HOME PAGE

SHOPPING CART

COMPUTER HACKING

 

 

Computer Keystroke Logger

64K PS2 Version

Computer Keystroke Logger

2MB USB Version

Use this device to capture ALL keystrokes typed on a computer, including PASSWORDS, CHAT, EMAIL, ETC...  It records approximately 32 pages of typing or 1 weeks usage on average.  This model connects to computers that use a PS2 keyboard.

Price: $59.00 U.S. Dollars

Covert to: = result here

Currency converter © Governor Textor Ltd 2009-2012. All rates are indicative only.

 

Buy Now Click shopping cart button to purchase direct from us.

Click credit card button to purchase through our distributor.

Use this device to capture ALL keystrokes typed on a computer, including PASSWORDS, CHAT, EMAIL, ETC...  It records approximately 1000 pages of typing or 32 weeks usage on average.  This model connects to computers that use a USB keyboard.

Price: $99.00 U.S. Dollars

Covert to: = result here

Currency converter © Governor Textor Ltd 2009-2012. All rates are indicative only.

 

Buy Now Click shopping cart button to purchase direct from us.

Click credit card button to purchase through our distributor.

 

Did you ever wonder what your kids are doing all day on the family PC? Are you wondering what your employees do all day while sitting in front of their computers? Well, wonder no more!

See what your children are doing while surfing the Internet...see who they chat with. Verify what your employees do all day on their computers...are they wasting time surfing the Web, or are they working productively? Find out once and for all. Use our products to record their every keystroke. Once installed our products are undetectable by anti-virus and firewall software.

Do not use this product to monitor what your spouse, girlfriend or boyfriend is doing on their computer without their permission as this may be an illegal use.  You are responsible to check and comply with laws in your city, state, country.

Parents :

Monitor your child's internet, e-mail, and chat room activity. We believe that there is no off-the-shelf solution for effective parenting, but our Keystroke Grabbers can be your eyes when you are not there.

Employers :

Use our Keystroke Loggers to monitor employee computer usage compliance. Employees will spend less time browsing the internet and sending e-mails if they are being monitored.

Executives & System Admins :

Use our Keystroke Loggers to detect any unauthorized access of your PC. If someone uses your computer after hours, you will know. ALSO MONITORS CHAT AND INSTANT MESSAGING. Better than a blocker because :

  • Blockers cannot keep up with the tremendous growth of the Internet.

  • Blockers don't tell you what your children are doing. The Keystroke Logger records their typing word-for-word.

Better than software because :

  • Uses no system resources. No hard drive, CPU, RAM, etc.

  • Undetectable by the computer.

  • Installs in seconds - Just plug it in!

  • Portable - move it from computer to computer with no loss of data.

Installation :

The Keystroke Recorder is a very simple device to understand. It is approximately 1-5/8 inches long, and about 5/8 inch in diameter. To install the Keystroke Recorder, all you need to do is plug it in between your keyboard cable and your computer. Once you do this, it is ready to record.

Retrieving data :

When you have recorded some data, and would like to retrieve it, simply open up any text editor or word processing program (Microsoft Notepad is recommended). Type in your secret password. As soon as your password has been correctly entered, a menu will be displayed on your screen, giving you several options, including: View Memory, Erase Memory, Disable recording, and so on. As soon as the 'View Memory' option has been selected, every word that has been typed on your computer will be displayed for you to see!

Features :

  • Works on any operating system for a PC, including Windows 3.1, 95, 98, NT, 2000, XP, Vista, Windows 7, Linux, OS/2, DOS, and BeOS.

  • No software installation is needed at all! Even retrieving the keystrokes requires no software.

  • Keystrokes are stored in non-volatile flash memory that doesn't need batteries.

  • Unlike some software keystroke recorders, this picks up every keystroke, even those used to modify the BIOS before boot up.

  • The device can be unplugged and the keystrokes retrieved on another computer.

  • Powered from the computer. Doesn't need batteries.

 

OKAY USES:

The Device was designed and is to be used solely for parents to monitor what their children are doing on the computer and for businesses to monitor what their employees are doing on the computer. It can also be used for backup of data in case of a power outage.

NOT OKAY USES:

The Device may not be used to violate the privacy rights of others, or to access or intercept electronic communications in violation of wiretap statutes, or to violate company regulations.  Impermissible Uses include, but are not limited to the following acts: retrieval of credit card information, passwords, personal and/or medical information, confidential and/or proprietary information, or trade secrets.

Privacy and wiretapping laws change from time to time and vary from state to state. It is your responsibility to ensure that you are in compliance with federal, state, and local laws.

POSTING NOTICE:

If anyone other than you will be using the computer on which the Device is installed, you agree to post a notice visible to each user of the computer to the effect that (i) activities on this system may be monitored and recorded and (ii) that anyone using this system expressly consents to such monitoring and is advised that if such monitoring reveals possible evidence of unauthorized or criminal activity, such evidence may be provided to company or law enforcement officials.


 

SUBSCRIBE TO OUR NEWSLETTER

Email:
Name:

 

 

HOME PAGE

SHOPPING CART

CONTACT US

 

 

We WILL NOT answer emails from anyone asking about illegal activities, or how to use our products for illegal activities...they will automatically be deleted. All products are designed for testing and exploring the vulnerabilities of CUSTOMER-OWNED equipment, and no illegal use is encouraged or implied. We WILL NOT knowingly sell to anyone with the intent of using our products for illegal activities or uses. It is your responsibility to check the applicable laws in your city, state, and country.  Some text on the website is used as keywords to attract traffic; it is not intended to imply illegal activity.

ęCopyright Hackers Home Page 1997-2012 all rights reserved.
No portion or content of this site may be rewritten, redistributed, republished, or used in any manner.

 

PRODUCTS

Live Chat

Products

Home Page

Contact Us

Shopping Cart