Realtime-Spy Frequently Asked Questions
Here you will find common questions about our Realtime-Spy software. Realtime-Spy's 10 Step Installation Guide Realtime-Spy Mac's Installation Guide Realtime-Spy Mobile's Installation Guide Realtime-Spy's Product Manual/Help Documentation Realtime-Spy Mac's Product Manual/Help Documentation Realtime-Spy Mobile's Product Manual/Help Documentation
RTS is has been tested on, and is fully compatible with Windows NT, 200x, XP, Vista, 7, 8, 8.1, 10, Mac OS X 10.6+, macOS, and Android 3.0+. It is recommended you have all the latest service packs and security updates installed, however.
Your antivirus software may have corrupted the file. Please ensure the file is around 100-115kb and try configuring a new monitoring file.
You will need to distribute the Realtime-Spy module you created. This file you created is the file you will send to and run on other computers. For detailed e-mail and network deployment steps please refer to Realtime-Spy's product documentation.
Unlike other monitoring packages, Realtime-Spy is VERY small in size (100-115KB) and will take only a few seconds via email(even on dialup) and only an instant over cable/network connections to download.
While Realtime-Spy runs invisibly unless configured otherwise, the installation informs the user they are installing monitoring software, to prevent unauthorized usage.
To view your activity logs for Realtime-Spy simply point your browser to http://www.realtime-spy.com/members/. You will be prompted for your username and password - enter these as given to you when you purchased RTS.
Absolutely not! Every user has their own unique username and password that only THEY know. You must specify your username and password to login and view activity logs for your Realtime-Spy software
Yes, you can use the Realtime-Spy archive utility in your member's area to download logs from your account for future viewing and saving.
Absolutely. Unlike other remote monitoring products, Realtime-Spy does not care if the monitored PC is behind a hardware firewall or router, or if the PC is on a network, cable, or dialup connection. You will be able to ALWAYS access your logs via your webspace. No need for IP addresses, port numbers, or directly connecting to the remote PC!
Once you start monitoring a computer, your computer and its logs will appear in your webspace! Please wait a few minutes from when the file is first executed for the first sets of logs to appear.
Simply use the password form under the 'Account Management' section in your member's area. This password change will effect remotely deployed Realtime-Spy modules - if you change your password they will no longer update your webspace with logs until you reinstall a new logging module created with your new password.
Please use the 'Remove Computer' function in your member's area. To access this, select a computer you want to remove from the computer selection screen, then click 'Remove Computer'.
Yes, just copy the Realtime-Spy file you configured to your portable drive. Then copy it from the drive/disk/media to the PC you want to install it on - then run the file.
Make sure you are entering the username/password EXACTLY as given to you (the password and username are case sensitive). If this does not work please contact us to have your password reset.
First you should ensure that the software is still running on the remote PC. If it is not, then re-run the logging module you created to restart monitoring. Second, verify that you have not changed your password after creating and installing the module on the target computer. Changing your password will cause the remote module to be unable to access your log storage account. If you are unable to uninstall the computer via your member's area It is advised you first run the stop-rts.exe file on the remote PC (this file is available here, and can be opened with the password "spytech") - once you run this, wait a minute or so - then re-execute the logging module you created on the remote PC - this will restart the monitoring.
The admin commands can take a few moments to take affect and will only work as long as the remote computer is online and active. When a command complete the 'command pending' message will vanish, signifying the command was received and executed.
Some email clients/servers reject executable (.exe) attachments. To circumvent this you can zip up the .exe you created using a zip program (such as Winzip) and then send it (or use the 'Compress to ZIP' option when creating your logging module). You can also place the .exe into a document file (just drag the .exe icon into the document and save it) and send it this way.
Some antivirus or antispyware may interfere with Realtime-Spy's installation and operation. If you experience an antivirus/antispyware conflict please use our exclusion instructions to configure the antivirus/antispyware software on the monitored computer. This will allow Realtime-Spy and your antivirus/antispyware software to work together.