iSafe Remote Install Keylogger
is one of the stealthiest keyloggers
available which can be remotely installed to any remote target computer without needing the physical access to them in a totally stealthy mode.
iSafe Remote Install Keylogger has state-of-the-art breakthrough of spy technology which enables iSafe Keylogger agent to mask to a tremendously wide range of files such as Microsoft Office documents, Adobe PDF file, various kinds of game installation files, and any type of files you probably image. Due to this, you are likely to deploy it to target PCs convinently and stealthily.
FIRST remotely installable monitoring solutions
are designed to provide convenient access to the monitored PC from ANY LOCATION without physical access to remote PC!
Remote keylogger has a number of remotely capable spy and monitoring features
Keystroke Logging(Password Capturing)
Secretly monitor and record every keystroke typed with Remote Install Keylogger's highly advanced keylogger. Built to support any keyboard layout (English, Chinese, German, etc) as well as both 64 bit and 32 bit processors, the keystroke logger will never miss a keystroke or password typed.
Web Sites Visited (independent of types of Web Browser)
Remote keylogger includes a state of the art website logging engine that will record all website visited in ANY web browser (such as Google Chrome, Internet Explorer, FireFox, Opera and Safari). Remote Install Keylogger allows you to see exactly what websites the user visited, what browser (or program) used, how long they staying and more detailed informations you keen to know.
iSafe Remote Keylogger can monitor and log the websites visited and keystrokes typed even when people are in browsers' incognito mode.
Online Web Searches
Every web search performed by users of your computer is recorded. All major search engines are compatible, including Google, Bing and Yahoo. Remote Install Keylogger records the frequency of search phrases as well as the program used and the exact time the search query was conducted.
Files Downloaded / Uploaded
Every file downloaded from or uploaded to the web is logged and recorded. Remote Install Keylogger not only records files that are downloaded, but it shows you which program was used to download the file, the file size and the location of the downloaded file.
Every POP3 & SMTP e-mail sent or received on being monitored computer is recorded by Remote Install Keylogger. All relevant information for each e-mail is recorded, including: Sender, Recipient, Subject, Body, and any attachments.
This feature is Email Client independent and web mail type independent
Facebook chats/profile/password record
Remote keylogger keeps monitoring any facebook activity including facebook chats, friends' profile visited, photoes checked and so forth. Furthermore, it would monitor Facebook login password, facebook friend profile viewed and send these logs to you timely. What is more powerful feature is that it has the ability to log the chats that even has not been sent.
Its clipboard logger captures and records everything that is sent to the clipboard (excluding images)
At set intervals, Remote Install Keylogger will capture a high resolution screenshot of the users screen, allowing you to see exactly what the user of the computer is seeing. Screenshots can be viewed intuitively with the integrated On-Demand style screen shot by you in the Console terminal.
Capture & review all Chats and Instant Messages
Log both sides of all chat and instant message conversations for AOL/ICQ/MSN/AIM/Yahoo Instant Messengers/Facebook Messenger. Find out who your wife, child or lover is speaking with online
Voice-Activation Microphone Surveillance
Not like other keyloggers, Remote Keylogger can be used as an audio surveillance tool. It monitors and records sounds in your room via your computer microphone. This especially needed since you can monitor chats conversations made using the microphone and listen to any activity in your room. You can configure the keylogger to start recording only when the sound level is above a defined threshold, which is known as voice-activation recording software, so that disk space and time will be conserved by not wasting recording/listening time when nobody is actually talking. This feature is usually sold as a sole product.