This is a professional keylogger application, that monitors and records the computer activity. The events include keystrokes, mouse-clicks, started applications, web-sites visited, email sent/received and chats.
The filtering function, can be used to log individual events or block the access to specific applications or web-sites.
Keylogger starts at the Windows startup, and runs undetectable even from experienced users. The setup is password protected to avoid unauthorized modifications.
The stored logs, are sending via email or FTP in encrypted format, ensuring extra security.
The Best Keylogger Key Functions:
- Computer Activity: It records in detail, the activity of the monitored computer.
- Parental Control: It blocks applications and web-sites, previously defined by the administrator.
The Best Keylogger Detailed Features:
- Keystrokes: It can detect and record the keystrokes pressed; sending them to a log file, including detailed information (application name, time and website URL).
- Screenshots: It takes snapshots of the desktop's screen, of events, like mouse-clicks and key pressed. The application includes a screenshot viewer.
- Files: The file-events are recorded (creating, deleting, renaming or editing). It provides the filter functions to monitor specific file types.
- Printer: It controls the printer usage (time and printing application).
- Chat: It records the conversations (both sides).
- Mail: This function logs the email activities (sent and received).
- System: This is a general function that informs (logged in/off and shutdown). It includes the user name and date.
- Clipboard: It detects the copy/paste functions realized.
- Log Viewer: The provided log viewer allows to audit the recorded activities.
- Auto Start: It starts automatically at the Windows startup in hidden mode.
- Log cleaning: The recording file can be configured as an auto-purge, based upon two criteria, n-days or when it is sending to the destination.
- Email logs sending: The recorded file can be sent, based on time intervals or size.
- Upload to FTP: This is practical function, allowing to get the activity records, on a remote location.
- Log Printing: It can be used to report or export the log activity.
- Flush logs to USB devices: It detects the connected USB device and copies the encrypted log.
- Notifications: It fires at previously configured event (website visited, application started or keystrokes).
- Password protection: This ensures that the application's settings can be modified by the authorized user.
- Monitor scheduler: It allows to set the monitoring process at specific days or hours.
This is a powerful keylogger application, designed for home and business users.
The functions provided, covers, simple monitoring with parental control (excellent for home users) and expands to advanced auditing requirements (system auditors).
The interface looks professional, and the operation is quite intuitive.
It provides the common monitoring functions; and adds a powerful log viewing module. This program includes slide-show of the recorded screen-shoots.
Our Testing staff has installed the application, and they tried to detect it, by looking at Windows process. It was absolutely hidden.
The software consumes minimal Windows resources (memory and processor) that makes it undetectable.
Finally, we can recommend this application for home and for corporate users.
- Powerful functions.
- Perfect for home computers.
- Extended capabilities for corporate or auditing professionals.
- Easy to use and install.
New in this Version:
It may include unspecified updates, enhancements, and bug fixes.
- OS: Microsoft Windows XP, Vista, Win7 and Win8.
- Processor: 1GHz Intel/AMD processor or above.
- RAM: 256MB RAM (512MB or above recommended).
- Free Hard Disk: 100MB space for installation.
- Graphics Card: Super VGA (800 × 600) resolution, 16-bit graphics card or higher.