Covenant Eyes Version 3 Now Reports System Restore Usage as Part of its Patent-Pending Tampering Notification System

Share Article

The System Restore function has been a means of circumventing many filters and accountability programs. Now, usage of the System Restore function is detected and reported to partners by Covenant Eyes.

Covenant Eyes, the world's oldest and most robust accountability program for Internet monitoring, has added detection of the System Restore function. This function has been used in the past to restore the computer to a pre-monitoring software configuration, allowing circumvention of filters and accountability programs.

Now, Covenant Eyes detects when System Restore has been used to attempt circumvention, and reports that attempt to Accountability Partners when the program is restored. This process is a patent-pending process of Covenant Eyes, as part of its Tampering Notification system.

Covenant Eyes has provided, for almost five years, accountability on the Internet for browsing activity. Periodic reports of browsing activity are sent to Accountability Partners of the users’ choosing. The reports are currently scored for pornography, with high-scoring sites being highlighted. Version 3.0 provides the added dimension of monitoring all web surfing activity, as well as other commonly-used Internet protocols. Covenant Eyes Program detects file sharing activity, and will log and score newsgroup and FTP traffic.

Version 3 is also provided to Affiliate Programs including Eye Promise, Report Your Eyes, and Guard Your Eyes.

Cost of the Covenant Eyes Program will remain at $6.99 for one username, $7.00 ($3.50 each) for two usernames, with further discounts for multiple users.

The Covenant Eyes Program can also be added to other computers used by members, at no extra charge. There is no cost to Accountability Partners.

Information on the Covenant Eyes Program can be obtained at, or by emailing to the email address available on that website.

# # #

Share article on social media or email:

View article via:

Pdf Print

Contact Author

Ronald Dehaas
Visit website