Spector is a hacking tool. Though these programs are legitimate and useful tools when they are appropriately used, a hacker could take advantage of them in order to carry out malicious actions.
Spector is a program that monitors system and Internet activity in the computer where it is installed. It is designed for computer networks based in Windows operating systems.
Spector allows to be installed stealthily, so that the affected user does not realize that it is present on the computer.
Spector monitors sent and received e-mails, chat and instant messaging conversations, keystrokes (thus acting as a keylogger), accessed web pages, files downloaded from the Internet, programs run on the computer, screenshots, searches carried out and files downloaded through P2P programs, etc.
Additionally, Spector alerts its administrator (the person who installed it) if certain keywords are typed.
Spector does not pose a risk by itself, but it can be used with malicious intentions.