User Activities by Logging All Keystrokes and Capturing
Keystroke Spy's keystroke logger allows you to log
all keystrokes users type, and record screenshots of all
their activities while using your computer. All logged
keystrokes are viewable in their raw format, displaying
the keys as they were typed, and can be formatted for easy
viewing. Keystroke logs can show you what users typed in
emails, files, documents, chat sessions, website visits,
and much more. Keystroke Spy gives you visual proof of
user activities with its automatic screenshot playback.
Monitoring and Behavior Alerts via Email
Keystroke Spy not only logs keystrokes, but it can
also act as a remote behavior alert and monitoring system.
Keystroke Spy can be configured to email you when specific
phrases are typed - such as addresses or names, it can
send you keystroke log reports via email, and it can be
set to log only specific application activities.
Secure, Stealth Monitoring
Keystroke Spy is designed to be an invisible and secure
monitoring system. Keystroke Spy does not appear in the
Mac OS X Force Quit manager, or reveal itself to the user
on your desktop or Finder applications folder. Keystroke
Spy is password protected so monitoring can only be
started and stopped by the authorized user that has
installed the computer monitoring software.
Keystroke Spy's keystroke logger allows you to record all keystrokes users type while using your computer. All logged keystrokes are viewable in their raw format, displaying the keys as they were typed, and can be formatted for easy viewing. Screenshot recording allows you to see everything users did, and when. Keystroke Spy offers the following features that make keystroke logging a simple task:
Categorized and Detailed Log Storage
All logs contain a timestamp indicating when the keystrokes were made, what window the keystrokes were typed in, the window owner, and lastly the username of the user who actually typed the keystrokes.
Searchable Log Entries
Logs can be searched for easy viewing. Logs can be searched by application used, window title, user that typed the keystrokes, or date.
Log Entry Formatting
Logs can be formatted so you can read the logs exactly as the user meant them to be read. Backspaces are applied, and system keystrokes are applied and hidden.
Automatic Visual Screenshot Playback
Keystroke Spy's screenshot viewer provides visual proof of user activities, and gives you the ability to playback all screenshots recorded in a video-like automatic slideshow. Screenshots can be searched and archived for easy viewing and management.
Below are some of the many activities that can be recorded by Keystroke Spy.
Chat and Email Messages Sent
Log any messages sent with any chat messenger or email account (including webmail).
Websites Visited, Online Searches, and Social Networking Activity
Log all website addresses and online searches typed in by users. Capture social networking behaviors.
File and Document Activity
Log contents of documents that users type and edit.
Log keystrokes typed in any application users interact with on your computer.
Alerting, Reporting, and Filtering Features
Keystroke Spy not only logs keystrokes, but it can also email you when specific phrases are typed - such as addresses or names, it can send you keystroke log reports, and it can be set to log only specific application activities.
Keystroke Spy allows you to control what keystrokes are logged. Keystroke Spy can be set to only log keystrokes typed in specific applications and windows that you indicate.
Email Log Delivery
Keystroke Spy allows you to keep an eye on your computer from a remote location by sending email activity logs of all keystrokes typed, along with a screenshot of the user's desktop, at set time intervals.
Keyword Notification Alerts
Keystroke Spy can be configured to send you email notifications when a user types a trigger keyword - such as an address, password, phone number, name, etc. A screenshot of the offending activity can be attached to the alert mail as well.
Security and Stealth Features
Keystroke Spy has a useful array of security and stealth features. Keystroke Spy will not show in the Mac 'Force Quit' manager and is password protected from unauthorized usage.
Keystroke Spy can run totally in stealth; that is, it is virtually undetectable to the user. Keystroke Spy will NOT show up in the 'Force Quit' manager.
Display a splash screen which alerts users they are being monitored by the Keystroke Spy software (totally optional).
Keystroke Spy is password protected to prevent easy monitoring termination and option changes.
Keystroke Spy will stop logging screenshots when the user is inactive for a specified amount of time, when they are active again Keystroke Spy resumes logging.
Configurable Log Location
You can set Keystroke Spy to store logs in any specific directory you want - including network shared folders.
You can set Keystroke Spy to clear your keystroke logs whenever email log reports are delivered.
Easy to Use!
Keystroke Spy is designed to be extremely easy to use and setup. Keystroke Spy can be configured quickly for rapid deployment.
Easy to use, graphical user interface, with intuitive labeled buttons and icons!
Quick Setup Time
Keystroke Spy requires minimal configuration to get started. To get started you only need to specify your access password, and you are ready to start monitoring.