Keystroke Spy is the ultimate in keystroke monitoring software - allowing you to easily and efficiently record what users are doing on your computer.
Keystroke Spy operates in total stealth recording every keystroke users type along with visual screenshot playback of their activities! Activity logs are emailed to you for remote viewing along with instant keyword alerts when specific words or phrases are typed!
- Supports Windows 8, 7, Vista, XP, 200x, NT4, Me, 9x
Keystroke Logging and Screenshot Recording
Keystroke Spy will record all keystrokes typed by ALL users of the computer you install the software on. You can view the logs in raw format, exactly as they were typed, or formatted for easy viewing. Additionally, the screenshot recording feature allows you to visually see what users did and when.
- Detailed Keystroke Logs [view screenshot]
All keystroke logs are time stamped with the time and date the keystrokes were typed. Along with this you will also see the application they were typed in, the title of the Window they were typed in, and the Windows username who did the typing.
- Flaggable Log Entries [view screenshot]
Logs can be flagged by application or window they were typed in, date, or Windows user that typed the keystrokes. Password entries and custom keyword searches can also be flagged.
- Log Formatting [view screenshot]
All logs can be formatted, in other words, backspaces and other system keys can be applied so you see exactly what was intended by the user typing them.
- Automatic Visual Screenshot Playback [view screenshot]
Keystroke Spy's screenshot viewer provides you with visual proof of user activities in the form of a screenshot of the desktop. You can play back the screenshots in video-style slideshow like watching a movie. Screenshots can also be searched and archived for easy viewing and management.
- Linked Screenshots in Keystroke Logs [view screenshot]
Keystroke Spy also automatically links all screenshots with their appropriate keystroke logs. When viewing logs you will automatically see all relevant and related screenshots to the keystroke logs you are viewing.
Below are just some of the activities that will be recorded with Keystroke Spy :
- Chat and Email Messages Sent
Keystroke Spy records all instant messages, chat conversations, and emails sent from the computer including webmail.
- Websites Visited
All website addresses typed as well as search queries typed into Google, Yahoo, etc will be recorded.
- Usernames and Passwords
All usernames and passwords typed on the computer will be recorded along with where they were used.
- File and Document Activity
All files and documents which are typed or edited will be recorded by Keystroke Spy.
- Applications and Games
Log all keystrokes which may be typed in any application or game your users may use on the computer.
- Social Network Activity including MySpace, Facebook, LinkedIn, and any others
As all keystrokes are recorded so will social networking activity such as wall posts, chats, messages, etc which are typed on the computer by users.
Alerting, Reporting, and Filtering Features
Along with recording keystrokes, Keystroke Spy can also immediately alert you via email when certain keyword phrases are typed on the computer such as names, address, phone numbers, and any other phrase you specify. You can also have logs automatically sent to your email address so you can view them from another location, such as your office. Lastly, rather than logging all keystrokes, you can tell Keystroke Spy to only monitor keystrokes typed within specific applications you wish to monitor.
- Application Filtering [view screenshot]
You can optionally set Keystroke Spy to ONLY record keystrokes typed in specific applications or windows you select. By default, Keystroke Spy will record ALL keystrokes no matter where they were typed.
- Email Log Delivery [view screenshot]
Keystroke Spy can be set to automatically email its logs to an address you specify along with a current screenshot of the desktop - you select how often and at what time intervals they are sent. This allow you to view the logs from another computer other than the one you are monitoring such as your office.
- Keyword Alert Notifications [view screenshot]
Keystroke Spy can be set to automatically alert you via email when a 'trigger' keyword or phrase has been typed on the computer such as a name, address, phone number, etc. You select what keywords or phrases you wish to be alerted upon. Along with the alert email is an included screenshot of the desktop at the time the 'trigger' was set.
Security and Stealth Features
Keystroke Spy includes numerous security and stealth features. Keystroke Spy is undetectable under all versions of Windows and can circumvent most popular third-party 'spyware' detectors for ultimate stealth. Aside from this, it also uses log file encryption to prevent viewing of logs from unauthorized users, log file backdating, and includes an optional startup warning if you choose to notify your computer users they are being monitored.
- Complete Stealth Mode [view screenshot]
Keystroke Spy will be completely undetectable to your users. It will NOT show up in the task manager, registry, or Windows startup utilities.
- Log File Encryption [view screenshot]
All log files created by Keystroke Spy are encrypted. This prevents viewing the logs without first logging into the Keystroke Spy application and using its built in viewer (only you will have access to view the logs).
- Security Settings [view screenshot]
Advanced security features allow you to prevent time/date changes as well as access to the Windows Task Manager. This is simply extra protection to make sure Keystroke Spy cannot be tampered with by unauthorized users.
- Spyware Detector Disabling [view screenshot]
Keystroke Spy can be configured to disable most popular third-party spyware detectors which might tamper with its operation and monitoring of the computer.
- Log File Backdating [view screenshot]
Keystroke Spy can be configured to backdate all log files its creates so they appear much older than they are. This makes it impossible to search for and find created log files through recently modified files on the computer.
- Warning Screen (optional) [view screenshot]
You can optionally set Keystroke Spy to warn users they are being monitored through a 'splash' screen along with a custom message to them which you set. This warning is optional and can be turned on/off by you in the settings.
- Password Protected [view screenshot]
Keystroke Spy utilizes a hotkey and password combination to gain access to its logs and settings. You must first enter the hotkey (user set combination of keys pressed at the same time) to open the password prompt. You must then enter the correct password. This is the ONLY way to gain access to the logs and settings.
- Idle Timeout [view screenshot]
Keystroke Spy can be configured to go into an idle state when a user has been inactive for a set amount of time. When the user resumes activity on the computer Keystroke Spy will begin monitoring again.
- Configurable Log Location
You can set Keystroke Spy to store its log files in any directory you wish, aside from the default, including network shared folders.
- Automatic Log Clearing
You can configure Keystroke Spy to clear its logs after every 'xxx' keystrokes have been typed. This prevents the log files from becoming larger in size than you may wish.
- Configurable Hotkey Prompt
The hotkey is a combination of keys pressed at the same time to open the password prompt. You then enter the password to gain access to Keystroke Spy. This hotkey can be changed to whatever combination of keys you wish.
Stealth Version (optional on order page)
Keystroke Spy Stealth Version is an optional version available on the order page for an additional price. The Stealth Version contains all the same features of the standard version plus additional stealth features as listed below :
- Pre-Configured Installer
The Stealth Version includes a pre-configured installer which requires no interaction from the user whatsoever as all settings for complete stealth operation have already been set. There is virtually no chance a monitored user will be able to detect or remove the software.
- No User Interaction Required
When the install file is executed on the computer you wish to monitor it installs instantly with no windows, popups, or user interaction required, with pre-configured stealth settings. There is no mention or trace of 'Keystroke Spy' mentioned or shown during the installation. The install process takes seconds and monitoring begins immediately.
- Remote Install Capable
The Stealth Version can also be remotely installed. The install file can be emailed (or transferred in any other way) to the computer you wish to monitor and when executed will invisibly install the software and begin monitoring immediately.
Easy to Use
Keystroke Spy was designed from the ground up to be easy-to-use yet extremely powerful at the same time. Even a novice computer user will have no trouble installing and using Keystroke Spy.
- Intuitive Graphical Interface [view screenshot]
The interface was designed with labeled buttons and icons for a visually easy navigation experience.
- Quick and Easy Setup
Keystroke Spy is extremely easy to install - just double click the install file and enter the password of your choosing. Default options are already selected and you are already monitoring.
- Windows 9x, ME, NT4, 200x, XP, Vista, 7, and the new Windows 8 compatible
- Pentium Class PC (133mhz or higher)
- 2MB of hard disk space
- Also available for Mac OS X - click here!
Purchase Keystroke Spy now and begin recording all keystrokes of all users on your computer in complete stealth! By clicking the order link below you can purchase, download, and install Keystroke Spy in minutes! Volume pricing for multiple licenses can be seen in the right column as well as the order page.
We offer credit card, PayPal, wire transfer, check, and money order purchases. Simply click the order link below and select your method of payment on the order form for more details.
|Buy Now||Free Trial|
|Secure Online Purchase|
Download Immediately! (CD optional)
|Free Trial Download|
Quick and Easy Installation
- 1 license
- 2-9 licenses
- 10-24 licenses
- 25-49 licenses
- 50+ licenses
- large quantity
- contact us
- Home and Small Business
- Network Solutions
- Additional Services
- Online Support