Spytech Keystroke Spy

Invisible Computer Keystroke Logging Software

 

Keystroke Spy is an extremely powerful cost-effective alternative to our robust, all-in-one computer monitoring product - SpyAgent. Keystroke Spy, while being able to log all keystrokes typed by users without them knowing, can also be set to log keystrokes typed only in specific applications. While allowing you to see who users are talking to, what websites they visit, emails they send, and more, Keystroke Spy can also be configured to email you when users type specific keywords - such as names or addresses.

Built around an easy to use graphical user interface, Keystroke Spy only takes a few moments to install and use.

Purchase Keystroke Spy and Install in Minutes!Try Keystroke Spy Today!

Keystroke Spy has an extremely useful feature-set. Below is a list of Keystroke Spy's extensive features,
organized by category for easy browsing. Click on a category to view its feature-set.

Keystroke Logging and Screenshot Recording Alerting and Filtering Features

Security and Stealth Features Ease of Use Features

    Keystroke Logging and Screenshot Recording

Keystroke Spy's keystroke logger allows you to record all keystrokes users type while using your computer. All logged keystrokes are viewable in their raw format, displaying the keys as they were typed, and can be formatted for easy viewing. Screenshot recording allows you to see everything users did, and when. Keystroke Spy offers the following features that make keystroke logging a simple task:

  • Categorized and Detailed Log Storage
    All logs contain a timestamp indicating when the keystrokes were made, what window the keystrokes were typed in, the window owner, and lastly the username of the user who actually typed the keystrokes.
    [screenshot]

  • Flaggable Log Entries
    Logs can be flagged for easy viewing. Logs can be flagged by application used, window title, user that typed the keystrokes, or date. Keystroke Spy can also flag password entries and custom keyword searches.
    [screenshot]

  • Log Entry Formatting
    Logs can be formatted so you can read the logs exactly as the user meant them to be read. Backspaces are applied, and system keystrokes are applied and hidden. [screenshot]


  • Automatic Visual Screenshot Playback
    Keystroke Spy's screenshot viewer provides visual proof of user activities, and gives you the ability to playback all screenshots recorded in a video-like automatic slideshow. Screenshots can be searched and archived for easy viewing and management. [screenshot]


  • Linked Screenshots in Keystroke Logs
    Keystroke Spy takes the guesswork out of connecting screenshots captured with keystroke logs by automatically displaying relevant and related screenshots with keystroke logs as you are viewing them.
    [screenshot]

Below are some of the many activities that can be recorded by Keystroke Spy.

  • Chat and Email Messages Sent
    Log any messages sent with any chat messenger or email account (including webmail).

  • Websites Visited, Online Searches, and Social Networking Activity
    Log all website addresses and online searches typed in by users. Capture social networking behaviors.

  • Passwords Entered
    Log all website and application passwords users type.

  • File and Document Activity
    Log contents of documents that users type and edit.


  • Application Activity
    Log keystrokes typed in any application users interact with on your computer.

back to top

    Alerting, Reporting, and Filtering Features

Keystroke Spy not only logs keystrokes, but it can also email you when specific phrases are typed - such as addresses or names, it can send you keystroke log reports, and it can be set to log only specific application activities.
  • Application Filtering
    Keystroke Spy allows you to control what keystrokes are logged. Keystroke Spy can be set to only log keystrokes typed in specific applications and windows that you indicate. [screenshot]

  • Email Log Delivery
    Keystroke Spy allows you to keep an eye on your computer from a remote location by sending email activity logs of all keystrokes typed, along with a screenshot of the user's desktop, at set time intervals. [screenshot]

  • Keyword Notification Alerts
    Keystroke Spy can be configured to send you email notifications when a user types a trigger keyword - such as an address, password, phone number, name, etc. A screenshot of the offending activity can be attached to the alert mail as well. [screenshot]

back to top

    Security and Stealth Features

Keystroke Spy has a large array of security and stealth features. Keystroke Spy is undetectable under all Windows versions and can circumvent popular third-party "spyware" detectors. Keystroke Spy has many useful security features like log file encryption, log file backdating, optional startup warnings, and much more.
  • Stealth-Mode
    Keystroke Spy can run totally in stealth; that is, it is virtually undetectable to the user. Keystroke Spy will NOT show up in the task manager under Windows - at all. Keystroke Spy does not appear in registry and Windows startup utilities while it is running, either. [screenshot]


  • Invisible Program and Log File Folders
    Keystroke Spy can be configured to render its program and log file folders invisible so that users cannot come across them while using the computer. [screenshot]

  • Log File Encryption
    Keystroke Spy has a built in encryption option that allows you to have all your Keystroke Spy activity logs encrypted so others cannot stumble across Keystroke Spy's logs or read them without using Keystroke Spy's protected log viewer. [screenshot]

  • Security Settings
    Toggle various Windows security settings to make it harder for users to trace and bypass Keystroke Spy - such as the ability to disable the system clock's time/date settings, or to access the Windows task manager. [screenshot]

  • Spyware Detector Disabling
    Configure Keystroke Spy to disable popular spyware detectors that may interfere or detect Keystroke Spy running. [screenshot]

  • Log File Backdating
    Keystroke Spy can be configured to backdate all log files it creates so that they appear older than they really are. This will make it impossible for users to find log files by performing system searches for most recently modified files. [screenshot]

  • Warning Screen
    Display a splash screen which alerts users they are being monitored by the Keystroke Spy software (totally optional). [screenshot]

  • Password Protection
    Keystroke Spy is password protected to prevent easy monitoring termination and option changes. [screenshot]

  • Idle Timeout
    Keystroke Spy will stop logging when the user is inactive for a specified amount of time, when they are active again Keystroke Spy resumes logging. [screenshot]

  • Configurable Log Location
    You can set Keystroke Spy to store logs in any specific directory you want - including network shared folders.

  • AutoClear
    You can set Keystroke Spy to clear your keystroke logs every xxx number of keystrokes entered.

  • Configurable Stealth Mode Hotkey
    Keystroke Spy allows you to configure its hotkey pattern to whatever key combination you want - making it harder for others to stumble across Keystroke Spy!


back to top

    Easy to Use!

Keystroke Spy is designed to be extremely easy to use and setup. Keystroke Spy can be configured quickly for rapid deployment.
  • Intuitive Interface
    Easy to use, graphical user interface, with intuitive labeled buttons and icons! [screenshot]

  • Quick Setup Time
    Keystroke Spy requires minimal configuration to get started. To get started you only need to specify your access password, and you are ready to monitor.

back to top

    System Requirements
  • Windows 9x, ME, NT4, 200x, XP, Vista, 7, 8, 8.1, or 10. 32 and 64-bit supported. (Also Available for Mac OS X)
  • Pentium Class PC (133mhz or higher)
  • 2MB Hard disk space
System Requirements

Keystroke Spy FAQ

Keystroke Spy's Awards

Stealth Edition

Monitoring Software

Compare Software

Choosing Software...

Keystroke Logger

Parental Control

Spouse Monitoring

"Love your product. Wanted you to know that I tried 6 different software packages for my home PC and yours is absolutely the best. I have already recommended it to 3 other people who were looking for such a product. The interface is amazingly easy and intuitive, the data which is captured far exceeded my expectations and is extremely easy to retrieve."

User Testimonials

Why Spytech?

 

24/7 Support Spytech Online Site MapWhy choose Spytech? Toll Free Ordering and Customer Service