Keystroke Spy - PC Key Logger Spyware


Keystroke Spy is a cost-effective monitoring solution that allows you to easily, and efficiently log what your computer users are doing. Keystroke Spy is a powerful tool that can log every keystroke users type. Keystroke Spy can run in total stealth, email you when specific keywords are typed, and can even be set to only log keystrokes typed in specific applications.

Keystroke Spy's keystroke logger allows you to record all keystrokes users type while using your computer. All logged keystrokes are viewable in their raw format, displaying the keys as they were typed, and can be formatted for easy viewing. Keystroke Spy offers the following features that make keystroke logging a simple task:



Keystroke Spy Logging and Recording

Keystroke Spy's keystroke logger allows you to record all keystrokes users type while using your computer. All logged keystrokes are viewable in their raw format, displaying the keys as they were typed, and can be formatted for easy viewing. Keystroke Spy offers the following features that make keystroke logging a simple task:

Categorized and Detailed Log Storage

All logs contain a timestamp indicating when the keystrokes were made, what window the keystrokes were typed in, the window owner, and lastly the username of the user who actually typed the keystrokes.

Flaggable Log Entries

Logs can be flagged for easy viewing. Logs can be flagged by application used, window title, user that typed the keystrokes, and date.

Log Entry Formatting

Logs can be formatted so you can read the logs exactly as the user meant them to be read. Backspaces are applied, and system keystrokes are applied and hidden.

Below are some of the many activities that can be recorded by Keystroke Spy.

Chat and Email Messages Sent

Log any messages sent with any chat messenger or email account (including webmail).

Websites Visited

Log all website addresses typed in by users.

Passwords Entered

Log all website and application passwords users type.

File and Document Activity

Log contents of documents that users type and edit.

Application Activity

Log keystrokes typed in any application users interact with on your computer.

Keystroke Spy Logging and Recording

Keystroke Spy has a large array of security and stealth features. Keystroke Spy is undetectable under all Windows versions and can circumvent popular third-party "spyware" detectors. Keystroke Spy has many useful security features like log file encryption, log file backdating, optional startup warnings, and much more.

Stealth-Mode

Keystroke Spy can run totally in stealth; that is, it is virtually undetectable to the user. Keystroke Spy will NOT show up in the task manager under Windows - at all. Keystroke Spy does not appear in registry and Windows startup utilities while it is running, either.

Log File Encryption

Keystroke Spy has a built in encryption option that allows you to have all your Keystroke Spy activity logs encrypted so others cannot stumble across Keystroke Spy's logs or read them without using Keystroke Spy's protected log viewer.

Security Settings

Toggle various Windows security settings to make it harder for users to trace and bypass Keystroke Spy - such as the ability to disable the system clock's time/date settings, or to access the Windows task manager.

Spyware Detector Disabling

Configure Keystroke Spy to disable popular spyware detectors that may interfere or detect Keystroke Spy running.

Log File Backdating

Keystroke Spy can be configured to backdate all log files it creates so that they appear older than they really are. This will make it impossible for users to find log files by performing system searches for most recently modified files.

Warning Screen

Display a splash screen which alerts users they are being monitored by the Keystroke Spy software (totally optional).

Password Protection

Keystroke Spy is password protected to prevent easy monitoring termination and option changes.

Idle Timeout

Keystroke Spy will stop logging when the user is inactive for a specified amount of time, when they are active again Keystroke Spy resumes logging.

Configurable Log Location

You can set Keystroke Spy to store logs in any specific directory you want - including network shared folders.

AutoClear

You can set Keystroke Spy to clear your keystroke logs every xxx number of keystrokes entered.

KeyStroke Spy is Easy to Use!

Keystroke Spy is designed to be extremely easy to use and setup. Keystroke Spy can be configured quickly for rapid deployment.

Intuitive Interface

Easy to use, graphical user interface, with intuitive labeled buttons and icons!

Quick Setup Time

Keystroke Spy requires minimal configuration to get started. To get started you only need to specify your access password, and you are ready to monitor.

KeyStroke Spy System Requirements

Windows 9x, ME, NT4, 200x, XP, or Vista, 7 and 8

Pentium Class PC (133mhz or higher)

2MB Hard disk space


KeyStroke Spy $79.95 Buy
KeyStroke Spy Stealth $99.95 Buy