After purchase, you can move the software to another supported phone for an unlimited number of times. It causes no other fees. To move RSMonitor to another phone, you must deactivate it on the current target and then install it on the new target.
10. Unlimited Device Changes
After the installation all the feathers of RSMonitor can be controlled by sending undetectable formatted SMS commands. You can start, stop, change all the settings without access to the phone. Please refer to the User Guide to watch the special formatted commands in detail. Also you can use our free remote control software. This software runs on any java enabled mobile. It can let you control the RSMonitor phone without having to worry about complex SMS commands. Simply select the function you want and it will send the command for you. Download links and instructions are available in the User Guide.
9. Remote Control
So someone steals your phone, whats the first thing they are going to do? Chang the SIM card, right? To deal with this situation, RSMonitor offers SIM change notification so that you will receive a SMS containing the new number if the SIM card changes in the target phone. So you can continue to monitor the device and make it never out of your sight.
8.SIM Change Notification
Using this function requires that the device who location you wish to track must have special hardware. If the target device that do have GPS hardware has been stolen, RSMonitor will using GPS positioning, and you can see the coordinates of the device in your reports when you log into your web account.
7. GPS Tracking
Call interception is ability that lets you listen to actual phone calls on the target. You can specify the numbers you are interested in and when any calls to or from these numbers occur on the target, RSMonitor will send a SMS to your monitoring phone. If you now call the target mobile, you will be added to the call. You can listen and record the conversation. If the target phone is disconnected, this calling is automatically tured to be spycall. Call interception requires that the target device support conference call.
6. Call Interception
When the target phone is not in use, RSMonitor has the ability to secretly swich on the target mobile microphone by making a call from a predefined number. Spycall lets you listen in to the phone surroundings from anywhere in the world. No visual or physical changes can be noticed on the target phone. If the target device is in use or the user press any key, then the call will be disconnected secretly. If the targe mobile has been stolen, making a spycall, when you get the clear information of phone surroundings, you can call the police and find your stolen phone back.
5. Spycall/ Listen in to the Phone Surrounding
RSMonitor can capture the contents of all SMS and email messages and deliver them to your web account when the target phone has been stolen. You can check your account to view the contents of SMS and Email, including the address and the time.
4. Secretly Read SMS and Email
If the target device (with the installed software) has been stolen, according to your setting, RSMonitor will capture the details of phone call records (incoming, outgoing and missed calls), then deliver these data to our web server. Its easy for you to view the call logs (the time, duration and number of all voice calls) when you log into the secure web account. If the phone number is in the phones address book, then the name will be available also.
3. Call Logs
Cell ID location tracking is based on information that is freely available from the airwaves, and the location information is the form of a CELL ID, and the name of the CELL. The name of the cell is usually the name of a part of town, and so this is good enough to know where someone is.When your phone has been stolen, RSMonitor can read the Cell ID and Cell name ( if available) and delivers these to your web account. You can tell which cell controls the mobile by the name or by resolving the cell id against a database of cell id to locations.
A network provider has several hundred radio base station(cells) that make up its network. Each base station is a cell which corvers a physical area and these cells connect together to make up the entire network. A mobile phone connects to the network using the cell in which it is located. As the mobile moves, it leaves one cell and joins another. The new cell then takes responsibility for connecting the phone to the network.
2. Location Tracking through Cell ID
After purchase, we will give you an account number and a password. This is your web account. You can use any internet enabled computer to log into your account to read the information of target phones locations, call logs, SMS and Email messages. Web data can be saved, and completely deleted at any time.
1. Powerful Back-stage Management
Protect Your KIDS against CELL PHONE safety threats !
Monitor their MOBILE PHONE USAGE !
Minimum Order Quantity: | 1 Set/Sets |
Payment Terms: | T/T,Paypal |
Feature: | |
Model Number: | V8.0 |
Brand Name: | RSMonitor |
Place of Origin: | Chongqing China (Mainland) |