DISCLAIMER:Logging other people's keystrokes or breaking into other people's computer without their permission can be considered illegal by the courts of many countries. The monitoring software reviewed here is ONLY for authorized system administrators and/or owners of computers. We assume no liability and are not responsible for any misuse or damage caused by the keylogging software. The end user of this software is obliged to obey all applicable local, state, federal and other laws in his country of residence.
Product name | OS | Net | Sec | Lng | Mon | Vis | Ctrl | Filt | Int | Total | Spytech SpyAgent Stealth Edition 6.20.08 Free licence! | 24 | 35 | 40 | 0 | 115 | 25 | 20 | 70 | 65 | 394 | 26 | 45 | 55 | 8 | 75 | 37 | 20 | 62 | 25 | 353 | 24 | 25 | 35 | 12 | 64 | 35 | 0 | 68 | 75 | 338 | 22 | 45 | 35 | 0 | 84 | 35 | 0 | 51 | 65 | 337 | 22 | 35 | 25 | 0 | 81 | 25 | 20 | 46 | 55 | 309 | 18 | 35 | 30 | 0 | 120 | 25 | 0 | 56 | 25 | 309 | 14 | 25 | 25 | 0 | 70 | 20 | 20 | 31 | 75 | 280 | 26 | 25 | 25 | 8 | 48 | 32 | 0 | 46 | 65 | 275 | 14 | 25 | 25 | 0 | 75 | 25 | 0 | 38 | 65 | 267 | 18 | 25 | 35 | 0 | 112 | 20 | 0 | 29 | 25 | 264 | WinSession Logger 3.9.5 Free licence! | 22 | 35 | 15 | 8 | 51 | 32 | 20 | 47 | 25 | 255 | 18 | 25 | 25 | 12 | 92 | 0 | 0 | 42 | 35 | 249 | 16 | 25 | 35 | 0 | 61 | 20 | 0 | 35 | 55 | 247 | 14 | 25 | 35 | 0 | 68 | 15 | 0 | 12 | 65 | 234 | 22 | 15 | 30 | 0 | 28 | 30 | 20 | 68 | 15 | 228 | 26 | 35 | 35 | 8 | 44 | 25 | 0 | 19 | 35 | 227 | 18 | 35 | 25 | 0 | 37 | 20 | 10 | 54 | 25 | 224 | 12 | 10 | 20 | 0 | 68 | 25 | 0 | 28 | 55 | 218 | 24 | 15 | 50 | 0 | 52 | 20 | 0 | 16 | 25 | 202 | 22 | 15 | 20 | 8 | 22 | 15 | 10 | 47 | 25 | 184 | 18 | 0 | 30 | 0 | 12 | 0 | 0 | 10 | 25 | 95 |
*Abbreviations from the table have the following meanings: OS - Scores for Operation Systems support (max 26) Net - Scores for log-file transferring options (max 45) Sec - Scores for security (max 60) Lng - Scores for interface language options (max 12) Mon - Scores for monitoring capabilities (max 165) Vis - Scores for visual surveillance options (max 42) Ctrl - Scores for computer use restriction options (max 20) Filt - Scores for data filtering options (max 85) Int - Scores for interception abilities (max 75)
Our Team was once among the first who carried out an independent comparison of the most popular monitoring software. The results made it possible to rate the functionality and applicability of world's leading programs that employ monitoring techniques. Today we are ready to represent another research, aimed at studying current situation in the world of commercial surveillance tools.The market of commercial monitoring software is huge. Software for pc surveillance is now common and very popular with many pc owners who want - and by all means have the right - to know how their computers are used. Monitoring software is most often applied for employee monitoring and parental control. Employers want to ensure that all their employees comply with corporate security policies. Parents want to protect kids online. It is now clear that information security concerns all of us, whether we like it or not. Surveillance software itself is rapidly evolving. These programs are becoming more and more sophisticated, not only in the aspects of stealthiness, but also in their functional arsenal. Modern computer monitoring software has a lot more functions and options compared to an average monitoring tool 10 years ago. Now it is a powerful surveillance tool that offers many options. A user can choose what information needs to be recorded, where it should be stored; it is even possible to perform visual surveillance on the monitored computer! While choosing the criteria we took into account many factors –surveillance software products currently available on the market, tendencies in monitoring software development, customers' requirements and our own experience in this aspect. We decided not to narrow the circle of possible options for testing but to make our review as comprehensive as possible. For better perception the criteria were divided into the following groups: - OS support
Since surveillance software for Macintosh and Linux operating systems is pretty less common, we tested only the products compatible with Windows operating systems. - Log transfer options
Sometimes it is impossible to gain access to the monitored PC every time you need to view the logged information and in this case it is absolutely important for monitoring software to be able to transmit log files to some specific location (email address, FTP server, etc.) - Security
Everyone understands that a surveillance software product must be invisible not only for the user supervised but also for specialized products that are developed to counteract monitoring (not only for anti-spyware tools but also for anti-viruses). This kind of software should have self-protecting mechanisms that would prevent loss of data even if a monitoring product has been detected. - Multi-language interface
English is the international language, you can say. But you'll definitely agree that it is always nice when a program has your native language in 'Language' section. - Monitoring capabilities
It's the essence of every monitoring program. Today it is possible to record not only 'simple' keystrokes, but file operations, visited web-sites, clipboard information, to monitor outgoing and incoming e-mails and the activity with computer peripherals, to capture mouse clicks, to intercept sound and many others. - Visual surveillance
It gradually becomes a standard for modern monitoring software. Forced by the competition, vendors now offer not only standard screenshots but also additional options (like on-mouse-click screenshots for example). - Parental control
Quite a new category of options for surveillance programs. In fact, it doesn't correspond to the main idea of any monitoring software – just to record users' actions. But it is very useful to have this thing as an option, especially for parents who are never indifferent to their children safe computer activity. - Filtering options
Facilitates working with a monitoring program. - Interception
People spend a lot of time communicating with each other (no matter if it is Internet or 'real' world). That is why these options are considered to be of great importance. And of course it is better when you can read both sides of chat conversations because it gives you a broad picture.
To sum it up, the main tendencies are that more than a half of tested monitoring programs support Windows Vista, screenshoting has become a standard option for such tools, and we think that the development of VoIP technologies will force all the vendors of monitoring software to include 'sound recording' option into the 'features' list of their products. Note: The aim of this research is not to discredit or promote any of the surveillance software, but to represent a comparison of effectiveness of popular shareware monitoring products available on the web today, to give a user an opportunity to choose the most suitable program and to help vendors improve their software. Latest keyloggers | Product name | Adding Date | XPC Spy Pro 3.24 | Apr 30, 2008 | Elite Keylogger 4.0.093 | Apr 25, 2008 | KGB Spy 4.55 | Apr 18, 2008 | Key Prowler Pro 3.2.4 | Apr 14, 2008 | Elite Keylogger 3.6.164 | Apr 11, 2008 |
Latest press-releases | Press-Release Name | Adding Date | Company Name | Stealth KeyLogger's developer also provides Business Monitoring Solutions. | Nov 14, 2007 | Amplusnet | Employee Monitoring Software Now Available Through DetectiveDominator.com | Sep 10, 2007 | DetectiveDominator.com | Stealth Keylogger 4.3 - New version released by Amplusnet | Nov 23, 2006 | Amplusnet | view all press-releases |
Latest articles | Article Name | Adding Date | Author | Panorama: Capturing System-wide Information Flow for Malware Detection and Analysis | Mar 28, 2008 | Heng Yin, Dawn Song, Manuel Egele, Christopher Kruegel, Engin Kirda | Anomaly-based Botnet Detection for 10 Gb/s Networks | Mar 28, 2008 | Jonathon W. Donaldson | Viral Threats – An Examination of Current and Evolving Technologies | Feb 06, 2008 | Antonio Martin | view all articles |
|