| Perfect Keylogger - easy to use stealth solution for PC and Internet surveillance. Discover the Truth now!*includes Remote Installation support! |
Be One Step Ahead with our progressive PC Monitoring and Spy Software!
Full version with remote monitoring support - $34.95 - Now supports Windows Vista!
Do you want to know what your buddy or co-workers are doing online? Or perhaps you want to check up on your children or spouse and know what they are doing on the computer? With Perfect Keylogger it is possible in just 2 minutes! This program runs on the installed computer, fully hidden from its users, and logs everything that is typed in a protected file. Install Perfect Keylogger and take total control of the PC!
Perfect Keylogger is a new generation keylogger which is absolutely undetectable. It was created as an alternative to very expensive commercial products like iSpyNow, Spector Keylogger or E-Blaster. It has the same functionality, but is significantly easier to use. Complex internal mechanisms are hidden from the user behind the friendly interface. You can install Keylogger and immediately use it without changing of its settings.
Perfect Keylogger is an extremely compact, award-winning tool. It is translated into 20 languages and is increasingly popular around the world! It lets you record all keystrokes, the time they were made and the application where they were entered. It works in the absolutely stealth mode. Stealth mode means that no button or icon is present in the Task Bar, and no process title is visible in the Task Manager list.
Also, Perfect Keylogger can carry out visual surveillance. It periodically makes screenshots in invisible mode and stores the compressed images on the disk so you can review them later.
Our keylogger has unique remote installation feature. You can attach keylogger to any other program and send it by e-mail to install on the remote PC in the stealth mode. Then it will send keystrokes, screenshots and websites visited to you by e-mail or FTP. You don't have to worry about the firewall alerts - now our keylogger can be invisible for the firewall program. Our keylogger supports remote installation, update and removal - no physical access required!
New Smart Rename feature lets you to rename all keylogger's executable files and registry entries using one keyword!
One of the most powerful features of Perfect Keylogger is its advanced Keyword Detection and Notification. Create a list of "on alert" words or phrases and keylogger will continually monitor keyboard typing, URLs and web pages for these words or phrases. You tell Perfect Keylogger which phrases to watch out for - for example, "sex," "porno", "where do you live," "are your parents home," "is your wife sleeping," "I hate my boss" - whatever you decide to include. When a keyword is detected, Perfect Keylogger makes screenshot and immediately sends email notification to you.
Perfect Keylogger was the first keylogging software solution which can be absolutely invisible in the Windows NT/2000/XP/Vista Task Manager!
The program lets you easily view the log file, displaying the title of the window (for example, title: "John (Online) - Message Session" in ICQ), the date and time of the action and the contents of the typed matter itself.
Unlike some other spy software products, Perfect Keylogger does not send any information to our company. Only you will receive the log files. We guarantee absolute privacy, high quality product and technical support - that's why we have a thousands of satisfied customers.
You pay once, all updates are free. For example, customers, who bought the first version in 2002, now can get the advanced latest version for free! We are producing the new versions very frequently, so you can be sure that you always will have the most modern spy software!
We have to tell you, that such a software is very complex and only 2-3 products on the market, including this, have a good quality to use them effectively. Do not use a cheap or a free monitoring software! You can get an important data leaks or the system crashes! We can guarantee your system safety with our product.
Perfect Keylogger available in three editions: full version, basic edition and free lite version. Choose the functionality you need.
Comparison of the editions of the product:
Features | Full version | Basic edition | Lite edition |
Has an intuitive interface and very easy to use, even for beginners | | | |
Absolutely invisible mode | | |
|
Remote Installation / Update / Uninstallation | |
|
|
Logs texts and passwords typed in the every application, including popular instant messengers | | | |
Supports virtually all input languages (Unicode engine), including Japanese, Arabian, Thai, Chinese! (v.1.65) | |
|
|
Visual surveillance (screenshots) | |
|
|
Slide show for screenshots | |
|
|
Captures the passwords behind the asterisks | |
|
|
Captures button clicks | |
|
|
Captures screen information on every mouse click | |
|
|
Logs websites visited | |
|
|
Captures ICQ, Miranda, Skype, Gooqle Talk, MSN, AIM, AOL, Yahoo, QIP chats! | |
|
|
Keyword Detection and Notification | |
|
|
Records contents of password protected web pages, including Web Mail messages (using our additional software) | | |
|
Monitors Windows Clipboard | |
|
|
Sends log by e-mail (in the stealth mode) | | |
|
Sends screenshots by e-mail (in the stealth mode) | |
|
|
Uploads ALL logs into the separate folders by FTP (in the stealth mode)! | |
|
|
Optional ZIP compression and password protection of the log files before transferring by email or FTP | |
|
|
Supports renaming of the keylogger's files and registry entries | |
|
|
Monitors computer activity only when user goes online (option) | |
|
|
Can be invisible for the firewall program | |
|
|
Invisible in the Windows startup list | |
|
|
Monitors all users of the PC, even if you don't know their passwords | |
|
|
User friendly HTML file format for emailed logs | |
|
|
Invisible in Windows NT/2000/XP/Vista Task Manager and Windows 9.x/Me Task List | | | |
Records Windows 9.x/Me logon passwords | |
|
|
Records Windows 2000/XP logon passwords (using our additional software) | | |
|
"Quick Install" - configure keylogger on your PC, then just run it on another PC to install | |
|
|
Intercepts DOS-box and Java-chat keystrokes | | |
|
Installation packet fits into 3.5" floppy | | | |
Supports international keyboards | | | |
External log viewer | | | |
Supports printing of the log | |
|
|
Optimized for Windows XP/Vista | | |
|
Strong encryption of the log file | | | |
Records keystrokes in the specified applications | | | |
Exports log to HTML | | | |
More information is available in the Perfect Keylogger online documentation and FAQ.
If you don't know, how to set it up - just contact us and we will help you immediately!
Attention: only full version of the keylogger includes all functionality!
What do you want to do? What to do after you have keylogger installed? The next step is to ensure that nobody is spying on you! Download our Personal Antispy and don't worry that someone wathing you! Read more about Personal Antispy...
Perfect Keylogger Awards:
Some applications of the keylogger:
- Monitoring children's activity for parents
- Stealth monitoring of your spouse
- Restore lost information
- Monitor which programs were opened and when
- Recall what you wrote some time ago
Perfect Keylogger runs on the installed computer, being fully hidden from its users. It logs everything that the user types in a protected file, makes screen captures, monitors websites visited and captures copying to the clipboard.
You can order the full version here. Any payment type!
Now can be delivered on the CD-ROM!
Screenshot of the CD-ROM shell
Perfect Keylogger screenshots (click to enlarge):
Main menu and options window
Viewing text log
Viewing visual log
Click here to view all screenshots
Supported platforms:
Windows 95, NT4, 98, Me, 2000, XP, 2003, Vista;
Minimal requirements:
Pentium 100 / 16 MB RAM, Internet Explorer 5.0;
Recommended:
Windows 2000 or later, Internet Explorer 5.0 or later.