Key logger is the powerful Computer activity monitoring tool designed to keep track of user’s keystrokes activities performed on your PC. Utility secretly records every keystroke typed on your computer including login-passwords, messenger chat, typed URLs, MS Word documents, Notepad file and other written documents in easiest way.
With the help of this utility you can be ensure that you never missed single a keystroke including alpha-numeric, numeric characters, special keys like alt, shift, ctrl etc and saves it in a hidden encrypted log file.
Popular keylogger utility can easily be used by both Home and Corporate users to detect what keystrokes activities are taking place on your PC. Keylogger software is especially helpful for the concerned Parents, Managers, System administrator or other people who want to know how kids, employees or friends are using their PC while they were not around machine.
Software Keystroke Recording Features:
- Easily records all keyboard keystrokes in hidden manner.
- Helps you to reveal typed login-id passwords for various mail accounts created and configured for email service providers (like Gmail. Yahoo, Rediffmail, MSN, Google etc), social networking sites (like Orkut, Facebook, hi5 etc), shopping accounts, newsgroup accounts and other mail accounts.
- Records text chat conversations.
- Records keystroke activities using MS Office application (including MS word, Access, Outlook Express, PowerPoint, One Note etc), Command prompt and other software application.
Software Main Features:
- Built in log facility: Creates log of all recorded keystrokes activities.
- Automatic log file delivery: Software sends log of recorded details at desired mail id automatically as per your settings.
- Report generation facility: Lets you generates the report of all keystrokes activities in .html or .txt file format.
Software Security Features:
- Encrypted log file: Log file is created in encrypted mode so that no one can easily view it details.
- Password protected application: Fully password protected application prevents unauthorized user to access and modify software configuration settings.
- Invisible utility: Utility does not appear in Task manager, Startup, Program list, Desktop or even in installation path folder.
- Undetectable utility: Software easily bypasses major anti keylogger or antivirus programs.