REMOTE SPYING
Spy Software (Keyloggers) For Remote Deployment

SPYTECTOR

The most advanced and undetectable keylogger (key logger), Spytector is tracking and recording, in stealth mode, all activities of PC users (keystrokes, both sides of chat sessions, visited websites, applications, opened windows etc.). The log files can be delivered to you via Email or FTP (or you can retrieve them locally). Spytector keylogger can monitor, record and restrict the computer activity in total stealth. Spytector keylogger can be easily remotely deployed, its size is around 100 KB (no other keylogger with the same functionality can be so small).

Spytector server can monitor, record and restrict the PC activity in total stealth, being undetectable even for advanced users.

The trial version of Spytector is detected by few antivirus applications, even if it is a commercial legitimate keylogger. Our customers must be able to use Spytector on their computers in the same time with other security applications, so the version they receive (the full version) will be undetected for all the well known antivirus products (Norton, Kaspersky, McAfee, Panda, AVG, BitDefender, F-Secure, TrendMicro).

General Features
  • multi-language interface
  • built-in log viewer utility (the logs can be viewed in a specially designed window included in Spytector, the Log Viewer; the different log sections are colored, so the user can easily see the PC activity; for later viewing the logs can be saved as RTF and HTML)
  • option to save the settings
  • skinnable interface
  • editable keylogger server name, log name, log size, startup key name
  • all the keylogger server features are editable from the main application
  • local logfile retrieving
Monitoring Features
  • passwords
  • keystrokes
  • websites
  • applications
  • both sides of chat (AIM, ICQ, MSN, Yahoo)
  • boot events
  • keylogger filter (only specific websites/windows are tracked)
  • clipboard monitoring
Security Features
  • totally invisible and undetectable keylogger server
  • advanced firewall bypass techniques (the keylogger is undetectable by local firewalls)
  • local encrypted logfiles
  • optional encryption for delivered logs
  • stealth log delivery (using the default browser or default emailer)
  • encrypted keylogger server settings
  • the keylogger can disable the System Restore feature
  • the keylogger can restrict the access to specified websites
  • the keylogger can restrict the access to specified applications
  • keylogger server overwriting protection
  • password protected configuration
  • password protected uninstallation for the main application
  • keylogger server protection against uninstallation
Server Features
  • FTP and Email log delivery
  • remotely deployable
  • option to include Protected Storage passwords in the log
  • option to include FireFox passwords in the log
  • option to include URL history in the log
  • the logs can be received either when they reached a minimum size or at specified day intervals
  • the keylogger server works even on Guest account (2k, XP, 2003, Vista, Windows 7)
  • both small and large icons of the server can be changed
  • editable keylogger server name, log name, log size, startup key name
  • smart keylogger (BACKSPACE is applied)
  • melting option
  • warning message option
  • option to uninstall the keylogger server after a specifed number of sent logs
  • option to uninstall the keylogger server with a specified hotkey
  • option to uninstall the keylogger server by checking HTTP
© 2003-2017 Remote-Spying