Get Coupon Code for AceSpy Mac.
Section 1. Installation
When you're ready to install you will need to have the email you received instantly after purchasing. This email contains your download link and the special hot-key sequence you will use to open the interface in the future.
1.1 Verify access for assistive devices
In order for the software to capture certain logs you should first verify you have "Enable access for assistive devices" option turned on in your System Preferences before you install. Doing this is extremely easy.
At the bottom of your Mac's screen, launch System Preferences. Then launch Universal Access. Then make sure "Enable access for assistive devices" is checked. If not, then check it. Then close the window.
1.2 Install the package
After you have verified "Enable access for assistive devices" is checked, it's time to download the software. Locate the "IMPORTANT SOFTWARE INSTRUCTIONS" email you were sent when you placed your order. If this email is on a different computer, forward yourself that email to a Yahoo or Gmail account. Then, access the email on the Mac you need to monitor using the web browser.
After you click the download link inside the order email, your default browser will download the file. If you don't see your Downloads window on the screen, go to Window > Downloads inside your browser. Then you should see the amac.pkg file. Click the hourglass to launch the pkg file. The AceSpy Mac Installer window will appear as shown below.
Follow the screens and when you see the Install Succeeded screen as shown below, click the Restart button to restart the computer.
1.3 Bringing up and closing the interface
After the Mac is finished restarting, nothing will look any different than normal. However, AceSpy is silently running. So anything that is done will be captured. You can simply leave the computer now OR go inside the interface to get a better idea of what you will soon see.
To bring up the interface, you need to press a certain set of keys together called hot keys. This secret combination can only be found inside your order email, the same email containing the download link. This same email also includes the default password.
When you have located the hot key sequence, press and hold the keys down one at a time so you are eventually holding all of them. The password box will pop up as shown below:
When you're inside the interface, monitoring stops. You can access the various log types by clicking each type's tab. You can access the Preferences by clicking the AceSpy drop-down menu at the top of your screen, then going to Preferences.
After you're finished looking inside the
interface, you should click the red X at the top left corner to terminate the interface. When you do so, you'll be asked if you wish to resume monitoring. Click YES to continue monitoring. If you click NO, then monitoring will STOP until the computer is restarted.
Section 2. Basic Usage
The usage of AceSpy Mac is very simple. After you learn how to use the hot keys to bring up the interface, you can look at logs anytime you are alone at the computer. You can also choose to setup AceSpy to send reports via email.
2.1 Changing Preferences
AceSpy has various Preferences you can change inside the interface. While you're inside the interface, you can access the Preferences by clicking the AceSpy drop-down menu at the top of your screen. Then go to Preferences. You will see the Preferences screen as shown below.
After you make any desired changes to your Preferences, click the Save button. Don't forget to terminate the interface and resume monitoring before walking away!
2.2 Viewing Logs
Viewing logs inside the interface is as simple as clicking each tab at the top of the interface. On each tab you will be able to view the corresponding log type. You can select a specific date or display all logs at once. Be sure to take advantage of the FULL SCREEN screenshot viewer by clicking the "Play" button as shown below.
2.3 Uninstalling
If you wish to uninstall AceSpy, bring up the interface and at the top of your screen, go to the File drop-down menu, then select Uninstall. You can then choose whether or not to delete all logs upon uninstall. Click Yes or No. The software will then be uninstalled.
Section 3. Advanced Usage
Now that you know all the basics of the software, you can go to more advanced usage.
3.1 Emailing Reports
If you wish to setup the program to email you reports, you will need a SMTP based email account to send the reports. This is typically any email account that's NOT a free webmail account. Gmail, Yahoo, Hotmail, etc do not provide SMTP. If you need an email address that does provide one, you could use a Stealth Email account to send the logs and have them delivered to any non-SMTP email address.
After you have an SMTP email account to use, along with the account's SMTP server name and your username/password, fill in each field as shown below.
The default information for Stealth Email is shown below. You would enter the actual number of your username instead of
000.
SMTP Server: mail.stealth-email.net
To: ANY email address you want to send logs to
From: user000@stealth-email.net
Password: PASSWORDHERE
Port: 25
After you enter those settings, click the TEST button. If your test is successful then great. If you get an error connecting to server, try port 2525 instead. Your ISP might be blocking port 25.
3.2 Exporting and Printing
Need to export or print your logs? Simply bring up the interface and go to the File drop-down menu at the top of the screen. Then select Export Logs. Then choose a location to save to.
After you have chosen your location, click OPEN and the logs will be exported to that folder. You can then bring up the folder in Finder and open the individual files if you need to print them. You can also export the text logs to your a spreadsheet program using the CSV format.
3.3 Clearing and Maintenance
Recording high-resolution screenshots can take up a great deal of space after some time. Therefore you have two ways to clear and maintain your logs. The first method is to clear ALL logs by going to the File drop-down menu, then selecting Clear All Logs. The second method is to have the software automatically delete logs older than a specified number of days.
To setup the second method, Go to the Preferences window and select Security. Then turn on the Delete Logs after: option. Choose the amount of days you wish and click Save to save the preferences.