The program remembers keystrokes. Keylogger programs, select keylogger. Everything in moderation

Probably, most of us in certain situations can be overcome by curiosity about who is doing what on the computer during our absence. Or maybe you need to check how strong passwords used by users, despite the fact that they themselves will never tell them... In general, there can be many situations, but there are not so many tools for this. In today's review we will talk about the so-called “keylogger”, the Elite Keylogger program. This utility allows you to track not only all the keys pressed, but also can take screenshots of the screen, remembers all the addresses of visited sites, the contents of the clipboard, sent letters, entered passwords and documents sent for printing. The advantage of Elite Keylogger is its complete secrecy, since the program works in low-level driver mode and starts before the screen Windows greetings. In addition, it cannot be found in the list of processes and deleted without knowing the password.

When installing Elite Keylogger, we will be offered several modes to choose from. To get acquainted with the program, it is best to select the mode Visible Mode. Once the installation of the program is complete, you must reboot the system. From this moment Elite Keylogger starts tracking everyone keystrokes and saving this information in logs.

Launch through the menu View logs and come up with a password that will be used in the future to view logs. After launching Elite Keylogger, select the log date and click on the button . Displaying keyboard logs may take some time while the program decodes the data.

A list of intercepted keystrokes is displayed in the main part of the window. The system user, application, window title, date and time of the event, and the keys that were pressed are indicated.

Elite Keylogger will show not only the user's keystrokes, but also screenshots taken every three minutes. To do this, select the item in the menu Screenshots. The list displays thumbnails of screenshots and the date and time they were taken. Double clicking on a thumbnail opens the image in full screen mode.

Chapter Internet Activity shows a list of addresses of visited sites with time and date.

Elite Keylogger keeps several more types of logs:
- open applications (Applications history), where the launch date and time, user name or system, and full path to the exe file are indicated. The date and time are also indicated here. shutdown Windows;
- remembers all copied data in the buffer ( Clipboard). Elite Keylogger provides data on the size of the data in the clipboard, the application from which the data was placed in the clipboard and the copied data itself;
- email addresses to which letters were sent ( Email history);
- passwords entered into the appropriate fields of the forms ( Passwords), in the unregistered version, by the way, some of the password characters in the log are replaced with asterisks *;
- list of documents sent for printing ( Printed documents), where you can find out the date and time of printing, number of pages and application.

In the settings you can select a user who will be able to view keyboard logs, specify a password and/or keyword, set the interval for saving screenshots and their quality. Elite Keylogger also provides the ability to track user activities according to a schedule. Automatic cleaning Logs are logged when their size exceeds 300 MB; this parameter is also configurable. Let's also mention the function of sending logs to the specified e-mail.

Characteristics:
Interface language: English
OS: Windows 2000, XP, Vista, 7
File size: 550 KB
License: demo version 7 days, registration $69

Perhaps every PC user has at least once thought about the safety of confidential data on their own hard drive. Any person stores personal information on his or her computer. secret information, but may not realize it himself. For example, purchases can be made through a PC in online stores using electronic money or plastic card. Such a computer automatically becomes interesting for scammers.

The problem of protecting confidential data has been around for years and universal solution does not exist for her. Currently, there is a fairly wide selection of programs to ensure computer security, for example, various antiviruses, firewalls or access rights restrictions. But you should not completely rely on these methods of protection, because apart from virus attacks there is a threat that comes from humans. How can you find out what happens to your work computer when the user is on a lunch break or just walked away for a few minutes?

For an experienced user A few minutes will be enough to find out great amount information about the owner of the computer. The easiest way to access the history of negotiations is by various messengers and to correspondence by email. In addition, in a few minutes you can retrieve a list of all used system passwords, as well as view a list of all resources visited by the owner. Is it worth talking about unprotected files and folders?

IN this review we will talk about specialized software products, designed to spy on a computer and its user. Such utilities are often used on work computers, for monitoring employees, as well as at home for organizing parental controls or monitoring the actions of the other half.

Various firewalls and antiviruses are suspicious of applications of this type and may consider them to be signs of malware. The developers of such utilities indicate this on their websites. However, after configuring the firewall appropriately, it will stop responding to the spyware.

This application will give users the opportunity to receive information about what actions are being performed on the computer. The utility can work with multiple accounts operating system Windows also indicates the user's name and the actions performed by him when generating a report. In the settings, you can select those accounts, when activated, the application will automatically launch.

The program generates reports that contain information about all actions performed by the user, including: keys pressed, names of windows in which typing is performed, Internet sites visited, names of programs and files launched, as well as the time of their use. Among other things, the utility saves all messages from popular IM clients and takes screenshots at intervals specified in the settings.

The received information can be viewed both in the program window and in the form of a report in HTML format. It is also possible to search among the displayed data and automatic removal outdated information.

The Maxapt QuickEye application is primarily aimed at use among corporate users. The program is most effective for viewing and analyzing reports. Thus, managers have the opportunity to quickly find out which employees worked and which did not. The application displays a list of all programs launched by the user, takes into account the time spent working with all utilities and how actively they were worked with. For example, the program window can be open throughout the working day, but the user worked with it for no more than an hour; the program will display all this in the report.

The program groups all running applications into categories, which makes it possible to go to the Internet messengers category and quickly find out which employees spent little time on their work. In addition, the application supports grouping network computers into several categories, which further facilitates the process of working with it.

It is worth noting that the utility can restrict access to selected applications, as well as compile a whole list of prohibited programs for each employee individually.

Given software tool previously known as KGB Keylogger. However, the change of name did not change the functionality of the utility and, as before, the main advantage of this “spy” is the ability remote tracking behind computer activity. During installation of this application, the user receives detailed information on how to properly configure the operation of the antivirus installed on the system for correct operation both utilities.

The Mipko Employee Monitor application organizes work with multiple users very well, which is a significant advantage for system administrators. Monitoring for different computers can be configured in various options. For example, for one user you can set only monitoring of application launches, for another - copy all typed text, etc.

The application is able to work in alert mode, that is, if the user performs certain actions or types certain words on the computer, the program marks him with an alarm icon and sends a warning network administrator.

The program makes it possible to apply special tracking filters, that is, the administrator can create a list of applications whose activity should be monitored, without paying attention to other utilities.

Of course, all this functionality would not be complete without taking screenshots. A screenshot can be taken for the entire work area computer and for active window. Screenshots can be taken not only after a designated period of time, but also when opening a new application.

The program is capable of intercepting messages in all known instant messengers, including: Yahoo!, QIP, ICQ, AIM, Skype, Miranda and others.

Using this utility, the user can receive various information about using a computer. The program monitors the contents of the clipboard, notes data on the activity of all applications, creates screenshots of the screen at specified intervals, takes into account the time the computer is turned on and off, tracks data on keystrokes, and monitors files sent for printing.

The program starts using a custom keyboard shortcut and does not appear in any list running applications, nor in the tray, but pretends to be the corresponding folder in the Start menu. Therefore, when using this spy, you should delete this folder.

This application has only one, but quite significant drawback - the program perceives keystrokes only in English layout, it's worth keeping this in mind when choosing spyware.

The demo version of the utility only works for 40 minutes from the moment of activation, but in some cases this is enough to protect the PC, for example, during a break at work.

One of the main parameters of a spy program is secrecy. After all, if a bright, flashing icon with the name of the application “hangs” in the task manager, the user will understand that he is being watched and will be able to bypass the protection. The developers of the NeoSpy program have done everything to ensure that their application is completely invisible on the computer. When installing the program, you can immediately select hidden or administrator installation. At hidden installation, the program folders will not be visible either on the hard drive, on the desktop, or in the Start menu. To start you will need to use command line.

This application, in addition to its invisibility, is also endowed with good functionality. The program can intercept messages from popular instant messengers, easily records the names of all launched applications, and also marks the start and close times. NeoSpy automatically takes screenshots at specified intervals, as well as during the launch of all utilities.

With the help of this spy, you can receive detailed information about activity on the Internet - the addresses of all sites visited, the time spent on the Internet and the amount of traffic spent.

We can say that the program makes it possible to monitor every user action on the computer. NeoSpy saves all text typed on the keyboard, saves data from the clipboard, and tracks the creation and deletion of new files.

Elite program Keylogger is completely undetectable by most antiviruses and does not in any way affect the performance of the system as a whole. The application is claimed to be a tool for long-term monitoring of activity over any period of time. Statistics are automatically classified by day, which ensures quick and easy access to administrator information. The utility allows you to create lists of users who need to be monitored.

The program can control the work of most popular applications for communication via the Internet, records correspondence by e-mail, saves data on the activity of all applications and documents sent for printing. Elite Keylogger can save all received information in separate folder on network drive, upload it to FTP server or send by email.

Worth paying Special attention to remove this utility. If the user wants to remove Elite Keylogger, he will not be able to do this even with the help of special utilities, which control the startup of the operating room Windows systems. The only way to remove this application– go to the program and select the appropriate action in the settings.

This program designed to monitor human activity in local network. Besides network monitoring, the utility also records other user actions on the computer. The application intercepts data from most well-known instant messengers, saves a list of all sites visited on the Internet and all text typed on the computer.

In addition, the program is capable of automatic mode create screenshots at specified intervals, keep records of all documents sent for printing, perform hidden copying edited files and documents copied to removable media.

The program stores all received information in a database on the administrator’s PC, and can also send notifications to the specified computer under certain conditions.

And finally.

There is currently a wide selection on the market spyware and anyone who wants to install such software on a computer will be able to select the right application, satisfying all user requirements. Of course, such utilities are most in demand in organizations where there are serious requirements for the actions of employees at work.

More recently, spyware could only record keystrokes on the keyboard, but now they are able to monitor all user actions on the computer. Thus, software of this type is developing very quickly, and no one knows what functions will be introduced by developers in new versions of utilities.

In addition to tracking employees and lovers, spyware will help you organize comprehensive protection confidential data on your computer.

How to find out what your child or employee is doing on the computer? What sites does he visit, with whom does he communicate, what and to whom does he write?

For this purpose, there are spy programs - a special type of software that, unnoticed by the user, collects information about all his actions. Computer spy software will solve this problem.

Spyware for a computer should not be confused with a Trojan: the first is absolutely legitimate and is installed with the knowledge of the administrator, the second gets onto the PC illegally and carries out hidden malicious activities.

However, hackers can also use legitimate tracking programs.

Spyware applications are most often installed by business executives and system administrators to control employees, parents to spy on children, jealous spouses, etc. In this case, the “victim” may know that she is being monitored, but more often than not, she does not know.

Review and comparison of five popular spyware programs

NeoSpy

NeoSpy is a universal keyboard, screen and user activity spy program. NeoSpy works invisibly and can hide its presence even during installation.

The user who installs the program has the opportunity to choose one of two installation modes - administrator and hidden. In the first mode, the program is installed openly - it creates a shortcut on the desktop and a folder in the directory Program Files, in the second - hidden.

Application processes are not displayed in the manager Windows tasks and third-party task managers.

The functionality of NeoSpy is quite wide and the program can be used both as home monitoring and in offices to monitor employees.

The spy program is distributed in three versions under a shareware license. The price is 820-1990 rubles, but it can work for free (even in hidden mode) with restrictions when viewing reports.

What NeoSpy can do:

  • monitor the keyboard;
  • monitor website visits;
  • show the user’s screen in real time via the Internet from another computer or tablet;
  • take screenshots and save images from your webcam;
  • monitor system events (turning on, shutting down, computer downtime, connecting removable media);
  • intercept the contents of the clipboard;
  • Monitor the use of Internet instant messengers, record Skype calls;
  • intercept data sent for printing and copied to external media;
  • keep statistics of computer work;
  • send laptop coordinates (calculated over Wi-Fi).

Thanks to the Russian-language interface, a wide range of functions, correct keyboard interception and a completely hidden operating mode in the system, NeoSpy receives maximum score when choosing programs for user control.

Real Spy Monitor

The next spy is Real Spy Monitor. This English-language program not only has tracking functions, but can also block certain actions on the computer. Therefore, it is often used as a parental control tool.

For each account In the Real Spy Monitor settings, you can create your own ban policy, for example, on visiting certain sites.

Unfortunately, due to the lack of an English-language interface, it is more difficult to understand the operation of Real Spy Monitor, despite the graphical thumbnails for the buttons.

The program is also paid. The license costs from $39.95.

Real Spy Monitor features:

  • intercepting keystrokes, clipboard contents, system events, websites, instant messengers, mail;
  • work in semi-hidden mode (without an active window, but with the process displayed in the task manager);
  • working with multiple accounts;
  • selective autostart for different accounts.

In general, many users like Real Spy Monitor; the disadvantages include high cost, lack of Russian-language interface and displaying the process in the task manager.

Actual Spy

The developers position Actual Spy as a keylogger (keylogger), although the program can do more than just record keystrokes.

It monitors the contents of the clipboard, takes screenshots, monitors site visits, and other things that are included in the main set of spies we examined.

When installed, Actual Spy creates a shortcut in the Start menu so it can be noticed by the user. The launch also occurs openly - to hide the program window you need to press certain keys.

Actual Spy's capabilities are not much different from those of its competitors. Among the shortcomings, users noted that it correctly records keystrokes only in the English layout.

SpyGo

SpyGo - spy kit for home use. Can also be used in offices to monitor employees.

To start monitoring, just click the “Start” button in SpyGo.

SpyGo is distributed under a shareware license and costs 990-2990 rubles depending on the set of functions.

IN trial versions The duration of monitoring is limited to 20 minutes per day, and sending reports to email and via FTP.

Main features of SpyGo:

  • Keystroke monitoring;
  • recording all actions on the computer (launching programs, operations with files, etc.);
  • control of visits to web resources (history, search queries, frequently visited sites, duration of stay on the site);
  • recording what is happening on the screen;
  • saving the contents of the clipboard;
  • listening to the environment (if there is a microphone);
  • monitoring of system events (times of turning on and off the computer, downtime, connecting flash drives, disks, etc.).

Important! The disadvantages of SpyGo, according to users, include the fact that it does not support everything Windows versions, when sending reports, it often throws errors and is quite easily unmasked.

Snitch

Snitch - the name of this program translates as “snitch”, and is very unfriendly towards the user. Snitch spies on computer activities. It works hidden, does not require complex settings and has little effect on system performance.

The program is released in a single version.

Features and Features of Snitch:

  • monitoring of the keyboard, clipboard, system events, web surfing and communication in instant messengers;
  • compilation of summary reports and graphs of monitored events;
  • undemanding network configuration;
  • protection against unauthorized termination of the program process;
  • surveillance is carried out even in the absence of access to the network.

Among the shortcomings, you can notice conflicts with antiviruses

How to detect a spy on your computer?

Finding spyware on a computer that doesn’t show itself outwardly is difficult, but not impossible.

So, despite their legitimacy, the applications we reviewed can be recognized by special antiviruses,“tailored” for searching for spyware (Trojans with spying functions), so we recommend adding installed program to the exclusion list of such antiviruses.

And if you do not need to remove the spy, but only need to disguise your actions from it, you can use anti-spying tools that, despite actively spying on you, will prevent the interception of keyboard events and screenshots.

Then your correspondence and passwords will not fall into the wrong hands.

15/11/2017

KDWin is a program designed for people who need to constantly type text on different languages. It is known that on almost any keyboard only 2 languages ​​are indicated, i.e. English, as well as the language where the keyboard was purchased. The KDWin program allows you to change the keyboard layout, and also allows the user to type certain words without knowing the layout. The program automatically replaces all letters that the user types with similar characters in the language you need. For example, Russian F will be replaced with English F, or vice versa. In addition, the KDWin program has a built-in envelope...

18/10/2016

MediaKey (Mkey) is a utility created specifically to provide conventional keyboards with various multimedia functions. This means that you can now assign hotkeys to perform certain actions. For example, pressing simultaneously Ctrl keys and - will decrease the sound, and the combination of Ctrl and + will, on the contrary, increase the volume. This will be much cheaper than purchasing an expensive keyboard in a store with buttons that control play, pause, stop songs, etc. The MediaKey utility has many useful features. With its help you can control players such as Media Player Classi...

20/07/2016

Punto Switcher convenient program to automatically switch keyboard layout. It is created for convenience manual dialing text on the keyboard. So you can type without being distracted by the layout. IN new version added Windows support 8 and also automatic detection entering the password. The program is the best in its class and has no competitors. The program has a built-in function for remembering certain words you often use. There are hotkeys to cancel switching layouts. The big advantage of the program is that it increases productivity and convenience of working at the computer. The program is absolutely free to use.

24/11/2015

AutoHotkey is a program for creating scripts and macros. Allows you to do whatever your heart desires with a keyboard, mouse and joystick. With its help, you can change the value of hot keys and enable selected buttons, such as mice. All scripts are created using your own own language and are usually stored in text file. Also included is a compiler with which you can create exe files. The utility is mainly useful in computer games, but its functionality does not end there. Scripts allow you to manipulate windows, files, folders, system registry and many others. She can simulate any action...

18/03/2015

ReGen KeyCode – functional utility, which does the job of determining the encoding of the key pressed on any keyboard. The program shows the encoding that is assigned to the pressed key. Shows options such as ASCII and brCode (browser encoding). In addition to these parameters, the application automatically converts the entered code into hexadecimal, as well as binary system. The resulting code in any form can be copied to the clipboard and then pasted into the desired location. The application automatically checks any available updates. Has a wide range of interface language options. Allows you to quickly, simply, conveniently receive any...

26/02/2015

Key Switcher convenient utility, designed to automatically reassign the keyboard layout. Triggers when incorrect insertion text. The program itself corrects typos. Corrects the case of letters. If the user accidentally puts two capital letters, Key Switcher will fix this. Any action taken by the application can be rolled back simply by clicking on the Backspace key. The utility will evaluate all user actions and remember what not to do. When correcting errors and typos, the program always focuses on the text type. Allows you to assign other keys to change and switch languages. In some moments...

04/06/2014

Logitech SetPoint is designed specifically for people using devices from this company. This program allows you to change the purpose function keys on the keyboard and mouse. For example, you can set a key to open a web page, or set hotkey to launch the program you need. Allows you to set hotkeys, not only based on the presence of functional or additional keys on your keyboard. It is possible to set any keyboard shortcut for almost any action. In addition, if your keyboard has an LCD display, you can set the information to...

27/06/2013

Free Virtual Keyboard– a convenient utility intended primarily for owners tablet computers, as well as for laptops that have touch screen. This utility useful in cases where your keyboard is too inconvenient for you, or it is missing altogether for some reason. It is in such cases that you can use the utility Free Virtual Keyboard. The program differs in that it allows you to resize virtual keyboard, so that you can see the information you need in the window in addition to the keyboard. Also, the program allows you to easily adjust the transparency of this window. There is a symbol auto-repeat function.