Right Web Monitor is an ultimate web monitoring solution able to detect changes in all kinds of internet resources. The program can monitor any web pages (static and dynamical), text and binary files which can be accessed through the HTTP, HTTPS and FTP protocols. The program is able to monitor incoming mail in POP3 mailboxes either. Right Web Monitor constantly polls the specified internet resources and notifies you by adjustable alert methods when any changes occur. Among these there are such methods as showing notification dialog, playing sound, sending notification letter or SMS message, starting a certain application. The program can even download a modified file onto your hard drive. Right Web Monitor features a comprehensive analysis algorithm that will not be foiled by today's dynamic web applications. The program can check not only the file size, date or other properties, but the actual content of the web page, its fragments or keywords presence/absence. The variety of settings allows you to specify an individual checking schedule, analysis and notification alert methods for each monitored resource. Another important feature of the program is Multiple Request Scripts processing. Using such scripts the program can monitor pages which can't be accessed directly but only through several interim pages/form submissions.Other features include: Internet Explorer integration, automatic startup, the ability to work via a SOCKS and HTTP proxy servers, multiple encodings support, changes highlight, program variables, all-in-one Snapshot window and much more. Right Web Monitor has well-considered intuitive user interface, wizards, program help hints everywhere it's possible and exhaustive documentation which make this compound program quite easy-to-use even for beginner users. Using Right Web Monitor you'll be always in-touch with Internet without wasting your time on constant manual checking routine.
Free to try
Windows Server 2008
Efforts to detect fake news are not as advanced as they would appear, given that the best practices so far rely on pattern detection that can itself be exploited by malicious actors, according to new research from MIT.