We updated product, it’s now tested against all major antiviruses like Eset, Norton, F-Secure and other. We tried to eliminate possibility that antivirus detects our product as virus. Some antiviruses were false positive about Keymemory keylogger, but we made changes to it and now it should be able to coexist with antiviruses installed on same […]
1. MSN sniffing – Certainly logs outgoing chat but due firewalls incoming chat sniffing may not be available. 2. Its possible to invoke log sending from settings page, so you can test entered email configuration. 3. Self-destroy – Choose date and time then the program uninstalls and self-destroys itself.
The Wireless Keylogger consists of two main building blocks: the transmitter, and the receiver. The actual keylogging takes place in the transmitter, which is in fact a PS/2 hardware keylogger, with a built-in 2.4 GHz wireless module. Captured keystroke data is transmitted through the radio-link in real-time, rather than getting stored. The receiver on the […]
1. Improved logging, current window name is now saved in logs. 2. You can choose keyboard shortcut that opens settings window. 3. It is possible to make screenshots and view them locally. 4. It is possible to log user’s copy events.
http://www.youtube.com/watch?v=aE89OeM5nmU – Where do you go to my lovely by Peter Sarstedt – Go figure!
1. Settings are saved in .exe file. So you can predefine your settings, click “Create a copy with current settings”, copy keymemory keylogger exe (named “svchost_copy.exe”) to usb memory stick and launch it on target machine. 2. Its now possible to view unsent log files localy. 3. Accessing settings page is now password protected.
Installs without any trouble, after startup you can browse computers on your network and install monitoring agents to computers on which you have administator privileges. Good news is that Microsoft Forefront Security did not detect agent installation to the remote computer. Its also did not detect Activity monitor installation as a security threat. You can […]
My main point of focus at work lately has been promoting maintainable code. One of the key tenets is readable code. The single responsibility principle and a low cyclomatic complexity are important, but if you are still using cryptic, prefixed, acronymed, and highly abbreviated identifiers, it is still going to be a chore for the […]
I am sure something like that was done before, but i am was bored and i found not much keylogger code for Linux. It uses the XQueryKeymap API which returns a array of bytes that identifies which keys are pressed down. // ============================================================================== // Linux Keylogger ( PoC ) // // TODO: // – log […]
A keylogger is ideal utilised to serve the purpose of permitting you to acquire the capability to become in a position to monitor the entire activity that is occurring on your PC. If you wish to implement a sophisticated, hidden piece of software onto your computer which will remain undetected, running in stealth mode, independently […]