- Monitoring of one or more computers
- History of visited websites
- Licensed for 3 or 12 months
- Security alerts
- Remote configuration and data reading
Login
Hello, if you already have an account, log in.
Attention! We have switched to a new store engine!
Our online store switched to a new IT infrastucture on February 23, 2023. Old accounts created before 23.02.2023 still work and you can easily log in using your old access data. However, your purchase history from before 23.02.2023 is no longer visible in your accounts. If, as an old customer, you need your data for previous orders (placed before 23.02.2023), please contact us by email.
You are a new user?
Create an accountCart: (0)
You do not know where to start?
See recommended products
Computer monitoring
Computer monitoring
Data collecting
Computer monitoring
The digitalization of everyday life gives more and more possibilities of remote communication, gaining knowledge, developing a hobby or having a social life. Apart from the obvious merits, there are also serious problems and threats, which every user should consider – especially youngsters and children who are not aware of the dark side of the Internet. Monitoring of computer activities allows to be sure that the child will not become a victim of a pedophile, will not visit porn pages or the ones containing violence or things we simply do not want our child to view.
If we run a company, it is wise to pay attention in what way the computer equipment is used by the employees. Are there any abuses during the work? Are we a victim of of dishonest practices? To be informed about current situation, it is wise to use some of the solutions proposed by us.
Hardware keylogger is an option which offers recording every key hit on the keyboard. In a simple way we obtain information about what was typed on communicators, chats, addresses of visited websites. We also obtain a recording from text files and access to every password. Small sized recording devices may be installed as a link between the computer and keyboard or be masked by building it into the keyboard.
More advanced and discreet solutions are SpyLoggers, that is software keyloggers. They have the same basic functions as external devices, but they can generate screen shots. This gives us a possibility of insight into every content which is viewed on the computer – opened images, web pages visited from history of the browser, viewed videos. Additionally, some of the equipment offer an option of sound recording from the surrounding. Information and images recording may be archived on the device, from which the installation of the program is performed. But the more comfortable solution is an option of sending all the files to the provided e-mail address. Monitoring software is discreet and reliable. Knowing that it is not possible to detect it by anti-virus software, we may feel completely safe.
Computer monitoring at home or in the workplace is nowadays not only possible, but very easy to do. In order to check what your child or spouse is browsing or sending on the web, or to keep an eye on your employees' activities on company computers, you only need to install the reliable and, above all, discreet KeyGrabber software with WiFi function. This is a recommendable offer from the well-known and respected KeeLog brand. Thanks to its connectivity to the Internet, this advanced model sends the collected information directly to the e-mail address of the person who uses the programme to monitor activities on the equipment.
The KeyGrabber with WiFi function allows recording all characters entered via the keyboard. The advantages are easy operation (the device only needs to be connected to the keyboard to configure network settings), and invisibility to antivirus and system monitoring programmes. This guarantees practically 100% discreetness.
The solution thus offers a wide range of possibilities: thanks to KeyGrabber, it is possible to retrieve messages written online. The programme generates copies of the characters selected by the user, giving an insight into the user's online activities. Another advantage is the protection against revealing the controlling person: if we do not want our data to get into the wrong hands, the programme has a very difficult to break data protection in the form of 128 bit encryption. It also supports WEP, WPA and WPA-2 encryption.
Subcategories
-
Keyloggers
<div class="category_banner" style="background-image: url('/img/cms/banners/en-banners/spylogger-115.jpg');"> <div class="wrapper"> <div class="categoryName"> <h2><span class="icon-stop"></span> Spy programs</h2> </div> <div class="clearfix"></div> <div class="categorySentence"> <p>Computer monitoring</p> </div> </div> </div> <h2>Hardware keyloggers</h2> <p>One of the fastests, simplest and guaranteeing highest efficiency computer monitoring system is a hardware keylogger for capturing text or images. It is very simple in operation and only requires a connection between a screen or a keyboard and a computer, and then it is ready to record all the activities connected with writing. The device does not require any installation or computer access and works with every keyboard and image sending system. Small size and casing which does not attract attention enables discreet monitoring of employees or a child.</p> <p>This kind of solution is absolutely undetectable by the computer and installed anti-virus software. There is also no possibility of protecting oneself against such kind of data capturing, so it is perfect for monitoring in a company or in home. Keygrabbers' or keyloggers' capacity allows to capture thousands of pages of text or hundreds of screen shots and then view them on other computer, after switching the device to an ordinary pendrive mode.</p> <p>The parent or employer does not need to be familiar with operating a comlicated software to monitor the activities of children or employees. Such an equipment is also a perfect solution in case of changing the computers often or re-installing the operating system.</p> <p>Computer monitoring systems have a wide range of applications. They can be used to verify how employees use company equipment provided to them during the absence of the boss. They also make it possible to detect cheating and betrayal by the other half. These types of monitoring solutions also make it possible to check a child's activity on the Internet and thus protect them from a hacking attack or contact with a person with suspicious intentions. Regardless of whether you decide to monitor an employee, a loved one or a child, you will certainly expect the information capture equipment you purchase to be fully effective and discreet.</p> <p>This is exactly how the best computer monitoring device on the market works, namely the <a href="https://www.detective-store.com/keygrabber-nano-mcp-16-mb-for-computer-monitoring-recording-up-to-6000-a4-size-pages--1664.html">KeyGrabber</a>. What makes it different from other offered solutions? Well, it allows you to archive all data entered via the computer keyboard in a way that does not arouse any suspicion. It is undetectable by anti-spyware and anti-virus scanners, and completely invisible to the user under scrutiny. The USB hardware KeyGrabber is equipped with a 16MB memory. Thus, it allows storing as many as 8 million keystrokes, which equals approximately 4000 pages. Another advantage of this system is a very fast transfer - up to 125kB/s, and an intuitive and easy operation. To start capturing information, simply connect the device between the monitored computer and the USB port of the keyboard.</p> <p>Computer monitoring systems have a wide range of applications. They can be used to verify how employees use company equipment provided to them during the absence of the boss. They also make it possible to detect cheating and betrayal by the other half. These types of monitoring solutions also make it possible to check a child's activity on the Internet and thus protect them from a hacking attack or contact with a person with suspicious intentions. Regardless of whether you decide to monitor an employee, a loved one or a child, you will certainly expect the information capture equipment you purchase to be fully effective and discreet.</p> <p>This is exactly how the best computer monitoring device on the market works, namely the KeyGrabber USB 16MB. What makes it different from other offered solutions? Well, it allows you to archive all data entered via the computer keyboard in a way that does not arouse any suspicion. It is undetectable by anti-spyware and anti-virus scanners, and completely invisible to the user under scrutiny. The USB hardware KeyGrabber is equipped with a 16MB memory. Thus, it allows storing as many as 8 million keystrokes, which equals approximately 4000 pages. Another advantage of this system is a very fast transfer - up to 125kB/s, and an intuitive and easy operation. To start capturing information, simply connect the device between the monitored computer and the USB port of the keyboard.</p> -
SpyLoggers
<div class="category_banner" style="background-image: url('/img/cms/en/spyloggers-115.jpg');"> <div class="wrapper"> <div class="categoryName"> <h2><span class="icon-stop"></span>SpyLogger software</h2> </div> <div class="clearfix"></div> <div class="categorySentence"> <p>Computer surveillance</p> </div> </div> </div> <h2>Spy programs SpyLogger</h2> <p>Keylogger is the spy software which stores the keyboard activity. These types of solutions are known for many years, while SpyLogger is a new one. It is equipped with advanced software and allows to extend the range of computer monitoring.</p> <p>SpyLogger is used for computers monitoring in offices as well for controlling the child who uses the Internet. Its main feature is maximum discretion. The program is undetectable by anti viruses. Therefore, the Spylogger cannot be noticed and does not interfere with any operations. The main functions of SpyLogger are: registration of the pressed buttons, screen shots, as well as storage of messages from chat and other communicators. The advanced versions of the program are equipped with function of reports sending through the e-mail messages. The advanced versions of the program also allow to monitor particular behaviours, computer surrounding eavesdropping as well to determine the used applications.</p> <p>There are 4 models of the program to choose from: SpyLogger Classic, SpyLogger Mail, SpyLogger Classic PLUS, SpyLogger Mail PLUS. All model has a different range of possibilities. The software is constantly updated and compatible with popular systems such as: Windows XP, 2000, 2003, Vista, 7 and 8. The installation of the program takes just a few seconds. It is enought to plug in the pendrive, follow the short instruction and plug the pendrive off. The program operates automatically. The reports might be collected after plugging in the pendrive again or (in case of advanced models) through automatic email message.</p> <div style="margin-top: 20px;"> <div class="cmsAlert cmsNotice"> <p><strong>NOTE!</strong><br />Computer spying is illegal under the law, except in specific situations: monitoring employees (after informing them) or pupils.</p> </div> </div> <p>Progressive computerisation creates a wide range of possibilities, but when using the Internet, one should not forget about securing the content that is shared and sent, and about effectively protecting private and business information. For this purpose, a computer spying programme called <a href="https://www.detective-store.com/spylogger-pro-cloud-remote-employee-computer-monitoring-2279.html">spylogger </a>will be ideal. This solution is used in workplaces, among others, to monitor employees. In simple terms, a keylogger works like a sensitive scanner: it can see every single character pressed on the keyboard. The program captures and then saves in HTML format the characters you enter - both international and special characters, allows you to browse searches and generates screenshots of your computer. The finished screenshots are sent to the controlling party's e-mail address. Such a file or screenshot can be opened in any web browser.</p> <p>SpyLogger guarantees an increased level of security and discretion. The information does not have to be ripped onto a portable memory stick - it is sent directly to the user's e-mail address. Other advantages of the software include a keyword search function (each time a key phrase is entered, SpyLogger takes an additional screenshot), as well as easy configuration, discreet operation and a manufacturer's warranty.</p>
- Hardware keylogger for pc monitoring
- Logs every key stroke
- Takes screenshots
- Invisible to antivirus programs
- Sends data directly to mailbox!
- Best Advanced Keylogger
- Logs every key stroke and every application
- Takes screenshots
- Invisible to antivirus programs!
- Sends data directly to a mailbox!
- The smallest keylogger on the markets, only 21 mm
- Works as a Wi-Fi hotspot
- Access to information via browser
- Remote data download
- Memory capacity for up to 8 thousand A4 pages
- Remote keylogger for discreet PC surveillance SpyLogger - Classic ®
- Logs every key stroke
- Records every application
- Takes screenshots
- Invisible to antivirus programs!
- Works as a Wi-Fi hotspot and access point
- Built-in 16 MB/ 8 GB memory (version MAX)
- Access to information via browser
- Real-time data transmission
- Footage tagging with an exact time
- Advanced keylogger software for parental control - SpyLogger Classic Plus
- Logs every key stroke
- Takes screenshots (at fixed time)
- Enables recording sounds from the computer's surroundings
- The keylogger software cannot be detected by antivirus programs!
- All types of wireless keyboards
- For hybrid Apple keyboards
- Capacity 16 Mb
- Power supply
- Recording up to 6000 A4 size pages
- Keylogging softtware for parental control compatible with every PC keyboard
- 16 MB memory – can store up to 4000 text pages
- Flash FAT file system
- 128 bit data encryption
- Invisible to antivirus programs!
- Compatible with PS/2 keyboards
- Keystroke logger for computer monitoring can store up to 2000 text pages!
- 128-bit data encryption
- Easy to connect and operate
- Invisible to anti-virus software
- Recording up to 2000 text pages
- Totally inconspicuous
- 128-bit data encryption
- Keyboard logger is compatible with Windows and Linux systems
- Keyword Search
- The smallest USB Key logger for remote PC controlling on the market – just 2.5 cm
- Compatible with every USB keyboard available
- Built-in 16 MB of flash memory
- Wi-Fi module - reports to e-mail
- Invisible to antivirus software!
- USB password reset - a programme for launching a computer without knowing a password
- No installation needed - a USB flash drive
- Extremely simple in use
- Does not delete the old password
- For a child’s safety
- Works with any USB keyboard
- Built-in 4 GB flash memory
- 128 bit data encryption
- Wi-Fi module - reports to e-mail
- Invisible to antivirus software!
- Built-in 16 MB memory
- Recording up to 6000 A4 size pages of text
- Compatible with Apple hybrids
- Time counting clock
- Undetectable by antvirus software
- Revolutionary frame-grabber for children monitoring
- Enables taking screenshots
- VGA, DVI or HDMI version
- Resolution up to 1920 × 1200
- Untraceable in the system!
- Compatibility with OS X system
- Totally non-traceable
- Compressed screenshots
- Copies sent to e-mail or FTP
- Quick and simple installation
- Advanced PC monitoring software
- Logs every key stroke and takes screenshots
- Enables recording sounds around a computer
- Invisible to antivirus programs!
- Sends data directly to a mailbox