Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Introducing Covert Pro - A unique tool to track programs that are spying on you


  • Please log in to reply
4 replies to this topic

#1 CovertPro

CovertPro

    Authorized CovertPro Rep


  • Members
  • 3 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:10:35 AM

Posted 14 December 2015 - 11:06 AM

Hello,
 
If you are interested in privacy software I would like to invite you to test my program Covert Pro.
 
My program is differs from most classical tools for protecting against spyware. Its effectiveness does not depend on signature databases. It creates a secure environment where user can work safely, without fear for the information that may be entered or viewed. When you working in the secure platform, all user activity across all applications (browsers, email clients, office software, messengers, etc.) are safely hidden. Examples of protection against spyware you can find here: https://covert-pro.com/examples-of-protection/
 
Special function of monitoring system allows user to find and remove any unwanted software. COVERT Pro protects against tracking and theft information even on computers with installed spyware.
 
It is not easy to deliver this information to end users, as there are many antivirus and antispyware products. Sometimes people think that our program works as a typical anti-virus and anti-spyware just scans all hard drive, looking for familiar code or checking memory in the background.
 
We kindly ask visitors of this forum to test basic functionality of our program - protection of keyboard input and image on you screen and post your results here:
- which programs for interception of keystrokes were used.
- which programs for getting video and screenshots were used
- what was in the logs of these programs after you have worked in the secure platform of Covert Pro
 
Below you can read instructions for testing.
 
If after testing this basic functionality someone wants to test our program in full mode, we will provide to him/her the registration key without time limits. Just send us  serial number of COVERT Pro (it is in the registration window) to email reg@covert-pro.com with your detailed information.
 
Your opinion is very important for us.
 
 
Please note that this is a Beta test and that their may be bugs and other issues with the proper functionality of this program. With this said, please report any issues you may find so we can resolve them.


For those who are interested in my request:
Instruction for testing:
 
1. Download the installer of COVERT Pro from here https://covert-pro.com/files/COVERT-Pro-AEA-Inst.exe and install the program on your computer.
 
Installation.png
 
2. Start on your computer any program that can record video from the screen, makes screenshots and a program that intercepts keyboard input (keylogger). You can use a number of different programs, each of them has only one of these functions. You can test several programs and keyloggers to record a video, make screenshots and record keyboard inputs. After running spying program, open COVERT Pro and go to a secure environment by clicking on the big button in the main window "Login to the secure platform".
 
Login%20to%20secure%20platform.png
 
 
3. In demo version you can run a standard program Notepad only in the secure platform, but this is enough to test basic functionality of the masking. Click on the button in the upper corner of the program labeled "Notepad", and in the window that opens, you can edit your text within a certain time. After completing these steps, press the exit button to log out from secure platform COVERT Pro.
 
In%20secure%20platform.png
 
To test surveillance hardware (if you have such device), use virtual keyboard in operating system by running it in secure platform through the context menu of COVERT Pro.
 
Virtual%20keyboard.png
 
4. After leaving your secure platform, check what these spying programs were able to record.
 
Report Form of testing.
 
1)  List of programs that have been used in the test.
 
2) Describe - how did you test, what actions were performed in your secure environment.
 
3) Describe what information were able to get your monitoring software. If it did not get anything, write this.
 
4)  Provide screenshots proving the receipt of information by monitoring software that you were using. If its logs were empty, i.e, it could not get any information, you should not provide screenshots.
 

 
Thank you!
 
Regards,
Igor

BC AdBot (Login to Remove)

 


#2 Grinler

Grinler

    Lawrence Abrams


  • Admin
  • 43,640 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:USA
  • Local time:03:35 AM

Posted 14 December 2015 - 11:25 AM

Thank you for sharing your program with our visitors. Hopefully you will receive constructive feedback regarding it.

#3 quietman7

quietman7

    Bleepin' Janitor


  • Global Moderator
  • 51,771 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Virginia, USA
  • Local time:03:35 AM

Posted 14 December 2015 - 03:56 PM

:welcome: to Bleeping Computer as the Authorized CovertPro Rep.
.
.
Windows Insider MVP 2017-2018
Microsoft MVP Reconnect 2016
Microsoft MVP Consumer Security 2007-2015 kO7xOZh.gif
Member of UNITE, Unified Network of Instructors and Trusted Eliminators

If I have been helpful & you'd like to consider a donation, click 38WxTfO.gif

#4 Umbra

Umbra

    Authorized Emsisoft Rep


  • Members
  • 139 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:02:35 PM

Posted 06 January 2016 - 12:18 AM

i installed and testing it at the moment.

 

i did a quick test using zemana test logger , Covert blocked the keylogging.


Edited by Umbrapolaris, 06 January 2016 - 12:20 AM.


Emsisoft Community Manager


#5 CovertPro

CovertPro

    Authorized CovertPro Rep

  • Topic Starter

  • Members
  • 3 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:10:35 AM

Posted 06 January 2016 - 04:25 AM

Thank you for testing. If you want to test a fully functional version,  please send to the email reg@covert-pro.com the serial number and and we will send you the registration key.






0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users