Stealth Edition contains all the same monitoring and security
features that the normal edition of Keystroke Spy contains - only
the installation method is different - as outlined below.
Edition's Key Benefits
Keystroke Spy is installed in optimal stealth, with no extra
configuration needed from the user. The installation is
preconfigured for OPTIMAL STEALTH so that there is virtually
no chance that a monitored user will be able to detect
and remove the Keystroke Spy software. You can realistically
have Keystroke Spy installed, and monitoring as fast as your
PC can download the software. The actual installation takes
mere seconds to complete and start monitoring!
User Interaction Needed
No user interaction is needed during the Keystroke Spy Stealth
Edition installation process. The installation only takes
a few seconds to complete - the installation is completely
invisible to the user.
The Stealth Edition installer is able to be emailed to remote
PC's - where the remote user can download and run the installer
without really knowing what is being installed. No trace
or mention of "Keystroke Spy" is ever mentioned or shown
during the install - the install is invisible to the user!
You still, however, have to access the PC physically to view
the activity logs Keystroke Spy records.
The Stealth Edition installer installs and executes the Keystroke Spy
software in complete stealth. All you have to do is run the
installer once, and Keystroke Spy will be monitoring your PC in
Spy's keystroke logger allows you to record
all keystrokes users type while using your computer. All logged keystrokes
are viewable in their raw format, displaying the keys as
they were typed, and can be formatted for easy viewing.
Screenshot recording allows you to see everything users
did, and when.
Chat and Email Messages Sent
Log any messages sent with any chat messenger or
email account (including webmail).
Websites Visited and Online Searches
Log all website addresses and online searches
typed in by users.
all website and application passwords users type.
File and Document Activity
Log contents of documents that users type
Log keystrokes typed in any application users
interact with on your computer.
| Keystroke Spy
Stealth Edition - Stealth Features
in Windows Task Manager
Keystroke Spy Stealth will not appear in the Windows task
manager! The user will
not know anything out of the ordinary is running!
in Windows Control Panel Add/Remove Programs Uninstaller
Keystroke Spy Stealth will not appear in the Add/Remove Programs
Control Panel. The user has no direct method of uninstalling
the Keystroke Spy Stealth software.
not appear in Start Menu, Desktop, or System Tray
Keystroke Spy Stealth will not be visible in the Start Menu, Desktop,
or System Tray. The user will have no idea anything has been
and Disables Spyware Detectors Immediately
Keystroke Spy Stealth will detect and eliminate spyware detector
software on your PC before it has a chance to interfere with
Keystroke Spy's operation.
Startup for ALL Users
Keystroke Spy Stealth is configured to load on computer startup
(invisibly) for all users - it will even log non-administrator
guest and limited accounts without additional configuration.
your product. Wanted you to know that I tried 6 different software
packages for my home PC and yours is absolutely the best. I have
already recommended it to 3 other people who were looking for such
a product. The interface is amazingly easy and intuitive, the data
which is captured far exceeded my expectations and is extremely
easy to retrieve."