Available types of evidence are described below:
Module | File type | Recording... |
---|---|---|
Accessed files | text |
(desktop only) documents or images opened by the target. |
Addressbook | text | contacts. |
Application | text | applications used. |
Calendar | text |
calendar. |
Call | audio |
calls (i.e..: GSM and VoIP). |
Camera | image |
Webcam images. |
Chat | text |
chat. |
Clipboard | text |
information copied to the clipboard. |
Device | text |
system information. |
File | text |
files opened by target. |
File System | text |
hard disk structure that can be explored in the File System function. |
Info | text |
information provided by the agent and defined in settings. |
Keylog | text |
keys pressed on the keyboard. |
Messages | text |
e-mail. |
Money | text | Information on the cryptocurrency digital wallet (i.e.: Bitcoin). |
Mic | audio |
audio. |
Mouse | image |
mouse click. |
Password | text |
password. |
Position | image |
target's geographic position. |
image |
printed pages. |
|
Screenshots | image |
images on the target's screen. |
URL | text |
visited websites. |
RCS9.3 | User's and Installation Guide | © COPYRIGHT 2013