Government Security
Network Security Resources

Jump to content

Photo

How To Use Keylogger To Monitor And Log The Activity On Your Pc


  • Please log in to reply
5 replies to this topic

#1 hellendy

hellendy

    Private

  • Members
  • 1 posts

Posted 26 August 2010 - 02:23 AM

About Keyloggers
The term ‘keylogger’ itself is neutral, and the word describes the program’s function. Most sources define a keylogger as a software program designed to secretly monitor and log all keystrokes. This definition is not altogether correct, since a keylogger doesn’t have to be software – it can also be a device. Keylogging devices are much rarer than keylogging software, but it is important to keep their existence in mind when thinking about information security.
Legitimate programs may have a keylogging function which can be used to call certain program functions using “hotkeys,” or to toggle between keyboard layouts. There is a lot of legitimate software which is designed to allow administrators to track what employees do throughout the day, or to allow users to track the activity of third parties on their computers. However, the ethical boundary between justified monitoring and espionage is a fine line. Legitimate software is often used deliberately to steal confidential user information such as passwords.
What keylogger software could do
Most modern keyloggers are considered to be legitimate software or hardware and are sold on the open market. Developers and vendors offer a long list of cases in which it would be legal and appropriate to use keyloggers, including:
Parental control: parents can track what their children do on the Internet, and can opt to be notified if there are any attempts to access websites containing adult or otherwise inappropriate content;
I think this is the main and important function of Keylogger. As far as we know that the importance of the Internet is enormous in this day and age and as well as being a centre for learning and communication, it is also a centre for entertainment. However, unchecked usage of the Internet, especially by children, can lead to dire consequences and many families have found out the hard way. Keylogger software provides the ultimate solution for computer surveillance, something that any home should have. However, choosing the right program is a decision not to be taken lightly.
If children are allowed completely unrestricted access to the family computer with no monitoring, they can quickly, and easily, find themselves in situations that they simply are not equipped to handle. Online chat rooms and instant messaging are prime examples of mediums that can cause trouble. This is because there are many unscrupulous users out there with malicious intentions, such as older individuals posing as someone else with the intention of luring younger children out of home. These inappropriate relationships can easily go unnoticed by parents who don't have any form of computer surveillance installed on their family computers.
Teenagers can also get themselves into trouble on the Internet such as by downloading illegal music or movies and then getting discovered. Sometimes they may be posting inappropriate pictures of themselves which could later lead to problems in the future when they get found out.
Children and teenagers are not the only people at risk on the Internet, however. Using keylogger software, you can also monitor your spouse, which is a highly effective way of seeing what they are getting up to on the computer when you are not around.
Company security: tracking the use of computers for non-work-related purposes, or the use of workstations after hours; and using keyloggers to track the input of key words and phrases associated with commercial information which could damage the company if disclosed;
Other security: using keylogger records to analyze and track incidents linked to the use of personal computers;
What is the best Keylogger?
Ecodsoft Keylogger is very powerful monitoring software which could record and log all the computer activity. This keylogger software works on any Windows-based computer and most importantly, it runs completely invisibly so no one except for the computer's owner needs to know that it is running. This means that users will not be able to hide their activities or tamper with the software in any way. When the software has been installed, it will record every single keystroke made. It will log all the web history and track all the applications that are being used. It will also take screenshots as frequently as specified; giving you a very thorough visual history of what your computer is being used for when you are not present. The program also has a password protection feature, providing a second line of defense just in case someone finds out that keylogger software is monitoring them. Additionally, the software automatically activates itself when Windows starts and is not shown in Task bar, Task Manager, Uninstall List, and System tray (Runs in complete stealth). All user procession is easy and convenient.
You can get more information about this software, please visit: http://www.ecodsoft.com
Firstly, you need to download and install this software.
The first run this software, you need to set the password used to unhide Ecodsoft Keylogger. And please keep the password in mind.
If you want to see the software, you may press hotkey - "Ctrl+Shift+Alt+Z" to show the Ecodsoft keylogger main window.
Please enter your password just set in the beginning.
Posted Image
Click “Status” button
It shows what programs could be monitored by Ecodsoft Keylogger, such as: Keyboard, Screenshot, Websites, Clipboard, CD-Rom, MSN Chat, Yahoo, Skype, Facebook and Twitter ect.
Click "Setting" button.
It will enable screenshots to be sent through email. And you can set the e-mail account used to save logs and how frequently let it send logs to you in "Email and password" configuration tab. You can also send a test email.
Click "Screenshot" button
You can view both sides of a chat conversation by setting Ecodsoft Keylogger's screenshot "Capture Interval" (The minimum time is 1 minute), "Capture Scale" and "Capture Quality".
And you also can set several "Trigger" words or phrases in "Smart Sense Capture Setting" column. Whenever these words are typed Ecodsoft Keylogger will capture the current screen and save it to log instantly.
Click" Log" button.
Select a specific day of log and then click "View Log" button to view or manage the according log
For example, Select "April 15th", and Click "View Log" button.
Then it will start "Ecodsoft Log Manager".
You could select the Start date and the End date and click the "Generate Log" button.
The logs will list in the log-tree-list and you can view the logs on specific date or time span.

That’s all! If you have any issue, feature request or suggestion, please visit the Ecodsoft Studio website: http://www.ecodsoft.com. Or you can send us emails for questions directly at: support@ecodsoft.com





#2 shirly

shirly

    Private

  • Members
  • 1 posts

Posted 15 November 2011 - 10:59 PM

About Keyloggers
The term ‘keylogger’ itself is neutral, and the word describes the program’s function. Most sources define a keylogger as a software program designed to secretly monitor and log all keystrokes. This definition is not altogether correct, since a keylogger doesn’t have to be software – it can also be a device. Keylogging devices are much rarer than keylogging software, but it is important to keep their existence in mind when thinking about information security.
Legitimate programs may have a keylogging function which can be used to call certain program functions using “hotkeys,” or to toggle between keyboard layouts. There is a lot of legitimate software which is designed to allow administrators to track what employees do throughout the day, or to allow users to track the activity of third parties on their computers. However, the ethical boundary between justified monitoring and espionage is a fine line. Legitimate software is often used deliberately to steal confidential user information such as passwords.
What keylogger software could do
Most modern keyloggers are considered to be legitimate software or hardware and are sold on the open market. Developers and vendors offer a long list of cases in which it would be legal and appropriate to use keyloggers, including:
Parental control: parents can track what their children do on the Internet, and can opt to be notified if there are any attempts to access websites containing adult or otherwise inappropriate content;
I think this is the main and important function of Keylogger. As far as we know that the importance of the Internet is enormous in this day and age and as well as being a centre for learning and communication, it is also a centre for entertainment. However, unchecked usage of the Internet, especially by children, can lead to dire consequences and many families have found out the hard way. Keylogger software provides the ultimate solution for computer surveillance, something that any home should have. However, choosing the right program is a decision not to be taken lightly.

Thanks for sharing, I learn more about keylogger from you.

#3 infiltrator

infiltrator

    Staff Sergeant

  • Sergeant Major
  • 421 posts

Posted 25 November 2011 - 04:19 AM

Keyloggers are only as effective as long as they remain FUD by an Antvirus.

#4 vkuz

vkuz

    Private

  • Members
  • 1 posts

Posted 12 January 2012 - 05:11 AM

There are many kind of keylogger software and all have different features.
I used LightLogger Keylogger this one can monitoring all things


LightLogger is "light" yet full-featured monitoring software:
Keystroke Monitoring
Capture all the text users type while using your computer. LightLogger's main feature is keystroke logging, which it accomplishes anywhere text is typed. From PC programs to web applications and even to Windows login fields, LightLogger captures all keystrokes and associates them with the applications in which they are typed. GMail, ICQ, MSN, Yahoo, AIM, Skype, e-mail clients, and PC programs are all monitored.
Website Monitoring
Track the web browsing of other users on your computer. LightLogger records all websites visited and their URLs. And LightLogger's website monitoring works with most browsers, including Mozilla Firefox, Internet Explorer, and Opera.
Clipboard Monitoring
Monitor text pasted into other Windows applications. LightLogger records all text cut, copied, and pasted with Windows clipboard.
Screen Captures
View the contents users see on your PC's monitor. Configure LightLogger to make screen captures at intervals you choose and save them in a customizable file size to conserve space if necessary.
Application Monitoring
Users of your PC can make critical changes to your system, data, or files using Windows tools and other programs. LightLogger can monitor and list all the applications opened and run on your PC, providing a record of changes made and processes run by other users.
Stealth Mode
Generally you will want LightLogger to operate unseen and undetected by other users. Using stealth mode makes LightLogger invisible to most computer users by removing it from the Windows task manager, start menu, desktop, and system tray.
Multi-language support
LightLogger captures keystrokes in any language. In addition, you can select LightLogger's interface language by choosing from English, Italian, French, Dutch, Spanish, or Portuguese. Simply click the language of your choice whenever LightLogger's administrative panel is open.
Windows 7, Vista, XP Support
You can install LightLogger on any recent Microsoft Windows operating system. LightLogger runs on a variety of Windows systems and service packs, including Microsoft Windows 7, Microsoft Windows Vista SP1 or SP2 Business/Home Premium/Ultimate, and Microsoft Windows XP SP2 or SP3 Home/Professional. And now LightLogger's beta version 3.0.8 operates on 64-bit versions of all these platforms.
HeavenWardSoft
-------------------------------
Keylogger

#5 Forensics1

Forensics1

    Private

  • Members
  • 1 posts

Posted 25 January 2012 - 10:14 PM

If I hear one more person poist the argument about "Parental Controls" when it comes to Spyware and Lieware I am going to hurl all over your website. If that was really what you were doing you would have all sorts of safeguards set up to monitor the use of your program so that you could uninstall it unless it was being used for Parental controls.Then you have the audacity to enage in a long diatribe about how important it is to protect your kids when in reality you don't give a damn about all of that, you just want to make money. Not taht there is anything wrong with making money, it is the insincerity of the message and the idea that you think we are all going to fall for that alibi you want us to buy. Just move beyond the BS and get on with the product features and benefits. We all know what you are doing.

#6 Celinna

Celinna

    Private

  • Members
  • 2 posts

Posted 27 June 2012 - 06:41 PM

To monitor and log the activity on a pc, you may have a try pc remote monitoring. It can record everything on you comp remotely and invisibly.
Good luck to you
mac keylogger
mac spy




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users