I would enjoy Hidden Administrator 2.1 GAOTD'ED http://www.hidadmin.ru/index_en.html
Main possibilities of the Hidden Administrator
As often familiar addressed to you for help, because of defect skill knowledge PC? And as long you happened to to adjust their program on telephone, tell to him, what and as. Agree, was where more simply if you could see the Desktop a friend, also well, as own! But often appears other task, particularly beside leaders - spy, than concern with the employees in uptime: execute their own duties, or download the films from Internet or hour talks on "ICQ".
Manage with these problems You will help the program Hidden Administrator, intended for administration and spying on remote computer under control Windows 98/ME/NT/2000/XP/2003/Vista.
The program simple as mastering, and in use. The program has comfortable and intuitive comprehensible interface for understand, so with its functioning will be simply even untrained user.
Main possibilities of the Hidden Administrator
Provide full access to the resources of the remote computer.
Provide hidden observation of the remote computer.
Facilitate management of the remote computer.
Retrieving information from full-screen DOS window.
File transfer with remote computer.
Transfer of the sound by network in real-time.
"Remote Installation" function (installing server part of the program remotely).
Sending messages on remote computer.
Messaging with remote computer (chat).
Shutdown and rebooting the remote computer.
Retrieve and display the system information of the remote computer.
Work with "Registry" of the remote computer.
Retrieve and set remote "Clipboard".
Termination of any application of the remote computer.
Automatic termination applications and processes.
Run the programs on remote computer.
Hiding / showing a "Task Manager", icons on the "Desktop", hiding / showing the mouse cursor, minimization / hiding / restore windows, etc.
Automatic searching for uncared-for server part of the program (searching for computers for connection).
Password protection to the remote computer connection.
Granting of the public access to the remote folder (sharing folders).
Remote wake computers (Wake on LAN).
Installing the password on changing options of the server.
Save images from remote screen.
Remote print of the documents.
Filtering IP addresses.