Keystroke Spy Logging and Recording
Spy's keystroke logger allows you to record all
keystrokes users type while using your computer. All
logged keystrokes are viewable in their raw format,
displaying the keys as they were typed, and can be
formatted for easy viewing. Keystroke Spy offers the
following features that make keystroke logging a
and Detailed Log Storage
All logs contain a timestamp indicating when the
keystrokes were made, what window the keystrokes
were typed in, the window owner, and lastly the
username of the user who actually typed the
Logs can be flagged for easy viewing. Logs can be
flagged by application used, window title, user
that typed the keystrokes, and date.
Logs can be formatted so you can read the logs
exactly as the user meant them to be read.
Backspaces are applied, and system keystrokes are
applied and hidden.
are some of the many activities that can be recorded
by Keystroke Spy.
and Email Messages Sent
Log any messages sent with any chat messenger or
email account (including webmail).
Log all website addresses typed in by users.
all website and application passwords users type.
and Document Activity
Log contents of documents that users type and
Log keystrokes typed in any application users
interact with on your computer.
Alerting, Reporting, and Filtering Features
Spy not only logs keystrokes, but it can also email
you when specific phrases are typed - such as
addresses or names, it can send you keystroke log
reports, and it can be set to log only specific
Spy allows you to control what keystrokes are
logged. Keystroke Spy can be set to only log
keystrokes typed in specific applications and
windows that you indicate.
Spy allows you to keep an eye on your computer
from a remote location by sending email activity
logs of all keystrokes typed, along with a
screenshot of the user's desktop, at set time
Spy can be configured to send you email
notifications when a user types a trigger keyword
- such as an address, password, phone number,
name, etc. A screenshot of the offending activity
can be attached to the alert mail as well.
KeyStroke Spy Security and Stealth Features
Spy has a large array of security and stealth
features. Keystroke Spy is undetectable under all
Windows versions and can circumvent popular
third-party "spyware" detectors. Keystroke
Spy has many useful security features like log file
encryption, log file backdating, optional startup
warnings, and much more.
Keystroke Spy can run totally in stealth; that is,
it is virtually undetectable to the user.
Keystroke Spy will NOT show up in the task manager
under Windows - at all. Keystroke Spy does not
appear in registry and Windows startup utilities
while it is running, either.
Keystroke Spy has a built in encryption option
that allows you to have all your Keystroke Spy
activity logs encrypted so others cannot stumble
across Keystroke Spy's logs or read them without
using Keystroke Spy's protected log viewer.
Toggle various Windows security settings to
make it harder for users to trace and bypass
Keystroke Spy - such as the ability to disable the
system clock's time/date settings, or to access
the Windows task manager.
Configure Keystroke Spy to disable popular
spyware detectors that may interfere or detect
Keystroke Spy running.
Keystroke Spy can be configured to backdate
all log files it creates so that they appear older
than they really are. This will make it impossible
for users to find log files by performing system
searches for most recently modified files.
Display a splash screen which alerts users
they are being monitored by the Keystroke Spy
software (totally optional).
Spy is password protected to prevent easy
monitoring termination and option changes.
Keystroke Spy will stop logging when the user
is inactive for a specified amount of time, when
they are active again Keystroke Spy resumes
can set Keystroke Spy to store logs in any
specific directory you want - including network
can set Keystroke Spy to clear your keystroke logs
every xxx number of keystrokes entered.
Stealth Mode Hotkey
Keystroke Spy allows you to configure its
hotkey pattern to whatever key combination you
want - making it harder for others to stumble
across Keystroke Spy!
KeyStroke Spy is Easy to Use!
Spy is designed to be extremely easy to use and setup.
Keystroke Spy can be configured quickly for rapid
Easy to use, graphical user interface, with
intuitive labeled buttons and icons!
Keystroke Spy requires minimal configuration
to get started. To get started you only need to
specify your access password, and you are ready to
KeyStroke Spy System Requirements
9x, ME, NT4, 200x, XP, or Vista, 7 and 8
Class PC (133mhz or higher)
Hard disk space