007 STARR PC & Internet Monitor

 User Manual

Content

» Introduction

» Invisible Installation

» One-Click-Install.

STARR Commander

» Dashboard

» Surveillance

» Security

» Email Reporting

» Registration

» About STARR

» The 007 security tools series

» Newsletter

» Frequently Asked Questions (FAQ)

» About iOpus

Text files:

» License.txt

» History.txt

» Readme.txt

» Register.txt

 

Email: support@iOpus.com

Web: http://www.iOpus.com

Note: This electronic manual is a single HTML file and can be printed easily. It gives you a 15 pages paper manual. Press "Ctrl+P" to print it.

 

x

x

STARRtm is the award-winning, highly flexible, all-round monitoring solution used by concerned parents, small businesses, and "Fortune 500" companies alike. STARR is also popular for many special tasks like usability testing or scientific studies of PC usage.

 

  • "STARR" allows you to log all keystrokes, user names, passwords, path names, access times and window titles, then send the log file by email, all invisibly, behind the scenes.

  • All information is stored in a password protected encrypted text file and can be easily converted to spreadsheet format or interactive HTML based report. Thus the recorded information is completely searchable for keywords e, g. "mp3" or "xxx".

  •  "STARR" has a "WEB Spy" to record all URL's visited. The report can be made in plain text or HTML (just Click & browse to the recorded sites). 

  •  "STARR" has a "CHAT Spy" that logs BOTH sides of a chat conversation for most popular chat software, including AOL, AOL Instant Messenger, Microsoft Messenger and Yahoo Chat. Especially for AOL users, STARR also has a "AOL Spy

  •  Unlike filter software, STARR is completely maintenance free. No database to update !

  • The "STARR" program is not visible on your screen and is easy to set-up on all Windows platforms. The logging engine itself is a powerful application that runs invisibly in the background. It is guided by the STARR COMMANDER which allows you to choose and set up your options easily.

Tip: An online version of this manual can be found at http://www.iOpus.com/starr-help.htm 

 

Invisible Installation of STARR

Basically there a two scenarios where an invisible deployment of STARR is used:

  1. Surveillance across a PC network (the "target PCs") from an administrators PC. This is the typical scenario in a business, university or school environment.

  2. Surveillance of a stand-alone PC, which means that one PC is both the target and administrator PC at the same time. This is the typical scenario when STARR is used on a family PC for parental control.

The STARR installation wizard automatically creates an invisible installation for you. Remember, if you installed STARR invisible there is NO menu entry to start the STARR Commander. Instead, type "starrcmd" in the RUN menu. For added security you can also rename the starrcmd.exe file and/or passwort-protected the STARR Commander. For more information, go to the Security section of this manual.

In addition to the automatic invisible installation, system administrators can further customize the installation of STARR to suit their needs, for example files can be renamed and/or the installation can by automated using the STARR One-Click Installation.

If you are not a system administrator, you can continue reading here

 

One-Click-Installation™:

To avoid re-entering your settings for every PC where you install STARR, you can store the settings in a file and use the "One-Click-Installation".

On the first PC, use the STARR Commander and adjust the logging options, settings and paths to meet your requirements. Then go to SETTINGS >> SETTINGS FOR MANUAL INSTALLATION. Click STORE SETUP INFORMATION and STARR Commander creates a file (starr.ini) in its home directory. Now simply use the settings stored in this file for all future installations. Copy this file along with the other target PC files on the PC, click on starrcmd.exe (or wsys.exe) once and STARR automatically reads the settings! The file name MUST be "starr.ini" and you MUST place this file in the same directory as starrcmd.exe OR wsys.exe (depending on which one you click). Please make sure that you enter the path names the way they are on the target PCs.

Once the settings are stored, STARR confirms this with a popup and deletes the "starr.ini" file automatically.

One-Click-Installation is available to all users with a multi-user or site-license.

Note 1: You can add <PC>, <USER>, <DATE>, <TIME> tags to the filename. STARR will automatically replace them with the current PC name, user name, date or time. Example: If you name the log file "my_log_file_<USER>_<PC>.txt" STARR automatically create separate log files for each user and each PC !

Note 2: STARR Commander has a command line option for an easy conversion of STARR log files into reports:

Example:

  starrcmd -convert slog.sys report.htm 

converts slog.sys into the report with file name report.htm. Passwords and other settings are taken as stored in STARR Commander.

 

 

Step-by-Step guide for a MANUAL installation

Scenario: One administrator PC and many target PCs 

1. Do a standard installation on the (administrator) PC

2. Evaluate STARR and decide which settings you need

3. Copy the necessary STARR files to a disk. The files are marked with "target PC" in the file list table (below). In addition, you need the STARR commander during the set-up.
4. Copy the files from your disk to a directory on the target PC, e.g. "c:\windows" is typically a good choice.
5. Start the STARR commander on the target PC and re-enter the settings (or use one-click installation), including your registration code. Make sure you activate the autostart option and check that the logging engine EXE and DLL paths point to the correct location of these files on the target PC. To change the path for the STARR log (wsys.exe and wsys.dll), go to SETTINGS > ADVANCED SETTINGS and enter the new path name.

Alternative: Use the One-Click Installation

6. Delete the STARR commander on the target PC (optional).
7. To evaluate a log file transfer it back to the administrator PC or have it automatically emailed to you. 

 

Detailed overview of the files needed for a manual installation:

(You'll find all these files in the Starr home directory after a standard installation.)

Filename

Description

Used where ?

Install where ?

wsys.exe 

the logging engine

target  PC

Can be installed in any directory, for example c:\windows if you need to hide the file. If you move and/or rename the file you have to adjust the path to it in the "security" tab of the STARR Commander. 

wsys.dll 

the logging engine support file

target PC

Can be installed in any directory, see wsys.exe above for details.

see32.dll 

a standard windows file that contains  networking capabilities

target PC and administrator PC

Install in the windows system directory, this is typically c:\windows\system on Win 95 / 98 / ME or c:\windows\system32 on Win NT / Win 2000 . 

see32z.dll (optional) a standard windows file that contains  the ZIP capabilities target PC and administrator PC You need to install this file only if you want to zip the log file. Install it in the windows system directory, this is typically c:\windows\system on Win 95 / 98 / ME or c:\windows\system32 on Win NT / Win 2000

starrcmd.exe

used for  STARR setup and administration

administrator PC

Can be installed in any directory.

help.htm
(optional)

this file!

administrator PC

Install in same directory as starrcmd.exe or simply print it out.

Note: When you try to locate these file, please keep in mind that in most file managers (e.g. the Microsoft Windows Explorer) you need to enable the "display hidden / system files" option (or similar function) in order to see the "DLL" files. In the MS Explorer this option is located at View > Folder Options > View Tab > Go to the "Hidden Files" option and select "Show all".

 

The STARR Commander

The purpose of the STARR Commander utility is to help you with an easy setup of the logging engine configuration (What to log, how to log and where to send the log file) and also to decrypt and view the STARR log file that is created by the STARR logging engine. The logging engine itself runs invisibly in the background. The logging engine is either started manually by pressing the START button in the STARR Commander or automatically every time Windows is started, depending on the "Autostart" settings on the "Surveillance" part of the STARR Commander.

The following section describes step-by-step, the different options that the STARR Commander offers.

Dashboard:

On the dashboard page, you have full control over the logging engine, which runs in the background. It is not visible in the taskbar or the task list.

Start / Stop will start or stop the logging engine. The current state is displayed beside the buttons.

STARR report: Press VIEW to decrypt the STARR log file and create the report. The output can be formatted as HTML text (the option preferred by most users), or as spreadsheet (e.g. Excel or as plain text. Depending on your selection, the STARR Commander starts your default browser, spreadsheet or text editor to display the report. For the display of plain text,  Notepad is typically the default viewer. If the log file is too large for notepad, WordPad is automatically used. Hint: If you do not like the default formatting of WordPad, press "Ctrl + A" to mark the complete text and change the WordPad font to "Courier New", then everything has the same formatting as in notepad.

If you select "STARR log" the STARR Commander decrypts the raw log only. This is typically only of interest if you want to use the STARR log as input to another application.

Delete both log files on exit: This options helps you to leave no trace if you decrypt & view a log file directly on a target PC (i.e. a PC under surveillance). Once you exit the STARR Commander, both log files are automatically deleted, so there is no chance of leaving a decrypted log file on the PC.

Note: If you use your browser to view the log file, the viewed HTML log might be stored in the browser's cache (depending on your browsers settings). This means a copy of the report log may be accessible even though STARR deleted the original file. Solution: If the log file contains sensitive data, make sure that the web browser's cache is cleared before you leave the PC so no unauthorized person can view the output using the browser's "history". 

Send Email: Tests the Email settings. Sends the log file immediately. Useful for testing your email settings.

Monitoring settings:

On this page, you can decide what kind of information you want STARR to log (The examples are based on the HTML log file conversion). 

 

1. Keystrokes: Logs what is typed on the keyboard. If the backspace key is used to delete text this is indicated with the <BS> sign.
Dear Sirs,
we want to order 10<BS><BS>30 copies of SD<BS>TARR for our company.
Regards, Irene Wang
x
2. Application titles. The title of the front application is logged whenever it changes. In the HTML report, a green background is used for the first appearance. If the title subsequently changes but the application is still the same, the title is shown with a yellowish background. 

11:58: Microsoft Word: cv.doc

12:04: Microsoft Word: resume.doc

x
3a. Application path: the path of the current front application. 
Path: c:\Program Files\Office\msword.exe
x
3b. Window class: The "class" of the current front window. This is a technical information generated by the operating system. This information is useful for support professionals that use STARR to trouble-shoot a PC problem. 
[Class: IEFrame]
x
4. Time stamp: Useful to monitor working habits. STARR will "stamp" the log files even if no other activities occur, e.g. while you are out for lunch. You can set the time interval of the "stamp" in minutes.
Time Stamp:  12:17:45 / 02.14.2000
x
5. Edit boxes of popup's or applications. This logs the content of the (typically) "white" boxes in a popup or the content of simple text editors such as notepad. 
Captured Popup Field(s)
 503 123 4567
 Ann Norris
 San Francisco, CA
x
6. "Chat Spy". This logs both sides of a chat conversion: At the end of each chat conversation the complete content is summarized in the log file: 
Chat summary No. 1: Ann - Instant Message
Chat #1: 
Ann says: 
           Did you test STARR V2.0 yet ?
Peter says:
          Yes, it's great :-)
x
7. "AOL Spy": Logs the content of text windows inside  the AOL software, including chat and email.
AOL window summary No. 1: Email
Hi Ann,
I am currently using AOL and everything is recorded. Now we can keep an eye on our kids :-)
Peter
x
8. "WEB Spy": Logs the URL of visited web sites as a real life link. This allows you to just double click on the link in the log file to display the visited page in your browser!

0:18: iOpus Software - Microsoft Internet Explorer -

(Path: c:\program files\Internet explorer\iexplore.exe)

+ Link: http://www.iopus.com/

+ Link: http://www.iopus.com/overview.htm

+ Link: http://www.iopus.com/download.htm

+ Link: http://www.iopus.com/service/feedback.htm 

Ann

ann@iopus.com

This is an example of captured keystrokes while I am at a feedback form.

+ Link: http://www.iopus.com/registration.htm

+ Link: https://www.regnow.com/softsell/nph-softsell.cgi?item=1464-4

+ Link: http://www.yahoo.com

...

 

You also instruct the logging engine from the surveillance tabstrip, whether it should automatically start with every PC Boot.

Security and Installation Settings:

A major feature of STARR is its ability to run invisibly in the background if required. This ability has made it a favorite tool with IT managers supervising PCs, PC support staff, employers, concerned parents and many others.

This page allows you to customize the STARR background operation and protect it against manipulation:

Popup : Built-in customizable message to notify the PC user that she / he is working under a monitoring program. You can customize the text of the popup to your needs. To make this popup more attractive and useful to the user, it also displays the time and date of the last logon.

Please note that iOpus believes that individuals who may be recorded with STARR  should be informed in advance that they may be recorded and we STRONGLY encourage that you inform anyone whom you may record with iOpus surveillance software, e.g. by using this popup. Some countries may require this by law.

Backdating: A standard way that PC power users attempt to find out what happens on a PC, is to search for files created within the last x hours or days. With "backdating" STARR can escape this detection since the log file always has an "old" date - even when currently in use!.

Use internal buffer: By default, STARR uses the internal buffer of the windows operating system itself, to provide maximum security and speed. However, on some PCs this buffer is disabled (i.e. its size is 0), so every keystroke would be  written directly to the hard disk. In this case, you can use STARR internal buffer which accumulates up to 200 keystrokes before it writes them to the hard disk. It never hurts to have this option on. The only drawback is, if your PC crashes for any reason, a maximum of 200 characters might be lost, since they may have not been written to the log file.

Backup log file size is bigger than xxx Bytes: For installations of STARR that run unattended for long periods, the log file can grow large. To avoid running out of space on the hard disk STARR copies the current log file to a backup file (named <your log file name> + "2") in the same directory as the current log file. Once backed up, the current log file will be reset to zero. If there is already a previous backup log file, it will be overwritten. That way you always have a log of the last xxx Bytes available without the worry that your hard disk might run out of space. Please note that you need to reserve at least twice xxx Bytes space on your hard disk (The maximum size of the log file plus the maximum size of the backup log file). The size of the STARR log file is checked roughly every minute  to avoid unnecessary hard disk access. So the backup occurs with a slight delay.

Note: The size of the log file always refers to the STARR log (not the converted reports).

PASSWORDS:

One MASTER PASSWORD can be used for several security features:

Log file encryption: A must if you want to prevent manipulation  of the STARR log file: Even if the log file is detected, no unauthorized user can read it without using the STARR Commander and the correct password to decrypt it. If you do not enter a password, STARR uses an internal default. Note: Unlike with the password for the STARR Commander, there will be no popup asking for your password if you decrypt / display the log file, BECAUSE the log file itself is encrypted! This means the decryption is done always, but only if you have the correct password entered in the box, will the decryption produce a meaningful (readable) output. The password is Case sensitive !

STARR Commander Protection: To make sure only authorized persons can use the STARR Commander you can password protect it. Note: This is a separate password from the one used for the encryption of the log file (of course, you could use the same word if you like). The password is Case sensitive !

ZIP file password protection: Protect the emailed ZIP file with a password so only you can open it!

 

ADVANCED Installation settings:

Here you can adjust details of your STARR installation, e.g. to prepare STARR for a manual installation.

STARR log file: This is the log file created during the logging process. It can be plain ASCII text (i.e. viewable with any text editor) or a totally scrambled text if you choose to encrypt it (-> security settings). You can enter a path directly or use the BROWSE button. If you transfer a STARR log file from another PC to your administrator PC, you need to load it into the STARR Commander as a STARR log file in order to decrypt and display it (see also the Email section). 

Path names: The invisible activity monitoring module ("Logging engine") consists of an executable and a so-called dynamic link library which contains program code used by STARR. You are totally free to rename both files. You could rename "wsys.exe" to "nice.day" and "wsys.dll" to "sunshine.hot" to hide them even from someone who might know the STARR filenames themselves. Once you have changed the names of these two files and / or their directory, all you have to do is change two path names in the STARR Commander.

Generate One-Click-Installation File: Click the button and STARR Commander generate the file needed for the One-Click-Installation.

Uninstall STARR: Click here to remove STARR from the PC.

Renaming starrcmd.exe: The file starrcmd.exe (the STARR Commander) is copied to your Windows directory (typically c:\Windows or c:\WinNT). You can easily rename this file: Example: You rename the file to GoodMorning.exe. Then you need to type "GoodMorning" into the RUN menu in order to start the STARR Commander.

Email Reporting:

STARR is able to email the log file straight to your doorstep, i.e. your email box, using any standard SMTP / POP Internet email account.

On the top half of the first page, you enter where to email to log file to and specify the frequency, i.e. email it every (x) hours/minutes or email it whenever it has grown by a certain size (recommended option). The size of the log file refers to the STARR log (as opposed to the converted reports). STARR only emails the log file if the PC is online. If the PC is offline, STARR does NOT connect to the Internet. It waits until the PC is online and connects then. Enter any email addresses you'd like to send your log file email TO. Multiple recipients can be entered. Separate addresses using a comma.

You can add <PC>, <USER>, <DATE>, <TIME> tags to the email subject. STARR will automatically replace them with the current PC name, user name, date or time. 

To minimize the size of the log file, STARR can ZIP (compress) it automatically. This reduces the size of the file by a factor of 80-90% and increases the emailing speed. You can use any standard ZIP utility to unzip the log file again once received. If you want to know more about ZIP utilities, check out our GUIDE page at http://www.iopus.com/guides/zip.htm which also lists the TOP5 zip utilities.

In ADVANCED SETTINGS (click button on the lower half of the screen) you can tell STARR which email server to use. You can either use the built-in email settings (which uses an iOpus email account to send the files) or enter the settings of your own email account. This can be the address of your usual email account or the address of a second email account. In the first case you are basically emailing the file to yourself on this account. In the latter case the second email account then serves as a "relay" to receive the file from STARR and emails it to your standard email account.

a.) Built-in email account

Target PC STARR logengine installed

»SMTP»

Email account maintained by iOpus Software

»Internet»

Your standard email, e.g. your company email or AOL. Does not need to support SMTP

»POP3»

Supervisor PC (STARR Commander installed)

  • This option requires no email setup! The basic function is the same as in option (b).

  • If you use STARR regularly, it is recommended that you use your own email account. iOpus reserves the right to modify or cancel this "built-in" email account at anytime without notice, e.g. in the case of abuse. For your convenience, iOpus maintains a list of the best tested free SMTP / POP3 email account service providers at http://www.iopus.com/guides/bestpopsmtp.htm .

b.) Your own email account: Two account option

Target PC STARR logengine installed

»SMTP»

A (free) email server on the Internet

»Internet»

Your standard email, e.g. your company email or AOL. Does not need to support SMTP

»POP3»

Supervisor PC (STARR Commander installed)

  • The advantage of this option is that your real email account can be "anything" that accepts email. It does not have to support SMTP email sending.

c.) Your own email account: One account option (store the email directly in your account)

Target PC STARR logengine installed

»SMTP»

Your standard email, e.g. your company email. Must support SMTP.

»POP3»

Supervisor PC (STARR Commander installed)

  • Easy setup and the email is immediately stored in your email account. Your email account must support SMTP in order to do this.

Settings:

Tip: If you aren't sure of your email settings, look in the setup of your email client program (like Eudora or Outlook)  or ask your system administrator. If you are using the "built-in email" option (a) you do not have to enter these settings.

SMTP: (always necessary)

(SMTP: stands for "Simple Message Transfer Protocol". The standard email protocol used to send emails on the Internet.)

Send from: Where does the email come from, the address of the email account you are using to send the email. (e.g. username@yahoo.com)

SMTP server: address of your SMTP server. Check with your email provider for this address, typically it says something like mail.provider.com or smtp.provider.com .

 

POP3: (sometimes necessary)

(POP3 : stands for "Post Office Protocol". The standard email protocol used to receive emails)

"Normally" you would only need to enter the SMTP settings of your email account (since STARR only sends mail and does not receive it. However, some email service providers (e. g Yahoo Email) ask the user to check their mail first before sending. They do this for authentication purposes. If you need to check your mail first before you can send, you need to also enter your POP3 settings and check the box "Unlock account box". Otherwise leave the box unchecked.

POP3 server: address of your POP server. Check with your email provider for this address. Sometimes this is the same name as the SMTP server, but mostly not!

POP3 username: typically this is the first part of your email address (e.g. "username").

POP3 password: The password to access your POP3 account. Your email provider will tell you this. STARR itself stores your password encrypted for added security.

Tip: You can test your email settings by using the "Send email" button in the STARR Commander. This will send the current log file immediately.

 

Registration:

If you purchased a registration code, you have to enter it into the Commander on this page, and press the registration button. This disables the registration reminder popup, so you have a fully functional version.

Registration fee: $49.95 (single-user license)

Registrations are handled by our e-commerce partner, REGISTER NOW! http://www.regnow.com for iOpus.

STARR Program-ID: 1464-4

The low price of only US$ 49.95 includes FREE upgrades and priority email support for one year!

Volume discounts and site licenses are available. Please see http://www.iopus.com/register.htm or the RegNow order page for details and pricing. Further discounts are available for educational and non-profit organizations (NP). Please check with us at sales@iopus.com  for details of our NP discounts.

Upgrade: If you have already purchased an earlier version of STARR or SAM security software, you will find upgrade information at http://www.iOpus.com/starr-upgrade.htm 

Several registration options are available:

(A) ONLINE-REGISTRATION

Go to the STARR page on REGISTER NOW!

https://www.regnow.com/softsell/nph-softsell.cgi?item=1464-4

for a secure, fast and convenient online-registration. Once registered a personal registration password is sent to your email address within minutes (typical response time). Enter this code in the STARR Commander and the software is registered and fully enabled.

OR, you can use one of the other payment options:

(B) Telephone and Fax Orders

Click here to display the fax order form in register.txt.

Telephone:
Toll Free: 877-353-7297
International: 425-392-2294

Fax
Toll Free: 888-353-7276
International: 425-392-0223

(C) Paying by Check via Postal Mail

Please make sure that you make the check out to Universal Commerce, Inc. See below for the ORDER FORM. You do not need to fill out the credit card information. Please mail checks to:

Register Now!.
ATTN: Orders
PO Box 1816
Issaquah, WA 98027
United States of America

(D) Purchase Orders

A purchase order must be faxed or mailed to REGNOW with all necessary information including billing information. Most companies who choose to use the purchase order option have a standard form that they use for making these types of orders.

(E) Other Options

For the most current list of all registration options please visit our homepage at http://www.iOpus.com/registration.htm .

About:

This page displays the version number of your copy of the STARR software in addition to the version and name of your windows operating system. For support please be sure to include this information. Press the HELP button on this page to start the browser with this HTML based help file. The also features a "Check for Upgrades" button that will start your browser, connect to the iOpus Website and displays the newest information about STARR. 

 

--- The 007 security family ---

The 007 security office family, currently consists of 4 products and is growing:

  • 007 STARR, the new, Internet enabled professional solution for remote PC surveillance, parental control and many other applications!

  • 007 SAM, the popular standard solution for PC surveillance

  • 007 Password Recovery, a utility to recover passwords hidden behind "***" asterisks

  • 007 WASP, a utility to decrypt & view your PWL file (the file where the passwords are stored by most Microsoft applications.

--- The 42 Internet family ---

The 42 Internet family consists currently of a single product :) - others are in development.  

  • 42 BEEE, ("Better Email Enable Everything")  lets you automatically email designated files or folders at a specified time interval. Just select the file(s) you want to send, add your email information, enter the time interval to send the file and the criteria it should meet (send it always, only if changed, or if it has grown by a specific number of bytes), and the program handles calling your provider and sending out the file via email. (Freeware for non-commercial use, only $39.95 for commercial use)

  • 42 AC-Plug  Many ISP's disconnect users if they are not active for a period of time. This software prevents this from happening by sending periodic signals that will keep your Internet connection active. 

If you are interested in reselling our software, please visit the partner section on our web page.

 

The free iOpus Software newsletter:

If you want to be notified about new iOpus software, bug fixes or updates, we recommend that you join our free NEWSLETTER mailing list: To subscribe simply send an email to iOpus-SUBSCRIBE@LISTBOT.COM  or visit our web site http://www.iOpus.com  to subscribe online.

 

Frequently Asked Questions (FAQ):

1. Purchasing:

Q: Is ordering online safe? (the registration code)

A: Yes. And here is why: To provide you with a fast, secure and professional solution for ordering online, we work together with a dedicated e-commerce software vendor: REGNOW. REGNOW has a state-of-the-art secure web site and handle registrations for a wide variety of software companies. All credit card transaction done by REGNOW use strong encryption.

Q: I would like to purchase and download STARR on the computer I am currently using, but install it on another computer. Is this possible?

A: Yes. The STARR installation file is compact and will fit on a single floppy disk. You may purchase and download on a computer and copy it to floppy disk, and then later install on another computer. Please note that the single user software license for STARR allows for one installation per purchase. Please also note that you are only allowed to install STARR on a computer you own. If you would like to install STARR on more than one computer, we offer multi-user and site licenses with great discounts. 

Q: How do you count the licenses for the multi-user license ?

A: The installations are counted by the "STARR logging engine". Example: You have 10 PC's with the logging engine running and two PC's with (only) the STARR Commander to convert and read the log file. In this case you need the 10-user license. Installations of STARR Commander are free.

2. Installing:

Q: Am I allowed to install this software on somebody else's computer? 

A:  You may only install STARR on a computer that you own. Before you install the software, you must agree to use it only on a computer you own. 

Q. Should I inform my employees or others that they are being monitored? 

A: Yes. Some countries may require this by law. STARR has a built-in popup for this. 

3. Operation:

Q: Does STARR log every application title, path etc.?

A: Yes, to our knowledge, the title and path of every application is logged.

Q: Does STARR log every keystroke ?

A. STARR logs almost every keystroke, with a few exceptions. Some applications do not allow for keystrokes to be logged, but these are very rare. The only ones currently known of are: the password fields in Pretty Good Privacy (PGP) and the NT / Win 2000 logon screen. If you come across any others, please let us know.

Q: Is the Win 95 / 98 / ME  logon password recorded ?

A. Yes, it is (Please make sure that only authorized persons have access to the log file).

Q: Is the Win NT / Win 2000  logon password recorded ?

A. No.

Q: I received the log file via email but it looks "weird". What is wrong ?

A. Probably nothing! You probably choose the option "send STARR log". In this case STARR sends the raw, probably encrypted STARR log file . Choose "HTML", "Spreadsheet" or "Plain text" in order to receive "ready-to-use" reports. 

Q: The spreadsheet report is not imported correctly into Excel ? 

A. Excel can import Text files, which are stored in the comma separated value (CSV) format. Such a file contains the data in lines, whilst the fields are separated by commas. In normal cases Excel reads and converts this format automatically. Unfortunately there is a problem with Excel. Depending on the local Windows settings the separator may be either a semicolon or a comma. In German Excel the CSV file must contain a semicolon as a separator, to import the fields within the records into different columns of the worksheet.

4. Email:

Q: Can STARR also send the log files via AOL ?

A: Email options (a) and (b) work fine with AOL. AOL uses its own proprietary email protocol and unfortunately not the Internet standard SMTP. Therefore you can not use option (c). 

Q: Can you recommend any free email accounts for use with STARR ?

A. Yes, check out our TOP 5 list of free SMTP / POP3 Email accounts at http://www.iopus.com/guides/bestpopsmtp.htm  

Q: Does STARR transmit any information back to an outside web site like some other Internet utilities do ?

A: No, of course not! The only information that STARR ever sends out is the STARR report or the STARR log file to YOUR email address if you choose to have the log file emailed.  In addition, before emailing the log file, STARR determines if a PC is online. Technically STARR does this by trying to access an outside web site. This is done to make sure that no dial-up popup appears and the email process can run completely undetected. Technically this is the same a reading a web site with your browser, so no sensitive information is transmitted during this process. If you activate the function "Assume PC is always online" STARR skips this online check. 

If you disable the "Email log file" function, STARR does not perform *any* Internet activity at all.

5. Security:

Q: How discrete is STARR ? Can anyone detect it?

A. If you select the log file backdating and rename the files (-> Security) it is VERY discrete and almost impossible to detect since it does not appear on the task bar or even in the task list. For an invisible manual installation simply follow the step-by-step guide  in this manual.

Q: If people know STARR is installed, can they circumvent or manipulate the software without me knowing ?

A: STARR has many security features to prevent this: When installed invisibly, STARR does not show up as an icon, does not appear in the Windows system tray, does not appear in Windows Programs, does not show up in the Windows task list, cannot be uninstalled without the STARR Commander password which you can specify, and STARR does not slow down the operation of the computer it is recording.

If the log file is emailed out or saved on a network server it is not accessible for the user of the local PC and can not be deleted. Even when stored locally, it is impossible to manipulate the log file without breaking the STARR encryption scheme first. But as with any filter, surveillance or security software, a computer expert could ultimately disable or delete the STARR installation, but this will not go unnoticed by you.

Q: Why is STARR so small ? Other apps which do similar things need a 7.0 MB download ?

A. STARR is written in "pure" C/C++ code, which can be compiled into very small, yet powerful executables (Remember, only about ten years ago a whole operating system did not need more then 16 Kbytes!).  Secondly, STARR is designed to make as much use of the Windows operating system as possible. The advantages are obvious: The more we utilize the Windows operating system itself, the smaller and more discrete STARR becomes.

6. Miscellany:

Q: Where can I find more information ?

A: You can find more information on the iOpus homepage, for example:

 

About iOpus Software products:

iOpus' field of expertise includes Internet-based applications and Windows security. Our software is developed based on the needs and requirements of users like yourself as we always keep an eye open as we scout for new and fresh ideas to incorporate in our product development.

Our main priority and goal is customer satisfaction. We achieve this by listening to our clients and incorporating their requirements into our programs. In fact, more than 50% of the enhancements in our applications come from clients' feedback.

Another important decision we made, was to release our software as shareware. This allows prospective customers to evaluate our applications totally risk free, within a trial period, to determine if the program meets their requirements. We never ask for money first, preferring to provide exactly what you need at a very low cost. iOpus Software is a member of the Association of Shareware Professionals (ASP).

Our clients continue to pay a very fair price, as low as we could practically make it. For this reason, and because our users tell us they prefer it, we did have to cut back on certain things, such as printed manuals, physical delivery and phone support. Despite those slight cuts, we do not cut down on technical support and provide both comprehensive help files and email support (we usually reply within a day). We dispensed with physical delivery of our products, and focus on ESD (Electronic Software Distribution). This has helped to reduce the cost of our products, especially for our overseas clients, and as we regularly come out with updates to our applications, a hard copy could be out of date by the time it reached you.

If you have suggestions or questions, please do not hesitate to contact us at support@iOpus.com !

 

 

© 2001 iOpus Software GmbH