Remote keylogger for discreet PC surveillance - SpyLogger Classic ®
Remote keylogger for discreet PC surveillance - SpyLogger Classic ®
  • Customer rating:
    Average: 5 / 5 Based on 6 reviews
  • Ask Expert: +44 (020) 3290 1199
    Sales representative and Consultant
    John Paine


    +44 (020) 3290 1199

Remote keylogger for discreet PC surveillance - SpyLogger Classic ®

  • Remote keylogger for discreet PC surveillance SpyLogger - Classic ®
  • Logs every key stroke
  • Records every application
  • Takes screenshots
  • Invisible to antivirus programs!

Availability: AvailableInStock


£89.00tax inc.

Add to cart

  • Print

More info

Remote Keylogger for discreet PC surveillance - SpyLogger Classic ®

In the contemporary world computers are simply irreplaceable. Computer has become a tool of work, learning, entertainment and socialisation. However, computer security is not something we can treat lightly. The Internet is full of lurking dangers. Both children making new friends and unaware adult users utilizing paid services can easily fall prey to data theft. If you are an employer, you may also consider protecting your computer from dishonest employees who use it for private purposes. This spy software allows you excatly that.

SpyLogger Classic® is a remote keylogger software designed to support discreet and efficient computer surveillance. It allows us to supervise our child browsing the Internet, control our employees, and protect our data from unauthorized access.

To start with, this remote keylogger for dscreet PC surveillance gives you access to information about every keystroke and generates screenshots in specific pre-set time intervals. The user is given a full picture of all computer activities, including every website address typed in the browser’s address bar, access to all internet communicator and chat conversations, and passwords to social media profiles. SpyLogger will record all Facebook, Skype and other similar application activities and take a screenshot, which can help you to identify the receiver of the video call. The latest version of keylogger software allows you to track both file modifications and USB drives.

Applications of the sounds of the remote keylogger for discreet PC monitoring

  • Parental control,
  • Providing safe browsing environment for children,
  • Employee monitoring.

The remote keylogger software can be configured on any computer and the installation process takes less than 30 seconds to complete. Included manual gives you clear and easy-to-follow instructions about the whole process.

Finally, you are given unlimited 12-month warranty!

SpyLogger Classic ® main features

      • Computer monitoring


        All collected text logs and screenshots can be copied from monitored computer by connecting SpyLogger ® device. They can be subsequently viewed on any device. 8 GB memory is enough to collect data for a timespan of about 200 to 240 days.

      • Keylogger


        The spy software is able to capture and record all keys which have been pressed. It also allows for better support of international and special characters. The data are saved as HTML file that can be opened in any standard browser.

      • Screenshot


        SpyLogger Classic ® generates screenshots at a fixed time and saves them in JPEG format. Remote keylogger allows the user to access not only the records of pressed keys, but also browsed pictures, contents of received e-mails and conversations through instant messaging or chats.

      • Key word

        KEY WORD

        Every time a certain key word is typed SpyLogger ® spy software generates an additional screenshot.

      • Programs


        SpyLogger ® stores data about all running applications as well as all window opening, closing and switching procedures.

      • File


        Logging all actions performed on files (open, move and many other), including time and date of the modification. Remote keylogger also makes it possible to filter files by type or to select only specific folders.

      • Data carriers


        SpyLogger ® checks which of removable storage devices (CD/DVD or USB) were used on the computer and informs about every unauthorized access to our data.

      • Installation settings


        The remote keylogger gives the opportunity to prepare configuration at any computer, which is crucial when access to the monitored computer is very limited. The subsequent installation on the target device will take only about 30 seconds.

      • Antivirus program


        Due to the constant upgrading process, SpyLogger ® is invisible to antivirus programs.

      • Discretion


        SpyLogger ® is completely invisible to computer users. It uses only a fraction of system memory, has no icon or name, and leaves no traces behind.



        The spy software can be run in Windows XP, 2000, 2003, Vista, 7 and 8. An installation does not require administrator account but the monitoring works only on the account on which SpyLogger ® was installed. In case you need to monitor different accounts, you should install SpyLogger ® software for each account separately.


        USB DRIVE

        SpyLogger ® program is stored on a USB drive (8GB), which allows you to install, download, copy and delete data. You should remember that the device works automatically and should be removed from the USB port at the end of each process.

      • Warranty


        12 months warranty on remote keylogger with access to on-line update and repair service. USB drive is covered by a lifetime warranty.

On some computers running Windows XP, a sound card does not support the "What You Hear" function. In this case only one side of a conversation might be recorded. It does not apply to computers with "What You Hear" driver as well as Windows Vista, 7 and 8 systems.

Remote keylogger software instalation and configuration procedures

After connecting the USB drive to the computer the only thing to do is to run SpyLogger manager. It allows you to

  • Perform fast and easy installation, e.g. set the time interval between successive screenshots,
  • Configure target e-mail account,
  • Download data collected by SpyLogger ®,
  • Uninstall the program.

SpyLogger ® setup SpyLogger ® setup SpyLogger ® configuration SpyLogger® configuration E-mail options configuration E-mail options configuration

The amount of collected data is limited only by the SpyLogger ® memory. 8GB of memory is usually enough to collect data for about 200-240 days. It is advisable to copy SpyLogger data on a regular basis. If the mail service is enabled, the number of messages you can receive is limited by your e-mail account capacity. It is advisable to use google account because of its speed, stability, and the amount of free disc space.

Model keylog Model keylog spy software Model screenshot Model screenshot

Remote keylogger SpyLogger ® software is also available in Polish and German language version.

Product video

24 months24 months24 months24 months
lifetime warrantylifetime warrantylifetime warrantylifetime warranty
  • Remote keylogger for discreet PC surveillance - SpyLogger Classic ®
  • User manual


Spy Shop

Spy Shop is a company created for the needs of providing high class spy devices constructed for monitoring and protecting the property, protecting confidential information, anti-spy activities, supervision and many others. The target group of Spy Shop are as well individual...


24 months24 months24 months24 months
lifetime warrantylifetime warrantylifetime warrantylifetime warranty


  • Remote keylogger for discreet PC surveillance - SpyLogger Classic ®
  • User manual

Reviews (6)

By Jakub B.

Comment : I am waiting for version compatible with Windows 10!
Report abuse

By Ezra P.

Comment : Very handy product for discreet computer surveillance, I recommend
Report abuse

By Adam A.

Comment : I like the fact that you can set a key word and every time it is typed, a screenshot is sent to me. It helps me have control over my boyfriend who has cheated on me once.
Report abuse

By Amber T.

Comment : one word: discreet
Report abuse

By David W.

Comment : Versatile – take screenshots,captures keystrokes, monitors running applications – so many functions in so tiny thing
Report abuse

By Benjamin .

Comment : acquired a few to monitor my employees and this helps me to control their , efficiency
Report abuse