Every day we offer FREE licensed software you’d have to buy otherwise.

Ultimate Keylogger 1.60 Giveaway
$24.46
EXPIRED

Giveaway of the day — Ultimate Keylogger 1.60

Ultimate Keylogger is a software that monitors all activities on computer systems and sends encrypted activity reports invisibly via Email, FTP or network.
$24.46 EXPIRED
User rating: 180 45 comments

Ultimate Keylogger 1.60 was available as a giveaway on February 10, 2010!

Today Giveaway of the Day
$22.99
free today
An AI-powered object remover for videos and images.

Ultimate Keylogger is popular all-round monitoring solution. It monitors all activities on computer systems including applications, keyboard, passwords, clipboard, chat, email, and visited websites. To avoid tampering of the software, it features a unique file protection.

Ultimate Keylogger is completely undetectable. During monitoring sessions it will not be listed in the task manager. All application program files are hidden and are not visible in Windows Explorer. The software can be installed in less than five minutes and runs maintenance free. Ultimate Keylogger displays reports in web format or sends zip-compressed and encrypted activity reports invisibly via E-mail, FTP or Local Network.

Ultimate Keylogger has a Password Protected interface and hot-key combination for accessing the application. All recorded information is stored in an encrypted log files.

System Requirements:

Windows 95/98/98SE/ME/NT/2000/XP/2003/Vista/7

Publisher:

KRyLack Software

Homepage:

http://www.ultimatekeylogger.com

File Size:

3.48 MB

Price:

$24.46

Comments on Ultimate Keylogger 1.60

Thank you for voting!
Please add a comment explaining the reason behind your vote.
#45

I kind of sense this ultimate key logger is one leg of a spyware tool. It maybe handy, once you want to find out what kind of stuff your wife ore husband or kids are doing, but outbound connection to the developer’s website is out of the question. Seems to me it's the developers additional tip for the software which is charged anyway.

Reply   |   Comment by PC diagnostics  –  12 years ago  –  Did you find this comment useful? yes | no (0)
#44

Oh My Goodness!! This software is HORRIBLE!! Do not install it, not now or EVER!!

I have Microsoft Vista and I got the blue screen of death at least 8 times.

After installing this software, my system would freeze and I could not access my Windows Explorer files, could not surf the web or do much of anything.

I believe this software was sending my personal info back to the developers, however, I cannot prove this. What I can prove is that this software almost KILLED my laptop.

I ran Norton Anti-Virus - It did not detect this software
I ran Microsoft Windows Defender - It too did not detect this software

It runs in stealth mode, so you cannot even see it in the task bar or amongst your computer services. This software is very WICKED!!

Do not install it.... EVER..... Unless you want lots of issues.

I finally uninstalled it and my computer returned back to normal. Thank God. As for the Ultimate KeyLogger... It is the ultimate thief that kills your computer.

All of these comments are my two cents .... ok..... 5 cents.

-tranessa

Reply   |   Comment by Tranessa Johnson  –  14 years ago  –  Did you find this comment useful? yes | no (+3)
#43

Ultimate Keylogger path in Vista = C:\ProgramData\uklpr\wmpusrvc.exe

There is also a remove program in the uklpr folder = C:\ProgramData\uklpr\unukl.exe

The program needs to be run as an administrator to be able to start in vista. If it does not it will give you an error at startup and not run. You can right click on the program and run as administrator or change the properties to always start as administrator. If it is calling back home I would recommend removing it.

Reply   |   Comment by Danny  –  14 years ago  –  Did you find this comment useful? yes | no (+2)
#42

@Yahya #41

"- A single user needs to record accurately the time spent so as to document work done for hire." You don't need keylogger for that. You can use project timing tool. Much more accurate than the keylog for a keylogger.

"- A business needs to ensure that its resources are not being used to perform illegal acts, including workplace bullying, fraud and misappropriation." You don't need a keylogger for that too. In fact, a keylogger may cause your business security breach. You can easily monitor emails and IM messages with the proper network filters, firewall, and activity logs.

"- A business needs to ensure that people are not ripping it off by stealing company time for non-company activity." You don't need a keylogger for that too! Proper project/time planning and assignment will assure you that your employees will finish the job within the expected planned time. Even if they don't work 100% of the office time, they would sure need to make up for lost time during their personal time to make the deadline.

In other words, the only reason you would need a keylogger is for spying on a computer user. Period.

Of course, there are instances when "spying" is required - for example, when you suspect an employee is transmitting encrypted company secrets. Sure, it's your choice but know that there are various other less intrusive tools for most jobs. Keylogger is a last resort tool. So unless you specifically need to spy on someone, don't install it.

Reply   |   Comment by Universal Cynic  –  14 years ago  –  Did you find this comment useful? yes | no (0)
#41

Hello Giveaway of the Day, @#40

I'm afraid that is not good enough.
Keylogger should show itself with Hot key combination of
Ctrl + shift + alt + s, if user had not changed the hot key, but it didn't show up to my screen at all. I'm using Vista, and after I installed this program Vista updates itself like crazy.

Keylogger is not show its icon in right corner toolbar any more. Since user cannot see or call up the program it is very hard to uninstall this program. I'm not sure antivirals or firewall is preventing the program now, but I'm afraid many users might be experiencing same type of problems regarding this program.

Reply   |   Comment by jugem  –  14 years ago  –  Did you find this comment useful? yes | no (+3)
#40

@Ashraf (#1):

Let me say I deplore the mindless "Let's jump on Ashraf because he appears to be endorsing a keylogger" mindset that sees your comment's usefulness score approach -100! You quickly and clearly summarise today's GOTD software's pros and cons - and what could be more useful than that?

Particular thanks for pointing out that this software allows you to inform users that you are monitoring their activity; that it fails to track visited URLs with IE8; and that it lets the developer snoop while you log activity.

----------------------

@BuBBy (#2):
I admire your style!

Thanks for taking positive steps so that users can see keyloggers for what they are: tools that can be used to do something worthwhile, or abused to do others harm; all depending on the tool user's motives and behaviour.

Thanks also for showing us ways to defend ourselves against the very real threat of software abuse. People need to remember that not only keyloggers, but even the most innocuous-seeming software, e.g. search engines, can be turned as weapons against their users.

----------------------

@ everyone:

Keyloggers are useful programs in the following situations:
- A single user needs to record accurately the time spent so as to document work done for hire.

- A business needs to ensure that its resources are not being used to perform illegal acts, including workplace bullying, fraud and misappropriation.
- A business needs to ensure that people are not ripping it off by stealing company time for non-company activity.

Yeah, I know, many "users" think that last one's a joke; so if you do, just answer this: Once you start stealing from an employer, where will you stop?

----------------------

I can't finish with a better comment than to repeat what BuBBy wrote:

"Remember that the incidence of identity theft has never been higher – and online crime is costing more every day. Regardless of your intentions, there are those who will do whatever they can to take advantage of others."

Reply   |   Comment by Yahya  –  14 years ago  –  Did you find this comment useful? yes | no (0)
#39

Hello!

For those who see no way to remove program there is an "Uninstall" button in the software's main window on the right.

Due to the program specific it is not added to the usual Windows programs installed.

Regards,
Giveaway of the Day project team

Reply   |   Comment by Giveaway of the Day project team  –  14 years ago  –  Did you find this comment useful? yes | no (+1)
#38

how to uninstall this program? it is in my system, I know it.

Reply   |   Comment by jugem  –  14 years ago  –  Did you find this comment useful? yes | no (0)
#37

Install dont work, apparently an outside connection is needed at first and it dont work !

Reply   |   Comment by PP  –  14 years ago  –  Did you find this comment useful? yes | no (0)
#36

How to uninstall it ?????

Reply   |   Comment by Kc  –  14 years ago  –  Did you find this comment useful? yes | no (0)
#35

Avira and AVG both pick up the INSTALLER file as containing a program known to "hide files" and "make unrequested connections" to off-site servers. Figure that one.

Reply   |   Comment by lostinlodos  –  14 years ago  –  Did you find this comment useful? yes | no (+3)
#34

Paranoia Will Destroy Ya...

http://www.virustotal.com/analisis/feffee19605b0e8d39e20915f9b3e8a83c0b6ceeac39706ccd05804d2d3d4bec-1265820144

Regards - Damian

Reply   |   Comment by rezidue  –  14 years ago  –  Did you find this comment useful? yes | no (0)
#33

Ok. Here's the dangerous thing about having your keylogger on: It records all your keystrokes including passwords and bank accounts. What happen if your laptop is stolen? Or your PC's hacked into? If the thief knows about the keylogger and how to compare time in your browser log, for example, they can easily find from the key log the password you use. So let's say the keylogger refrains from recording password fields. Surely once or twice you may have written a password somewhere in a text file and then delete it. The key log can help the thief make intelligent guesses of what's your password. You may have mistyped the password in the username field, for example. It's logged.

Let's also say you wrote a confidential e-mail and encrypt it. The keylogger logs it. You already removed all traces of it from your harddisk (you can run some data shredded) but you forgot about the keylogger (it's hidden, right?).

Imagine this very likely scenario: They keylogger is not malicious. You installed it because you want it to log your keystrokes as well as to monitor your children (spying is spying... that's still morally wrong). But, while using the PC unmonitored by you (because you had the keylogger, you let your children roam free), the kid accidentally installed from an email a malicious app that knows how to read the log of the keylogger and send it to the hacker. You're screwed.

Having a keylogger running is a security nightmare! If all you want is not to lose what you typed in case of browser crash, for example, use Opera and turn on textsaver. There's also extensions for Firefox that can do the same. Don't ever use a keylogger because once your system is breached, all your secrets -- even those you encrypted -- can be read from the keystroke log.

Reply   |   Comment by Universal Cynic  –  14 years ago  –  Did you find this comment useful? yes | no (+2)
#32

About phoning home -- are you guys kidding? At least half of all the COTS software that I have "phones home" whenever it is fired up. Where else do you get those messages saying "... a new version is available ..."? This includes browsers. Are you sure that your browser is not keylogging?

Reply   |   Comment by LeeNoildale  –  14 years ago  –  Did you find this comment useful? yes | no (-1)
#31

I cannot tell how many irking times I've lost data, and how monitoring my own system could help me retrieve info, yet if it phones home, how safe is my own data?

Reply   |   Comment by Ruth  –  14 years ago  –  Did you find this comment useful? yes | no (0)
#30

#27 - Consider this. In fact everyone should.

Any software that phones-home needs to be controlled, unless you know exactly what its doing. And one very seldom does. You can only know that by analyzing what's happening with a packet-sniffer, and even that is very complex and hit or miss at best.

This reference is not about this software in particular, but "Keyloggers" in general, IF there is malicious intent. That's why they are usually identified as Trojans. When they "phone-home", (like all of them usually do), you have no idea what they are doing. So that requires enormous trust. Add to that if the data is encrypted, you won't ever know.

o You are online banking and doing billpayments (or whatever).

o A keylogger is recording everything you do including all your transactions and all your passwords.

o The next day you log into your bank account and there's nothing left in it.

o You wonder what could have happened to all your money. Yesterday it was all there. In fact your entire life savings was in there.

o What happened was the keylogger collected all this data and "phoned home" sending everything from your session to someone you will very likely never know, perhaps even half way around the globe. And it was all undetected, so you didn't even realize it.

o Then you log into your primary email account, or try to, but you can't use it anymore. Someone has been there and changed your passwords. So now all your personal email is going elsewhere.

o Because the keylogger phoned-home and sent them all your information. And of course they acted on it.

o Then you try to log onto your company web site. It has been hijacked and altered. You can't get in there either.

o Now your boss wants to know what happened to the company site, along with all that corporate accounting that was there. That site was worth thousands of dollars. Now its worth nothing.

o Why? Well, at this point you already know why..

o Next day you try to log onto your own home computer. For some reason you can't do that anymore. You're locked out.. In effect its a boat-anchor. You'll have to reformat and reinstall everything.

And on and on it goes. You go into foreclosure on your home and your car is repossessed, all because of a friendly little keylogger that "phones-home" and transfers all your personal information undetected.

Obviously a strong two-directional firewall is very helpful and highly recommended. But that doesn't change the malicious intent of such a program, if that intent exists. Depending on how sophisticated one of these may be, it could even circumvent a firewall and allow itself free-access. So these programs can be substantially more of a threat than typical malware.

Hope this helps define the scope of the potential threat.

-JC

Reply   |   Comment by JC  –  14 years ago  –  Did you find this comment useful? yes | no (0)
#29

The very small chance that you could have this on your computer already when it was stolen, and then that you were able to "track" the thief (unless he was gaily typing in his home address in a letter to mum) does not seem to justify what is, in all other circumstances, nefarious software.

I can't really imagine any solid, legal, justifiable reason for having this on a computer, and I really, really can't imagine why GOTD would have the temerity to offer it, other than to drive home the point to those who don't already know (and how many is that?) that such programmes exist, and they are highly dangerous?

Yet, by offering it, they are seemingly endorsing it, and it's use -- and as we can see, there can be very, very few legitimate uses for such a programme.

I'd like to say, "Shame on you!" GOTD -- but then, there's "free speech". AND software programmes -- from GOTD. But I for one won't be using this one....

Reply   |   Comment by Tranmontane  –  14 years ago  –  Did you find this comment useful? yes | no (0)
#28

I had a BSOD during installation and after that can't boot up again because of repeated bsods after entering username and password at boot up.
have used such stuff before but i think this one suxs(big time).
the best out there is ardamax.
to use it or not to use is up to our own needs and choices...tho i agree it's a big question of ethics,morale blah blah blah...
at the end of the day,nobody comes and gives us $1 just because we are morally disciplined and ethically sound...
if anybody has bsod like me and no.16,
and if u don't have a restore point,
-boot into safe mode with networking...
-search and download "autoruns" and run it...and when it is ready,
-under the logon tab,look until u find the entry "ukl",and uncheck it
c:\documents and settings\all users\application data\uklpr\wmpusrvc.exe
-under the drivers tab,look until u find "KLPP2drv",and uncheck it
c:\documents and settings\all users\application data\uklpr\klpp2drv.sys
-then reboot.
mine was fine after that.hope yours do...

Reply   |   Comment by badprogeny  –  14 years ago  –  Did you find this comment useful? yes | no (0)
#27

First of all it's not unusual that almost all kind of software want's to "call back home". It's normally in these days of Internet.
But is there anything which says that we should be more safe with other installed stuff on our computers than in this matter when it's named "keylogger". Why should this be more maliscious than something else? "Only because my security program told me after it detected an dangerous process activity inside the system".
Allright, so that means we wont have to feel worried when we surf the webb or visit blogs websites or giveing away our e-mail address or other personal details online almost every day.
"OR when we installing free software on our computers"
I mean the risk will always be there aslong someone feeling tempted in makeing a few bucks or looseing there head for any reason or motive. I don't want to agree with this kind of software by telling this, nor protect it's existence here among other provided items.
Couse I can't really get the point or the good by seeing that keyloggers are distributed here among so many peoples.

Reply   |   Comment by Wolfenstein  –  14 years ago  –  Did you find this comment useful? yes | no (+2)
#26

Keyloggers = never good. >:(

Well... it depends, for some. For this software, I feel suspicious.

I didn't download it. Never ever after I read the reviews.

~Joji~

Reply   |   Comment by Joji  –  14 years ago  –  Did you find this comment useful? yes | no (0)
#25

I don't think that software's like these r safe, specially for ameatures this is not the right choice at all.

Reply   |   Comment by Mohit Jain  –  14 years ago  –  Did you find this comment useful? yes | no (0)
#24

@12 "I do not share my machines" .. until you'll not give back your computer to the PC service. And you would like then surely to know what oneself it happened with him.

THNX Gaotd. Its good soft, not "the most evil piece of s… software"

Reply   |   Comment by genzregal  –  14 years ago  –  Did you find this comment useful? yes | no (-3)
#23

If someone steals my laptop, how would I know what he (or she) is doing with it by having a keylogger on it? It's stolen!! Or maybe there's something I don't know about this issue?

Reply   |   Comment by Keith H.  –  14 years ago  –  Did you find this comment useful? yes | no (0)
#22

I find it odd that afte reading so many comments, many believe keyloggers are absolutely terrible.

I believe the opposite. While they COULD be used for identity theft and other malicious intents, they can also be used as a tool to help you.

I install keyloggers on my computers. I have them always running. The reason for this is to act as a fallback for my stupidity.

I couldn't believe how many times I would be in the middle of typing a comment, message, etc. on a webpage when my finger grazed the touchad of my laptop, clicking outside the text field. I wouldn't realize this, and hit backspace. Oops. The browser would go back, and all my text would be lost.

Keyloggers are also useful in business and school fields as well, when employee/student activity must be monitored.

Parents can use them to know what their children are doing, online especially. How many times have kids run into issues with online predators? Too many.

Finally, imagine some guy steals your laptop. If you know what he's doing on it, there's a lot better chance you'll find him.

Now, I'll admit, this could be used for bad things as well, just as any good tool. But stop bashing on the software because 'keylogger' has a negative conotation. It does what it's supposed to, and does it well.

Reply   |   Comment by Unonimouse  –  14 years ago  –  Did you find this comment useful? yes | no (+1)
#21

Thanks Ashraf, Fubar, Anton and others who have commented. I'll pass! - See you tomorrow.

Reply   |   Comment by prying1  –  14 years ago  –  Did you find this comment useful? yes | no (+1)
#20

Wow... this is the most evil piece of s... software I've ever seen and it's use is certainly illegal in large parts, if not all the European Union. The ability of "Hiding" the application suggests that it's sole purpose is to spy on other people without telling them. Also, GiveawayOfTheDay's rule says there is no commercial use allowed, so I assume that everybody using this software has criminals in their family which need mental guidance or which otherwise show ill mannered online behavior? If you don't have these in your family this piece of software is not for you.

I strongly suggest everyone to find some real friends you can trust. And in case you need this to spy on your kids you better save the money you spend on PC's for a good lawyer.

Sorry for the harsh words, I prefer trust and good manners over control anytime.

Reply   |   Comment by Olray  –  14 years ago  –  Did you find this comment useful? yes | no (+1)
#19

This is an updated version from last time, but I only tested it briefly because it's such a pain to test this type of software on any PC which has any kind of decent security software, which every PC should have. I'm not interested in the arguments against this type of software, that's a separate issue. There are instances where it's legal and useful, almost necessary. In the US, parents can (and generally should) monitor their children's activity, although they should inform the children. In the US, employers can and generally do monitor their employees' activity.

Testing is a pain because you have to exclude files or folders from your anti-malware. Then you have to explicitly allow all sorts of activity which your security software sees. If you really wanted to use this, it wouldn't work, because decent security software picks up its activity related to each new application (i.e., you can't create enough exceptions for it).

It did see user-entered IE8 address-bar URLs (those are intentionally openly available anyway) and the clipboard (Sticky Password no longer checks that). I didn't do in-depth testing, but I think it didn't see the IE8 URLs which weren't user-entered (other tracking software sees them fine; as I said, they're intentionally available). The screen capture was useless because I have dual monitors, and I was working on the other monitor. It would be more efficient to capture the focused application window anyway, rather than the entire screen. It didn't see my keyboard, but that's probably because I blocked too much. It made every application request direct disk access. And as noted, it kept trying to phone home.

I didn't explicitly test its ability to hide. The earlier version claimed to but was always visible. Additionally, system tracing and autorun monitoring software will see it anyway.

I have monitoring software on my PC anyway, to track what software does and what I do. There are Windows logs, AnVir logs, my security software's logs, application-monitoring logs, and TimeSnapper Pro, which primarily takes screenshots but also tracks application usage, domains, and URLs. I have it set to take screenshots every six seconds of the active application (while user activity), but set to discard unchanged captures (it has zero impact on my PC's performance).

FYI: EarthDesk 5.0 for Windows is available. More efficient, more accurate moonlight simulation (much dimmer), etc.

Reply   |   Comment by Fubar  –  14 years ago  –  Did you find this comment useful? yes | no (+5)
#18

Please note Ashraf's comment: "The Bad
* Ultimate Keylogger opens an outbound connection to the developer’s website every time I view my logs or screenshots. For what possible non-malicious reasons would the developer need to do this?"

#12/Xelkos: I agree.

Btw - it isn't easy to find much information about the KRyLack company and www.ultimatekeylogger.com

I think we need answers here.

Reply   |   Comment by Johannes Aa  –  14 years ago  –  Did you find this comment useful? yes | no (+2)
#17

I cant use this. Well, I tried to, but when I did, my anti virus software went off, and my spy ware too. It blocked it, so cannot use it at all. I read somewhere that this program is a potential "key logger". Now, we cnat have that, now can we!

Reply   |   Comment by chuck  –  14 years ago  –  Did you find this comment useful? yes | no (-1)
#16

I downloaded just to give this a try .... install ....black screen and it closed my pc off ....and again ...and again ...took system restore in safe mode to get my pc to work again ..... NEVER AGAIN and its still not right ... :(

Reply   |   Comment by Renie  –  14 years ago  –  Did you find this comment useful? yes | no (+3)
#15

The big question is how to get rid of this damn thing if it gets in ???

Reply   |   Comment by Jonas  –  14 years ago  –  Did you find this comment useful? yes | no (+1)
#14

This was enough to keep me away from even looking at it.


The Bad
* Ultimate Keylogger opens an outbound connection to the developer’s website every time I view my logs or screenshots. For what possible non-malicious reasons would the developer need to do this?

Reply   |   Comment by Xelkos  –  14 years ago  –  Did you find this comment useful? yes | no (+236)
#13

I would also be very interested in finding out why Ultimate Keylogger opens an "outbound" connection to the developer’s website when viewing logs. That has "malicious" written all over it. If anyone discovers what data is being sent out during this connection please post it here.

Reply   |   Comment by Bellingham  –  14 years ago  –  Did you find this comment useful? yes | no (+236)
#12

Thanks Ashraf.

Dl'd but the files couldnt unzip:Bad zip headers.Their own File Checksum Tool(Freeware on their site also shows errors).Then dl'd and activated successfully in Sandboxie.

Wonder for what reason I would need a key-logger on my own box.I do not share my machines.If there was a way to look out into other machines using this, then it would have "some" usefulness but, we all know that is frowned upon & might insult the sensibilities of some users.Also I advise that you have a keen look at some of the registry values entered by this app.Seems to initiate a reverse DNS tracking- NOT NICE, but not too sure yet.Is this a spyware offering?

There are macro editors which can do the claimed functions but in a very benign manner.

No thanks and all my thumbs down

Reply   |   Comment by KenyanPhoenix  –  14 years ago  –  Did you find this comment useful? yes | no (0)
#11

I think I'd rather visit some highly questionable sites and see if I could pick up some Malware Installations instead. Its very hard for me to imagine why anyone would install such a package, on their own equipment, and intentionally. NIX NIX! Where's my wooden stake?

And the fact that it phones home periodically, doing anything it wants to, as do all KeyLoggers, and in many cases undetected, also trying to force your system to do things it doesn't want to do, renders this one a significant threat in my view. I suspect many Malware scanners will pick up on this one right away, and so they should.

PROCEED WITH CAUTION!

-JC

Reply   |   Comment by JC  –  14 years ago  –  Did you find this comment useful? yes | no (+2)
#10

"Ultimate Keylogger is completely undetectable"

What!!!???

What a joke (!!!) in the first place - any decent HIPS and Behavioral Blocker detects it easy
Mamutu alerts and kills it dead by quarantining ... Then you can delete all all entries
Comodo' HIPS Alerts as well and you just Deny and then Kill the silly thing!

But another and the main point here is for those who are deliberately installing things like key-loggers/ screen-loggers and alike - you people are mentally ill and need professional medical help.

I am very very surprised that such valuable members of society as Asharf are testing them and never expressing the most disgusting purpose of the deliberate installation of such crap.

Reply   |   Comment by Key Logger  –  14 years ago  –  Did you find this comment useful? yes | no (-2)
#9

No idea what to use this for, unless you want to spy on your kids, but then you better keep the PC away from them, or puut it downstairs.

I not want a spy om my PC.

Reply   |   Comment by Safe Tested Software  –  14 years ago  –  Did you find this comment useful? yes | no (-2)
#8

This has been offered before as well as another version called "Keylack" even though disassembly of the EXE revealed it was indeed this same "Krylack" program with new skins.

NOT recommended, I tried this last time as a test and advise all to steer well clear.

Ashraf's recommendation, KGB is a better one though if you "need" a keylogger you maybe need to talk things through first!

Reply   |   Comment by Anton  –  14 years ago  –  Did you find this comment useful? yes | no (+13)
#7

One has to wonder: if the program is well hidden, then how do YOU access it??

And if you can access it then it's not well hidden and anybody could access the program (at least know it's there, not go inside it since it can be PW protected) and know they are being spyed on them!!

Reply   |   Comment by jelpys-CHALLENGE.com  –  14 years ago  –  Did you find this comment useful? yes | no (-1)
#6

desktopshark is best out there.It will do all job for average joe.

Reply   |   Comment by Champak  –  14 years ago  –  Did you find this comment useful? yes | no (-1)
#5

Quote:"During monitoring sessions it will not be listed in the task manager." But I hope it shows up in the processes list... if not, this would be an operating system's security leak.

Reply   |   Comment by Mike  –  14 years ago  –  Did you find this comment useful? yes | no (0)
#4

+ quick configuration if you use gmail to send you email reports.
+ provides detailed logs

Perhaps could help track laptop thief!

Reply   |   Comment by Marco  –  14 years ago  –  Did you find this comment useful? yes | no (+1)
#3

Great Software , I have Used the free version Long time ago and It's Works Fine , I also use this Free Key logger Free KGB Key Logger 6.1.1 You Can download it From here ( http://www.refog.com/free-keylogger/key-logger.html ) KGB style :P .

Reply   |   Comment by Michel  –  14 years ago  –  Did you find this comment useful? yes | no (-5)
#2

I've decided to take a more positive approach to this type of software. I'm not going to go off and start telling everyone how dangerous software like this can be - instead I will make some suggestions on how to detect or bypass a keylogger should one exist on a computer that you need to use.

Just remember, it's fine to say you wouldn't download this or put it on a PC - but can you be so confident of the motivation of others. Remember that the incidence of identity theft has never been higher - and online crime is costing more every day. Regardless of your intentions, there are those who will do whatever they can to take advantage of others.

Keyloggers: How they work and how to detect them
http://www.viruslist.com/en/analysis?pubid=204791931

Detect keyloggers using Anti-Keylogger Tester
http://helpdeskgeek.com/free-tools-review/how-to-detect-keylogger/

KeyScrambler Personal 2.6.0 [Free]
http://www.qfxsoftware.com/

KeyScrambler – Free Anti Keylogger Software [Firefox Security Addon]
http://thepcsecurity.com/keyscrambler-free-anti-keylogger-software-firefox-security-addon/


Remember keyloggers can be used for both good and evil... just like guns or vials of infectious diseases.

Reply   |   Comment by BuBBy  –  14 years ago  –  Did you find this comment useful? yes | no (+131)
#1

The Good
* Logs keystrokes, clipboard activity, and application usage.
* Can take screenshot automatically at regular, designated intervals.
* You can password protect the program.
* You can have the recorded activity logs + screenshots sent automatically to an e-mail address, FTP server, and/or to local/network folder.
* The logs + screenshots can be password protected and encrypted via AES 256 before they are sent out.
* You have the ability to warn people that their activity is being monitored.
* All logged activity is encrypted until you view it and gets re-encrypted automatically.
* You have the option to hide Ultimate Keylogger's system tray icon, Windows Task Manager entry, and program files.

The Bad
* Ultimate Keylogger opens an outbound connection to the developer's website every time I view my logs or screenshots. For what possible non-malicious reasons would the developer need to do this?
* Only text activity in the clipboard is recorded.
* Activity logs and screenshots are re-encrypted automatically, but they are re-encrypted after you close the main program window. They stay decrypted between the time you stop viewing the logs/screenshots and you have the main program window open.
* Claims to be able to record URLs visited in Internet Explorer, but does not do this (at least not with IE8).
* Constantly tries to add itself to Windows' start-up/boot programs list (no option to tell it to stop).
* Screenshots are not/cannot be compressed.
* No way to exit the program except Alt + Ctrl +Delete style.

Free Alternatives
KGB Key Logger

For final verdict, recommendations, and full review, please click here.

Reply   |   Comment by Ashraf  –  14 years ago  –  Did you find this comment useful? yes | no (-89)
Add a comment

iPhone app giveaways »

Calculator Easy HD Giveaway
The FIRST and the ONLY calculator supports Retina display in the market.
$0.99 ➞ free today
Time Note - record time Giveaway
Use time to manage your events and activities.
$2.99 ➞ free today
Unit Converter Pro HD Giveaway
The most powerful unit converter in the market.
$0.99 ➞ free today
Beagle Bruno Giveaway
Express your self with this cute sticker pack.
$1.99 ➞ free today
Depello - color splash your photos Giveaway
Color splash images instantly!
$1.99 ➞ free today

Android app giveaways »

Shadow Survival: Offline Games Giveaway
Whether you're a fan of io games, survival games, or just looking for a fun new game to play, this one is for you!
$0.99 ➞ free today
Black Army Omni - Icon Pack - Fresh dashboard Giveaway
A collection of icons based on the well-known candy bar.
$0.99 ➞ free today
ID Photo & Passport Portrait Giveaway
Make an ID photo easily just with this professional Nuts ID photo app.
$5.99 ➞ free today
WSticky - Sticky Note Widget Giveaway
WSticky is sticky notes widget for home screen use.
$0.99 ➞ free today
Bubbles Battery Indicator - Charging animation Giveaway
A nice-looking and beautiful battery charging animation app.
$1.49 ➞ free today