Sunday, December 16, 2012

Perfect Keylogger

 Perfect Keylogger is a new generation keylogger which is absolutely undetectable. Complex internal mechanisms are hidden from the user behind the friendly interface. Perfect Keylogger is translated into 20 languages and is increasingly popular around the world! It lets you record all keystrokes, the time they were made and the application where they were entered. It works in the absolutely stealth mode. Stealth mode means that no button or icon is present in the Task Bar, and no process title is visible in the Task Manager list. Also, Perfect Keylogger can carry out visual surveillance. It periodically makes screenshots in invisible mode and stores the compressed images on the disk so you can review them later.
Perfect Keylogger has unique remote installation feature. You can attach keylogger to any other program and send it by e-mail to install on the remote PC in the stealth mode. Then it will send keystrokes, screenshots and websites visited to you by e-mail or FTP. 
You don't have to worry about the firewall alerts - now our keylogger can be invisible for the firewall program. Our keylogger supports remote installation, update and removal - no physical access required!
New Smart Rename feature lets you to rename all keylogger's executable files and registry entries using one keyword! One of the most powerful features of Perfect Keylogger is its advanced Keyword Detection and Notification. Create a list of "on alert" words or phrases and keylogger will continually monitor keyboard typing,URLs and web pages for these words or phrases.
Features: 
• Has an intuitive interface and very easy to use, even for beginners   
• Absolutely invisible mode    
• Remote Installation / Update / Uninstallation     
• Logs texts and passwords typed in the every application, including popular instant messengers   
• Supports virtually all input languages (Unicode engine), including Japanese, Arabian, Thai, Chinese! (v.1.65)     
• Visual surveillance (screenshots)     
• Slide show for screenshots     
• Captures the passwords behind the asterisks     
• Captures button clicks     
• Captures screen information on every mouse click     
• Logs websites visited     
• Captures ICQ, Miranda, Skype, Gooqle Talk, MSN, AIM, AOL, Yahoo, QIP chats!     
• Keyword Detection and Notification     
• Records contents of password protected web pages, including Web Mail messages (using our additional software)    
• Monitors Windows Clipboard     
• Sends log by e-mail (in the stealth mode)    
• Sends screenshots by e-mail (in the stealth mode)     
• Uploads ALL logs into the separate folders by FTP (in the stealth mode)!     
• Supports renaming of the keylogger's files and registry entries     
• Monitors computer activity only when user goes online (option)     
• Can be invisible for the firewall program     
• Invisible in the Windows startup list     
• Monitors all users of the PC, even if you don't know their passwords     
• User friendly HTML file format for emailed logs     
• Invisible in Windows NT/2000/XP/Vista Task Manager and Windows 9.x/Me Task List   
• Records Windows 9.x/Me logon passwords     
• Records Windows 2000/XP logon passwords (using our additional software)    
• "Quick Install" - configure keylogger on your PC, then just run it on another PC to install     
• Intercepts DOS-box and Java-chat keystrokes    
• Installation packet fits into 3.5" floppy   
• Supports international keyboards   
• External log viewer   
• Supports printing of the log     
• Optimized for Windows XP/Vista    
• Strong encryption of the log file   
• Records keystrokes in the specified applications   
• Exports log to HTML
Perfect Keylogger for Windows 98/2000/XP/Vista and Windows 7

1 comment:

  1. Great piece of writing! I am agree with the writer's way of thinking.
    The loss of files often takes an individual to some feeling of disappointment.
    A range of file recovery apps have been launched by the professionals, to make certain that a person will quickly recover their missed information.
    If there is a loss of data condition, a person should have a knowledge of suited data files retrieval tool.
    usb recovery software

    ReplyDelete