Spy has an extremely useful feature-set. Below is a list
of Keystroke Spy's extensive features,
organized by category
for easy browsing. Click on a category to view its feature-set.
Logging and Screenshot Recording
Spy's keystroke logger allows you to record all keystrokes
users type while using your computer. All logged keystrokes
are viewable in their raw format, displaying the keys as
they were typed, and can be formatted for easy viewing.
Screenshot recording allows you to see everything users
did, and when. Keystroke Spy offers the following features
that make keystroke logging a simple task:
and Detailed Log Storage
All logs contain a timestamp indicating when the keystrokes
were made, what window the keystrokes were typed in,
the window owner, and lastly the username of the user
who actually typed the keystrokes. [screenshot]
Logs can be flagged for easy viewing. Logs can be flagged
by application used, window title, user that typed the
keystrokes, or date. Keystroke Spy can also flag password
entries and custom keyword searches. [screenshot]
Logs can be formatted so you can read the logs exactly
as the user meant them to be read. Backspaces are applied,
and system keystrokes are applied and hidden. [screenshot]
Visual Screenshot Playback
Keystroke Spy's screenshot viewer provides visual proof of user activities, and
gives you the ability to playback all screenshots recorded in a video-like automatic
slideshow. Screenshots can be searched and archived for easy viewing and management.
Screenshots in Keystroke Logs
Keystroke Spy takes the guesswork out of connecting screenshots captured with
keystroke logs by automatically displaying relevant and related screenshots with
keystroke logs as you are viewing them. [screenshot]
are some of the many activities that can be recorded by
and Email Messages Sent
Log any messages sent with any chat messenger or email
account (including webmail).
Visited, Online Searches, and Social Networking Activity
Log all website addresses and online searches typed
in by users. Capture social networking behaviors.
all website and application passwords users
and Document Activity
Log contents of documents that users type and edit.
Log keystrokes typed in any application users interact
with on your computer.
Reporting, and Filtering Features
Spy not only logs keystrokes, but it can also email you when
specific phrases are typed - such as addresses or names,
it can send you keystroke log reports, and it can be set
to log only specific application activities.
Spy allows you to control what keystrokes are logged.
Keystroke Spy can be set to only log keystrokes typed
in specific applications and windows that you indicate.
Spy allows you to keep an eye on your computer from a
remote location by sending email activity logs of all
keystrokes typed, along with a screenshot of the user's
desktop, at set time intervals. [screenshot]
Spy can be configured to send you email notifications
when a user types a trigger keyword - such as an address,
password, phone number, name, etc. A screenshot of the
offending activity can be attached to the alert mail
as well. [screenshot]
and Stealth Features
Spy has a large array of security and stealth features. Keystroke
Spy is undetectable under all Windows versions and can circumvent
popular third-party "spyware" detectors. Keystroke
Spy has many useful security features like log file encryption,
log file backdating, optional startup warnings, and much
Keystroke Spy can run totally in stealth; that is, it
is virtually undetectable to the user. Keystroke
Spy will NOT show up in the task manager under Windows
- at all. Keystroke Spy does not appear in registry
and Windows startup utilities while it is running,
- Invisible Program and Log File Folders
Keystroke Spy can be configured to render its program and log file folders invisible so that users cannot come across them while using the computer.
Keystroke Spy has a built in encryption option that
allows you to have all your Keystroke Spy activity logs
encrypted so others cannot stumble across Keystroke Spy's
logs or read them without using Keystroke Spy's protected
log viewer. [screenshot]
Toggle various Windows security settings to make
it harder for users to trace and bypass Keystroke Spy
- such as the ability to disable the system clock's time/date
settings, or to access the Windows task manager. [screenshot]
Configure Keystroke Spy to disable popular spyware
detectors that may interfere or detect Keystroke Spy
Keystroke Spy can be configured to backdate all
log files it creates so that they appear older than they
really are. This will make it impossible for users to
find log files by performing system searches for most
recently modified files. [screenshot]
Display a splash screen which alerts users they are
being monitored by the Keystroke Spy software (totally
Spy is password protected to prevent easy monitoring
termination and option changes. [screenshot]
Keystroke Spy will stop logging when the user is
inactive for a specified amount of time, when they are
active again Keystroke Spy resumes logging. [screenshot]
can set Keystroke Spy to store logs in any specific directory
you want - including network shared folders.
can set Keystroke Spy to clear your keystroke logs every
xxx number of keystrokes entered.
Stealth Mode Hotkey
Keystroke Spy allows you to configure its hotkey
pattern to whatever key combination you want - making
it harder for others to stumble across Keystroke Spy!
Spy is designed to be extremely easy to use and setup. Keystroke
Spy can be configured quickly for rapid deployment.
Easy to use, graphical user interface, with
intuitive labeled buttons and icons! [screenshot]
Keystroke Spy requires minimal configuration to get
started. To get started you only need to specify your
access password, and you are ready to monitor.
Windows 9x, ME, NT4, 200x, XP, Vista, 7, 8, 8.1, or 10. 32 and 64-bit supported.
Available for Mac OS X)
Class PC (133mhz or higher)
Hard disk space
your product. Wanted you to know that I tried 6 different software
packages for my home PC and yours is absolutely the best. I have
already recommended it to 3 other people who were looking for such
a product. The interface is amazingly easy and intuitive, the data
which is captured far exceeded my expectations and is extremely
easy to retrieve."