Logging and Recording -Keystroke
Spy's keystroke logging allows you to record all
keystrokes users type while using your computer. All
logged keystrokes are viewable in their raw format,
displaying the keys as they were typed, and can be
formatted for easy viewing. Keystroke Spy offers the
following features that make keystroke logging a simple
- Categorized and
Detailed Log Storage
All logs contain a timestamp indicating when the
keystrokes were made, what window the keystrokes were
typed in, the window owner, and lastly the username of
the user who actually typed the keystrokes.
- Flaggable Log
Logs can be flagged for easy viewing. Logs can be
flagged by application used, window title, user that
typed the keystrokes, and date.
- Log Entry
Logs can be formatted so you can read the logs exactly
as the user meant them to be read. Backspaces are
applied, and system keystrokes are applied and hidden.
Below are some of the many
activities that can be recorded by Keystroke Spy.
- Chat and Email
Log any messages sent with any chat messenger or email
account (including webmail).
Log all website addresses
typed in by users.
- Passwords Entered
Log all website and application passwords
- File and Document
Log contents of documents that users type and
Log keystrokes typed in any
application users interact with on your computer.
Reporting, and Filtering Features -Keystroke
Spy not only logs keystrokes, but it can also email you
when specific phrases are typed - such as addresses or
names, it can send you keystroke log reports, and it can
be set to log only specific application activities.
Keystroke Spy allows you to control what
keystrokes are logged. Keystroke Spy can be set to
only log keystrokes typed in specific applications and
windows that you indicate.
Keystroke Spy allows you to keep an eye on
your computer from a remote location by sending email
activity logs of all keystrokes typed, along with a
screenshot of the user's desktop, at set time
Keystroke Spy can be configured to send you
email notifications when a user types a trigger
keyword - such as an address, password, phone number,
name, etc. A screenshot of the offending activity can
be attached to the alert mail as well.
and Stealth Features -Keystroke
Spy has a large array of security and stealth features.
Keystroke Spy is undetectable under all Windows versions
and can circumvent popular third-party "spyware"
detectors. Keystroke Spy has many useful security features
like log file encryption, log file backdating, optional
startup warnings, and much more.
Keystroke Spy can run totally in stealth; that is, it
is virtually undetectable to the user. Keystroke Spy
will NOT show up in the task manager under Windows -
at all. Keystroke Spy does not appear in registry and
Windows startup utilities while it is running,
- Log File Encryption
has a built in encryption option that allows you to
have all your Keystroke Spy activity logs encrypted so
others cannot stumble across Keystroke Spy's logs or
read them without using Keystroke Spy's protected log
- Security Settings
Windows security settings to make it harder for users
to trace and bypass Keystroke Spy - such as the
ability to disable the system clock's time/date
settings, or to access the Windows task manager.
- Spyware Detector
Keystroke Spy to disable popular spyware detectors
that may interfere or detect Keystroke Spy running.
- Log File Backdating
can be configured to backdate all log files it creates
so that they appear older than they really are. This
will make it impossible for users to find log files by
performing system searches for most recently modified
- Warning Screen
splash screen which alerts users they are being
monitored by the Keystroke Spy software (totally
Keystroke Spy is password protected to prevent
easy monitoring termination and option changes.
- Idle Timeout
will stop logging when the user is inactive for a
specified amount of time, when they are active again
Keystroke Spy resumes logging.
You can set
Keystroke Spy to store logs in any specific directory
you want - including network shared folders.
You can set
Keystroke Spy to clear your keystroke logs every xxx
number of keystrokes entered.
- Configurable Stealth
allows you to configure its hotkey pattern to whatever
key combination you want - making it harder for others
to stumble across Keystroke Spy!
to Use! Keystroke
Spy is designed to be extremely easy to use and setup.
Keystroke Spy can be configured quickly for rapid
- Intuitive Interface
Easy to use, graphical user interface, with
intuitive labeled buttons and icons!
- Quick Setup Time
Keystroke Spy requires minimal configuration to
get started. To get started you only need to specify
your access password, and you are ready to monitor.