The document describes a remote control system that can monitor computers and mobile devices. It allows logging keystrokes, conversations, files and browsing activity on computers running Windows, Mac OS and mobile devices. The system captures this data and transmits it online or stores it offline for later retrieval. It can also control devices through SMS messages without the user's knowledge. The document outlines the system's architecture, monitoring capabilities, data transmission methods, supported platforms and infection vectors for remotely and locally installing the backdoor software.