set forth in this agreement. You are hereby notified that the software product is protected by United States Copyright Law, and you may be held responsible by CyberSpy Software for any infringement of such rights or violations to this agreement.

5. This license is effective until terminated. You may terminate it at any time by destroying the program and all copies of it. It will also terminate if you fail to comply with any term or condition on this agreement. You agree upon termination to destroy the program together with all copies of the program.

Warranty: This program is provided "as is" without warrantee of any kind, either expressed or implied, including any warranty of merchant ability or fitness for a particular purpose. In no event shall CyberSpy Software be held liable for any loss of profit, special, incidental, consequential, or other similar claims.


All our products are distributed and licensed on an "as is" basis and no warranties or guarantees of any kind are promised by CyberSpy as to their performance, reliability or suitability to any given task. In no event shall CyberSpy be liable for any loss of data or ANY DAMAGES OF ANY KIND, financial, physical, emotional or other, which might arise from its use.

Our products may NOT be sold or distributed in any way without prior written consent from CyberSpy.

All sales of our products are final. No refunds will be issued, guaranteed or promised. Once we issue a registered copy there is no way for us to recall, or rescind a registered program that has already been issued to a customer. Essentially, once the program has been issued there is no way for us to guarantee that a customer has not, or is not continuing to use the product.

It is company policy that our customer databases remain confidential and private. We have not, will not, and won't ever sell names to "spammers" or other parties who would like to use our databases to advertise or solicit their products or services. CyberSpy products do not collect any information from your system other than the information required for the products successful operation. Your private information is safe with us.

It is the policy of CyberSpy to offer free E-mail based technical support to all of our registered and unregistered customers. We will filter support requests for all non-freeware products of CyberSpy from unregistered users.

CyberSpy will take legal action against any users that are found to be pirating CyberSpy products. In addition, CyberSpy will report any users found pirating other products to the products developer or care-keeper.

By using any CyberSpy product you agree not to decompile, reverse engineer, modify or change any part of it for the reasons of discovering its internal methods or works. To do so is a violation of CyberSpy's copyright protection.

All graphics, software, code samples, and other digital information contained on this web site, as well as software distributed over the Internet are copyright protected and owned by CyberSpy Software. Should you wish to use any site content, be it text information, code samples, or what have you, please contact us for permission.

By installing, running, or using any CyberSpy product or service you agree to the above Policies. In addition you agree that you will follow the CyberSpy Policies at all times when using a CyberSpy product or service.


Cyber Spy

Remote Spy




Copyright © 2012. All Rights Reserved for Co. | | |

Terms & Privacy:
It is only legal for you to monitor a computer or laptop you own or administrate. Please Check local laws. If you use our products with malicious intent you are
We never share your Information with any third parties. All Order processed are fully encrypted and 100% secure