|  | Perfect Keylogger - easy to use stealth solution               for PC and Internet surveillance. Discover the Truth               now!*includes               Remote Installation support! | 
         
                              
       Be One Step Ahead with our progressive PC Monitoring         and Spy Software!
       Full version with remote         monitoring support - $34.95 - Now supports         Windows Vista!
           
          Do you want to know what your buddy or co-workers are         doing online? Or perhaps you want to check up on your         children or spouse and know what they are doing on the         computer? With Perfect Keylogger it is possible in just 2         minutes! This program runs on the installed computer, fully         hidden from its users, and logs everything that is typed in         a protected file. Install Perfect Keylogger and take         total control of the PC!
          Perfect Keylogger is a new generation keylogger which is         absolutely undetectable. It was created as an         alternative to very expensive commercial products like         iSpyNow, Spector Keylogger or E-Blaster.         It has the same functionality, but is significantly easier         to use. Complex internal mechanisms are hidden from the         user behind the friendly interface. You can install         Keylogger and immediately use it without changing of its         settings.
          Perfect Keylogger is an extremely compact,         award-winning tool. It is translated into 20         languages and is increasingly popular around the world!         It lets you record all keystrokes, the time they were made         and the application where they were entered. It works in         the absolutely stealth mode. Stealth mode means         that no button or icon is present in the Task Bar, and no         process title is visible in the Task Manager list.
          Also, Perfect Keylogger can carry out visual         surveillance. It periodically makes screenshots in         invisible mode and stores the compressed images on the disk         so you can review them later.
          Our keylogger has unique remote installation         feature. You can attach keylogger to any other program and         send it by e-mail to install on the remote PC in the         stealth mode. Then it will send keystrokes, screenshots and         websites visited to you by e-mail or FTP. You don't have to         worry about the firewall alerts - now our keylogger can be         invisible for the firewall program. Our keylogger         supports remote installation, update and removal - no         physical access required!
          New Smart Rename feature lets you to rename all         keylogger's executable files and registry entries using one         keyword!
          One of the most powerful features of Perfect Keylogger         is its advanced Keyword Detection and Notification. Create         a list of "on alert" words or phrases and keylogger will         continually monitor keyboard typing, URLs and web pages for         these words or phrases. You tell Perfect Keylogger which         phrases to watch out for - for example, "sex," "porno",         "where do you live," "are your parents home," "is your wife         sleeping," "I hate my boss" - whatever you decide to         include. When a keyword is detected, Perfect Keylogger         makes screenshot and immediately sends email notification         to you.
          Perfect Keylogger was the first keylogging software         solution which can be absolutely invisible in the Windows         NT/2000/XP/Vista Task Manager!
          The program lets you easily view the log file,         displaying the title of the window (for example, title:         "John (Online) - Message Session" in ICQ), the date and         time of the action and the contents of the typed matter         itself.
          Unlike some other spy software products, Perfect         Keylogger does not send any information to our company.         Only you will receive the log files. We guarantee absolute         privacy, high quality product and technical support -         that's why we have a thousands of satisfied customers.
          You pay once, all updates are free. For example,         customers, who bought the first version in 2002, now can         get the advanced latest version for free! We are producing         the new versions very frequently, so you can be sure that         you always will have the most modern spy software!
          We have to tell you, that such a software is very         complex and only 2-3 products on the market, including         this, have a good quality to use them effectively. Do not         use a cheap or a free monitoring software! You can get an         important data leaks or the system crashes! We can         guarantee your system safety with our product.
          Perfect Keylogger available in three editions: full         version, basic edition and free lite version. Choose         the functionality you need.
           
          Comparison of the editions of the product:
           
                                  | Features | Full version | Basic edition | Lite edition | 
                         | Has an intuitive interface and very easy to use,             even for beginners |  |  |  | 
                         | Absolutely invisible mode |  |  | 
 | 
                         | Remote Installation / Update / Uninstallation |  | 
 | 
 | 
                         | Logs texts and passwords typed in the every             application, including popular instant messengers |  |  |  | 
                         | Supports virtually all input languages (Unicode             engine), including Japanese, Arabian, Thai, Chinese!             (v.1.65) |  | 
 | 
 | 
                         | Visual surveillance (screenshots) |  | 
 | 
 | 
                         | Slide show for screenshots |  | 
 | 
 | 
                         | Captures the passwords behind the asterisks |  | 
 | 
 | 
                         | Captures button clicks |  | 
 | 
 | 
                         | Captures screen information on every mouse             click |  | 
 | 
 | 
                         | Logs websites visited |  | 
 | 
 | 
                         | Captures ICQ, Miranda, Skype, Gooqle Talk, MSN,             AIM, AOL, Yahoo, QIP chats! |  | 
 | 
 | 
                         | Keyword Detection and Notification |  | 
 | 
 | 
                         | Records contents of password protected web pages,             including Web Mail messages (using our additional             software) |  |  | 
 | 
                         | Monitors Windows Clipboard |  | 
 | 
 | 
                         | Sends log by e-mail (in the stealth mode) |  |  | 
 | 
                         | Sends screenshots by e-mail (in the stealth             mode) |  | 
 | 
 | 
                         | Uploads ALL logs into the separate folders by FTP             (in the stealth mode)! |  | 
 | 
 | 
                         | Optional ZIP compression and password protection of             the log files before transferring by email or FTP |  | 
 | 
 | 
                         | Supports renaming of the keylogger's files and             registry entries |  | 
 | 
 | 
                         | Monitors computer activity only when user goes             online (option) |  | 
 | 
 | 
                         | Can be invisible for the firewall program |  | 
 | 
 | 
                         | Invisible in the Windows startup list |  | 
 | 
 | 
                         | Monitors all users of the PC, even if you             don't know their passwords |  | 
 | 
 | 
                         | User friendly HTML file format for emailed             logs |  | 
 | 
 | 
                         | Invisible in Windows NT/2000/XP/Vista Task Manager             and Windows 9.x/Me Task List |  |  |  | 
                         | Records Windows 9.x/Me logon passwords |  | 
 | 
 | 
                         | Records Windows 2000/XP logon passwords (using our             additional software) |  |  | 
 | 
                         | "Quick Install" - configure keylogger on your PC,             then just run it on another PC to install |  | 
 | 
 | 
                         | Intercepts DOS-box and Java-chat keystrokes |  |  | 
 | 
                         | Installation packet fits into 3.5" floppy |  |  |  | 
                         | Supports international keyboards |  |  |  | 
                         | External log viewer |  |  |  | 
                         | Supports printing of the log |  | 
 | 
 | 
                         | Optimized for Windows XP/Vista |  |  | 
 | 
                         |                  Strong encryption of the log file                |  |  |  | 
                         | Records keystrokes in the specified             applications |  |  |  | 
                         | Exports log to HTML |  |  |  | 
         
          
       More information is available in the Perfect Keylogger online documentation and FAQ.
          If you don't know, how to set it up - just contact us and we will         help you immediately!
          Attention: only full version         of the keylogger includes all functionality!
       What do you want to do?                  What to do after you have         keylogger installed? The next step is to ensure that nobody         is spying on you! Download our Personal Antispy         and don't worry that someone wathing you! Read more about Personal         Antispy...
          Perfect Keylogger Awards:
                  Some applications of the keylogger:
          - Monitoring children's activity for parents
- Stealth monitoring of your spouse
- Restore lost information
- Monitor which programs were opened and when
- Recall what you wrote some time ago
Perfect Keylogger runs on the installed computer, being         fully hidden from its users. It logs everything that the         user types in a protected file, makes screen captures,         monitors websites visited and captures copying to the         clipboard.
          You can order the full version here. Any         payment type!
           
          
          
        Now can be delivered on the CD-ROM!
          Screenshot of the CD-ROM shell
          
           
          Perfect Keylogger screenshots (click to         enlarge):
          Main menu and options window
          
        Viewing text log
          
        Viewing visual log
          
          Click here to view all         screenshots
        Supported platforms:
          Windows 95, NT4, 98, Me, 2000, XP, 2003, Vista;
          Minimal requirements:
          Pentium 100 / 16 MB RAM, Internet Explorer 5.0;
          Recommended:
          Windows 2000 or later, Internet Explorer 5.0 or         later.