Keylogger (by. Keylogger.org)

DISCLAIMER: Logging other people's keystrokes or breaking into other people's computer without their permission can be considered illegal by the courts of many countries. The monitoring software reviewed here is ONLY for authorized system administrators and/or owners of computers. We assume no liability and are not responsible for any misuse or damage caused by the keylogging software. The end user of this software is obliged to obey all applicable local, state, federal and other laws in his country of residence.


Product name OS Net Sec Lng Mon Vis Ctrl Filt Int Total
24 35 40 0 115 25 20 70 65 394
26 45 55 8 75 37 20 62 25 353
24 25 35 12 64 35 0 68 75 338
22 45 35 0 84 35 0 51 65 337
22 35 25 0 81 25 20 46 55 309
18 35 30 0 120 25 0 56 25 309
14 25 25 0 70 20 20 31 75 280
26 25 25 8 48 32 0 46 65 275
14 25 25 0 75 25 0 38 65 267
18 25 35 0 112 20 0 29 25 264
22 35 15 8 51 32 20 47 25 255
18 25 25 12 92 0 0 42 35 249
16 25 35 0 61 20 0 35 55 247
14 25 35 0 68 15 0 12 65 234
22 15 30 0 28 30 20 68 15 228
26 35 35 8 44 25 0 19 35 227
18 35 25 0 37 20 10 54 25 224
12 10 20 0 68 25 0 28 55 218
24 15 50 0 52 20 0 16 25 202
22 15 20 8 22 15 10 47 25 184
18 0 30 0 12 0 0 10 25 95

*Abbreviations from the table have the following meanings:

OS - Scores for Operation Systems support (max 26)

Net - Scores for log-file transferring options (max 45)

Sec - Scores for security (max 60)

Lng - Scores for interface language options (max 12)

Mon - Scores for monitoring capabilities (max 165)

Vis - Scores for visual surveillance options (max 42)

Ctrl - Scores for computer use restriction options (max 20)

Filt - Scores for data filtering options (max 85)

Int - Scores for interception abilities (max 75)


Our Team was once among the first who carried out an independent comparison of the most popular monitoring software. The results made it possible to rate the functionality and applicability of world's leading programs that employ monitoring techniques. Today we are ready to represent another research, aimed at studying current situation in the world of commercial surveillance tools.

The market of commercial monitoring software is huge. Software for pc surveillance is now common and very popular with many pc owners who want - and by all means have the right - to know how their computers are used. Monitoring software is most often applied for employee monitoring and parental control. Employers want to ensure that all their employees comply with corporate security policies. Parents want to protect kids online. It is now clear that information security concerns all of us, whether we like it or not.

Surveillance software itself is rapidly evolving. These programs are becoming more and more sophisticated, not only in the aspects of stealthiness, but also in their functional arsenal. Modern computer monitoring software has a lot more functions and options compared to an average monitoring tool 10 years ago. Now it is a powerful surveillance tool that offers many options. A user can choose what information needs to be recorded, where it should be stored; it is even possible to perform visual surveillance on the monitored computer!

While choosing the criteria we took into account many factors –surveillance software products currently available on the market, tendencies in monitoring software development, customers' requirements and our own experience in this aspect. We decided not to narrow the circle of possible options for testing but to make our review as comprehensive as possible. For better perception the criteria were divided into the following groups:

  • OS support
    Since surveillance software for Macintosh and Linux operating systems is pretty less common, we tested only the products compatible with Windows operating systems.
  • Log transfer options
    Sometimes it is impossible to gain access to the monitored PC every time you need to view the logged information and in this case it is absolutely important for monitoring software to be able to transmit log files to some specific location (email address, FTP server, etc.)
  • Security
    Everyone understands that a surveillance software product must be invisible not only for the user supervised but also for specialized products that are developed to counteract monitoring (not only for anti-spyware tools but also for anti-viruses). This kind of software should have self-protecting mechanisms that would prevent loss of data even if a monitoring product has been detected.
  • Multi-language interface
    English is the international language, you can say. But you'll definitely agree that it is always nice when a program has your native language in 'Language' section.
  • Monitoring capabilities
    It's the essence of every monitoring program. Today it is possible to record not only 'simple' keystrokes, but file operations, visited web-sites, clipboard information, to monitor outgoing and incoming e-mails and the activity with computer peripherals, to capture mouse clicks, to intercept sound and many others.
  • Visual surveillance
    It gradually becomes a standard for modern monitoring software. Forced by the competition, vendors now offer not only standard screenshots but also additional options (like on-mouse-click screenshots for example).
  • Parental control
    Quite a new category of options for surveillance programs. In fact, it doesn't correspond to the main idea of any monitoring software – just to record users' actions. But it is very useful to have this thing as an option, especially for parents who are never indifferent to their children safe computer activity.
  • Filtering options
    Facilitates working with a monitoring program.
  • Interception
    People spend a lot of time communicating with each other (no matter if it is Internet or 'real' world). That is why these options are considered to be of great importance. And of course it is better when you can read both sides of chat conversations because it gives you a broad picture.

To sum it up, the main tendencies are that more than a half of tested monitoring programs support Windows Vista, screenshoting has become a standard option for such tools, and we think that the development of VoIP technologies will force all the vendors of monitoring software to include 'sound recording' option into the 'features' list of their products.

Note: The aim of this research is not to discredit or promote any of the surveillance software, but to represent a comparison of effectiveness of popular shareware monitoring products available on the web today, to give a user an opportunity to choose the most suitable program and to help vendors improve their software.


Latest keyloggers
Product name Adding Date    
XPC Spy Pro 3.24 Apr 30, 2008    
Elite Keylogger 4.0.093 Apr 25, 2008    
KGB Spy 4.55 Apr 18, 2008    
Key Prowler Pro 3.2.4 Apr 14, 2008    
Elite Keylogger 3.6.164 Apr 11, 2008    

Latest press-releases
Press-Release Name Adding Date Company Name
Stealth KeyLogger's developer also provides Business Monitoring Solutions. Nov 14, 2007 Amplusnet
Employee Monitoring Software Now Available Through DetectiveDominator.com Sep 10, 2007 DetectiveDominator.com
Stealth Keylogger 4.3 - New version released by Amplusnet Nov 23, 2006 Amplusnet
view all press-releases

Latest articles
Article Name Adding Date Author
Panorama: Capturing System-wide Information Flow for Malware Detection and Analysis Mar 28, 2008 Heng Yin, Dawn Song, Manuel Egele, Christopher Kruegel, Engin Kirda
Anomaly-based Botnet Detection for 10 Gb/s Networks Mar 28, 2008 Jonathon W. Donaldson
Viral Threats – An Examination of Current and Evolving Technologies Feb 06, 2008 Antonio Martin
view all articles


<<

Copyright (c) 2000 - 3000 by Ing. Eduardo Palena - Napolifirewall.com