Every day we offer FREE licensed software you’d have to buy otherwise.

Ultimate Keylogger 2.00 Giveaway
$29.95
EXPIRED

Giveaway of the day — Ultimate Keylogger 2.00

Ultimate Keylogger monitors all activities on computer systems including applications, keyboard, passwords, clipboard, chat, email, and visited websites.
$29.95 EXPIRED
User rating: 283 115 comments

Ultimate Keylogger 2.00 was available as a giveaway on June 16, 2013!

Today Giveaway of the Day
$39.90
free today
Record your computer screen activities easily.

Ultimate Keylogger is a software that monitors all activities on computer systems including applications, keyboard, passwords, clipboard, chat, email, and visited websites. To avoid tampering of the software, it features a unique file protection. Ultimate Keylogger is completely undetectable. During monitoring sessions it will not be listed in the task manager. The software can be installed in less than five minutes and runs maintenance free.

Ultimate Keylogger displays reports in web format or sends zip-compressed and encrypted activity reports invisibly via Email, FTP or network. Ultimate Keylogger has a password protected interface and hot-key combination for accessing the application. All recorded information is stored in an encrypted file. Ultimate Keylogger does not consume computer resources.

System Requirements:

Windows NT/ 98/ Me/ 2000/ XP/ 2003/ Vista/ Server 2008/ 7/ 8

Publisher:

KRyLack Software

Homepage:

http://www.ultimatekeylogger.com/

File Size:

12.5 MB

Price:

$29.95

Comments on Ultimate Keylogger 2.00

Thank you for voting!
Please add a comment explaining the reason behind your vote.
#115

ATTENTION to ALL USERS:

After about 4 months, the software reverted automatically to trial version, thus exposing itself!
All logs-settings etc were visible to my child, @#$%!

DO NOT INSTALL such a short trial, there was no mention of that, not even a 1 year trial...

Reply   |   Comment by jumbi  –  10 years ago  –  Did you find this comment useful? yes | no (0)
#114

I applaud you cappy!
:-) I can't even get to their site, because it gets snagged as being malicious from the start. With that being said... Now everyone is aware of the simple fact just by clicking upon an image or a link you can fully expose yourself to this type of risks from the start, if that image/link is designed to release it's payload upon, say a BHO or another form of elevated privilege? Especially since SSL can be bogus
Bottoms Up Mates!

Reply   |   Comment by BoozeHelps  –  10 years ago  –  Did you find this comment useful? yes | no (0)
#113

I didn't download this, simply because I have my own keylogger since 1994. And no, I don't use it to spy on my children (none so far...) or my wife (none so far...). I installed it because I live in a village where power failures occur several times a day, and this program saved every keystroke and mouseclick I made once every 30 seconds. So, in case of a blackout or a blue screen (also too frequent those days) I lost just seconds instead of minutes or hours of my work. OK, now I have an UPS and I do my work mostly on a laptop, but I'm still afraid of blue...
And no, I'm not afraid of spyware, because i have nothing to hide (at least not on my PC...). My passwords are always simple, and I use the same password on several e-mail accounts and on my facebook page. (If you wonder, it's "121121", or just "121" sometimes with "kingA" in front. Without quotes, of course. Four attempts at most, and you're in...)

Reply   |   Comment by Geza  –  10 years ago  –  Did you find this comment useful? yes | no (+1)
#112

Anyone else notice the "poor" Web of Trust rating for ultimatekeylogger.com?

http://www.mywot.com/en/scorecard/ultimatekeylogger.com?utm_source=addon&utm_content=rw-viewsc

Reply   |   Comment by RMT2  –  10 years ago  –  Did you find this comment useful? yes | no (-3)
#111

Several people have asked if there is any legitimate use for a program like this. I haven't seen one use mentioned, which is as a backup for your own use of what you are doing. I've used different free keylogger programs for this purpose over the years, and there have been a few times they really saved my butt, and other times they simply saved me from having to re-type something. E-mail and word processing programs and the like may be set to save a backup copy of what you've been typing every so many minutes, but sometimes those automatic backups don't cover everything, or whatever problem occurs does so at just the wrong time or in the wrong manner so that something important is missed. So there is at least one completely legitimate use for this type of software other than spying on family members or others . . .

Reply   |   Comment by ronn!  –  10 years ago  –  Did you find this comment useful? yes | no (+4)
#110

Got to think about this before I download! Wanted a program like this in past! But do I need a program like this! Does this program have valve of making a copy of everything you type and keeping it in case you lose YOUR INFO during typing! Have been times when typing and lost what I typed by mistake! Anybody think that this program as a backup copyer is a thing this might be used for! My kid is now an adult, so no spyintg on him as a sign of respect he's intitled too!!
See no other valve in this program for me!

Reply   |   Comment by wot  –  10 years ago  –  Did you find this comment useful? yes | no (-2)
#109

always complaining. It was easy to complain. What we are looking here is the pros and cons. is the software is totally undetectable, etc. You can flood comment immoral, unethical, we already know that. but as a system administrator or business owners we need this to monitor activities.

Reply   |   Comment by Reviewer  –  10 years ago  –  Did you find this comment useful? yes | no (0)
#108

Using unethical program to monitor people doing unethical things. I bet this program and it's designers haven't even verisign secured the program proving it's clean and that it's from a reputable company. Without that how do you know this programs code isn't copying your info and sending it to China?? I too am in the computer IT field. I am not saying a program like this doesn't have it's uses. However, you can lock down a computer a lot using policies, parental controls & routers that block websites and IP's entirely. Infect my computer with some unknown, rofl no thanks! Yes, that's my professional opinion.

Reply   |   Comment by cappy  –  10 years ago  –  Did you find this comment useful? yes | no (+3)
#107

I knew there was going to be controversy going in but had to wade through some of the above 100 or so comments on this. Some good points made about this being a tool and I almost was going to ask Bob (10) what possible use this program would have for us average joes and janes. Then I was reminded of CyberTracker, a program for monitoring Internet usage and website visits on a network that I used to administer in a small company years ago. Yet the pitfalls of that monitoring were that I found that one of the principals of the firm was viewing gay porn during work hours. I told him I really didn't care what he was viewing only that it was taking up way too much bandwidth. He subsequently saw to it that I was let go "for business reasons".

Yes, a dangerous program in the wrong hands and even in the "right" hands, problematic and harmful. At the present time I see no use for it but maybe some of my friends at the NSA (No Such Agency) would be interested in this GAOTD offering.

Reply   |   Comment by Paul  –  10 years ago  –  Did you find this comment useful? yes | no (+4)
#106

Can this program detect key strokes of any hackers or trojans that invade a computer?

Reply   |   Comment by Walter Green  –  10 years ago  –  Did you find this comment useful? yes | no (+3)
#105

Those complaining about this software's "morality" need to wake up. If you think "having a talk with your children or others using your computer" or "trusting" your children/spouse/whomever is enough, you're naive. Just ask the man who was arrested for kiddie porn who swears someone else living in or visiting his house did it. Or ask the parents who "trusted" their "good daughter" who disappeared with an online predator. Or ask the woman whose partner she trusted brought her home STDs from someone he met online. Or ask the innocent business owner whose employee was making drug sales on company computers how the police raid affected his reputation in the community.

As someone who has worked for 20+ years in the IT field, dealing directly with both business and personal computer needs of clients; I've seen a lot.

And, I would just say, Wake up and stop living in fantasy land.

Reply   |   Comment by Greywolf Computer Services  –  10 years ago  –  Did you find this comment useful? yes | no (+6)
#104

Have used a previous version; this does not install well over top the old, neither does it offer to uninstall the old; not going well manually uninstall either, will try deleting folder, reboot then attempt install. On a second machine; clean first install, all is well. Both W7 x64.

Reply   |   Comment by Bob2  –  10 years ago  –  Did you find this comment useful? yes | no (0)
#103

To detect keylogger activity you can use ‘anti key logger’ software. A previous GAOTD offering 'Zemana AntiLogger' [July 26, 2011] will alert you to key logger activity and give choice to block or approve action. See GAOTD archives for the comment section on Zemana AntiLogger for discussion and suggestions for several freeware alternatives like SPYSHELTER, and PREVX SafeOnline [suggested by Giovanni of course!] .
Again, Glad to see Giovanni back on GAOTD comments……

Reply   |   Comment by Ernie Bell  –  10 years ago  –  Did you find this comment useful? yes | no (+3)
#102

#1 - AES 256 per the software website, easily found on the features list. Perhaps you were looking at the non-encrypted free version on the site (which is different than the GOTD version)

#43 - That is either a very usual thief or a very active imagination. The thief would not only be have to be handy with a lock pick, they would have to be able to disarm house alarms, be able/have time to hack the user password on the computer, then the admin password (if different), to then install the software. Wouldn't it be easier and quicker to just steal the computer along with any cash, credit cards, tablets, cameras, jewelry, etc. on the spot?

I have teens. I will use this on their computers (just download to each one before the GOTD ends). I don't need it to email logs (no worries about data leaving the house) as I can remote connect to their computers to review the logs if needed.

Reply   |   Comment by Richard Johnson  –  10 years ago  –  Did you find this comment useful? yes | no (+2)
#101

The below description of the GOTD offer is false:
"During monitoring sessions it will not be listed in the task manager." It does not apply to GOTD license as it is not possible to run the program in "silent mode" as this function is disabled. The software prompt to buy full version, so do not waste your time for this soft.

Reply   |   Comment by NINO  –  10 years ago  –  Did you find this comment useful? yes | no (+2)
#100

I use a key scrambler and recommend others do the same

Reply   |   Comment by ILIKEFREE  –  10 years ago  –  Did you find this comment useful? yes | no (+1)
#99

Glad to see Giovanni back.

Reply   |   Comment by Ernie Bell  –  10 years ago  –  Did you find this comment useful? yes | no (+5)
#98

This is a decent product, one of the more useful free giveaways in a long long time. All you people complaining about being "unable to detect" the program- this is a key feature of using a monitoring program like this, duh. Of course you can "detect" the program if you know what you are doing. Why would you worry about this feature? You will be the one installing it on another person's computer. If you are afraid someone is watching what you are doing, guess what? There are a ton of programs out there that already have this capability and are designed with malicious intent in mind. If someone wants to spy on your computer activity undetected, they probably already are doing so. Actually, I just did a little searching and found that this program is used for malicious intent, which is sort of funny. This cannot be helped, and there are a lot of other options even if this program was not available.

For those worried about not knowing where your information is being sent.. if you didn't configure it to send email, then it won't be sending any email at all! So if you don't know where the email is going, it is either b/c you forgot how you configured the program or you didn't configure the program at all. The program doesn't just send emails when you install it.. that would be silly and pointless.

As far as encryption and protection of data being sent out, haven't been able to find that out. However, I am guessing a fairly secure encryption type is used, or at least I hope so. There is no reason why one shouldn't be used... For the less secure types it is almost the same as not using encryption at all if someone really wants to get your info.

Ywah, so anyway, this is the digital world we live in, get used to it. This is a good program to get for free. Very useful for parents and accountability purposes.

Reply   |   Comment by Jonny  –  10 years ago  –  Did you find this comment useful? yes | no (+7)
#97

Oh how wonderful it is to see the Mensa club discussing, it truly brings a smile to my lips... All information regarding keyloggers can be googled, so why don´t you do that before writing? My experience (Intelligence) is that those claiming to have a moral high ground are the ones most prone to using this software. They get angry because they feel they´ve been exposed... There are keyloggers, not readily available to the public, that can be sent via email, who installs themselves without the owner ever noticing. Will be shown as a windows component is the taskmanager. This software is a good keylogger. Krylack is a well established company. If you feel you want/need one - get it!!! If not - well then you know what to do...

With Love

Reply   |   Comment by jay bones  –  10 years ago  –  Did you find this comment useful? yes | no (+6)
#96

Group paranoia has rarely been more entertainingly rampant than it is here today: do people seriously believe stuff such as that reported at post # 43, about thieves breaking into unoccupied homes and somehow knowing the password access to computers on which they then install key-logging software so as to secretly order stuff which then gets delivered who-knows-when but no matter, the thieves camp out day after day after day (presumably, they also know the secret of complete invisibility) on the front doorstep or porch in hope of it turning up????

I've no use myself for today's software but that doesn't mean I think it's from Satan or The Dark Side. This long-established developer has accurately described what it is and what it does. Not only that: the developer has offered this key-logging software here on GOTD on several occasions since March, 2009, and every single offering has been subject to review and comment from which it's but a task of mere minutes to extract the kind of information so many on here are quailing over today.

But perhaps it's easier to come on here and scream Fire! Fire! rather than go do some fundamental research into a software that may suit your individual needs -- or not. Thanks, GOTD, and thanks, Krylack Software.

* As to post #49: um, yes. KryLack Software is headquartered in Kiev, Ukraine, and sees no reason to obscure that fact or be ashamed of it. Neither do I. But perhaps you'd prefer it to be a Chinese shell company operating out of several phony addresses in the USA and Canada? If so, I can readily provide you with a list. . .

It's exactly that xenophobic attitude of yours which makes so many developers think they must obfuscate their origins otherwise they won't be acceptable to Western eyes. I dunno: paranoia and xenophobia. Some going, huh?

Reply   |   Comment by MikeR  –  10 years ago  –  Did you find this comment useful? yes | no (+6)
#95

I live in the USA. I used this type of software on a PC my 14 daughter used. She was told that nothing she did on the computer would be private. (we required password knowledge, etc.) She thought she could get around that. With software like this we stopped an online predator who was planning to fly her to Canada to then fly to his Palace in the Mediterranean for her to be his bride. PS - She had only been on the internet for one month when this happened.

Reply   |   Comment by misadventure  –  10 years ago  –  Did you find this comment useful? yes | no (+6)
#94

First off, I don't trust a software developer that creates spyware, don't care if he is Russian, Chinese, American or European. This particular developer only creates software that has something to do with bypassing security on your system.
However, fact remains that every child monitoring program will have a keylogger in it and especially with these "undetectable" programs... you really never are sure where the logs go to besides to yourself. Even more, a good hacker that is after your creditcard data will only abuse the fact that you yourself have willingly installed an app that is perfect for their own work (extra task each day... check settings of spyprogram)

You really need to monitor your kids, by all means, take the program.
You need to monitor you significant other... you need a laywer, not this program

Reply   |   Comment by whizzy  –  10 years ago  –  Did you find this comment useful? yes | no (+2)
#93

Crashed violently (wmsvr.exe) just after installation (probably doesn't register in windoze registry) but looks like installed OK, because gaotd site opens after setup. Here OS is windoze xp he @ generic CPU with Kingstone 1024MB RAM.

Reply   |   Comment by basher  –  10 years ago  –  Did you find this comment useful? yes | no (-3)
#92

@ #43

"How do the thieves install the software – they use a lock pick while you are at work to gain access to your house and install the software without disturbing anything else in your house so that you won’t know they were ever there."

Wow! Do you also wear a aluminum foil hat so that no one can get in your head while you're not there also?

Reply   |   Comment by Conspiracy  –  10 years ago  –  Did you find this comment useful? yes | no (+1)
#91

Anyone know if this can be installed remotely (the free version)
by sending an email, jpg file etc.???
In other words I don't want access to the computer I'm installing it on!

Ideas?

Reply   |   Comment by Spybot  –  10 years ago  –  Did you find this comment useful? yes | no (-4)
#90

big brother isn't the only one watching you. there are many little brothers out there doing it. whatever happened to that document? you know, the one the founding fathers of the USA signed and everyone in the US Govt. including o'bama and his minions has sworn to uphold? i think they called it the Constitutional or some such. sad no one there actually uses it any more. it got so twisted and spun that no one can agree on what it actually says.

p.s. - saying that your morality is covered by telling people you are monitoring them is like a murderer justifying his crime by saying ' i told them i was going to kill them, so it was OK.

appointing judges that tell you monitoring phone calls is OK is another straw man argument used by the left.

so is saying that 'if you have nothing to hide you shouldn't be bothered, so it's OK.

when you start using spyware on your friends and relatives you are helping break down society.

Reply   |   Comment by wayne kroncke  –  10 years ago  –  Did you find this comment useful? yes | no (-1)
#89

As a side note, to the people complaining about the ethics or morality of this program, DVD rippers use ripping software to PIRATE movies, games, etc... and there have been numerous ones on hear. The ethics and morality only lie with with consumer, not the software. Worried about the company spying on what websites you go to? Cookies installed from websites do that also. If you don't like it, don't download it. If you don't download it, don't complain about it.

Reply   |   Comment by Levitiquetus  –  10 years ago  –  Did you find this comment useful? yes | no (+1)
#88

Used this one before. Worked great and didn't have to set it up to have things emailed. Saved it on the computer. Not a bad little program.

Reply   |   Comment by Levitiquetus  –  10 years ago  –  Did you find this comment useful? yes | no (0)
#87

There ARE moral considerations in developing and in using this kind of software. Right now in the news there is a lot of discussion about governments' spying on their citizens and others. We all can find or make up a *good* excuse to spy on someone. Perhaps a good guide is to, "Do unto others...." Spend time with and talk to your Kids. If you feel the need to spy on significant others or business associates, get professional help for the relationships... or get new ones.

If you do install this offering, use an installation-monitor, like Revo Uninstaller, SoftOrganizer, Comodo Programs Manager, etc., so that you can see exactly what is installed and be able to completely uninstall, if desired. Ironic, isn't it, that you have to ask yourself if you can trust not to spy on you the very app that is made to help you spy on others? Is there no honor among thieves?

I would also suggest that EVERYBODY install an Anti-logger program, like Zemana Antilogger (my only choice), in addition to a great firewall and anti-virus program as part of their basic security setup.

As Giovanni would say, My .0000000000001 cents.

Reply   |   Comment by JMJ Squared  –  10 years ago  –  Did you find this comment useful? yes | no (+2)
#86

This is spyware, pure and simple. The use of it is reprehensible. A talk with your children or whoever else may be using your computer is a much better alternative.

Reply   |   Comment by Coly Moore  –  10 years ago  –  Did you find this comment useful? yes | no (-4)
#85

From the forum: "I strongly object to this software being distributed -on a free basis or NOT. I am a big fan of GAOTD, but frankly, I hope you get sued by the future victims of this software."

Well, totally FWIW, I don't think any cybercriminals are or would pay Any attention to Krylack's keylogger -- there are more than enough malware apps already in circulation that they use, including malware development kits. Like anything else the Ultimate Keylogger app could be misused, for example hacking into a spouse's e-mail accounts looking for dirt prior to divorce could possibly get you sentenced to jail time [depending on laws where you live etc.], but it's actually intended to keep you & your network more secure. I'm not going to argue ethics or morality, nor say where I stand in the debate -- with the current NSA stuff all over the news there's more than enough open debate on essentially if the ends justify the means. From a purely selfish perspective I'm glad GOTD is hosting Ultimate Keylogger -- otherwise some folks would resort to less savory sources, grabbing a keylogger from someplace they probably shouldn't, winding up contributing to yet another botnet for cybercriminals, & that effects us all.

Most all virus & other malware infestations, like successful hacking requires a user on the system to do something -- a fresh Windows PC running up to date security software, & connected to the Internet through the usual router with NAT is actually pretty secure... for the system's security to be breached it takes the user doing something like downloading & running a file, or filling out a form on a website that mimics a legit site etc. IOW it's terribly difficult for someone to reach out & infect your PC/laptop from outside your home or biz. OTOH an unsecured or I guess I'd say less properly secured home or biz network can be breached, particularly wireless, & someone doing something unwise or malicious on one of your home or biz PCs can cause infection to spread to other PCs on a home or biz network.

Usually once malware has the initial foothold, say once you've downloaded & run the initial file that give the bad guys access to your system, that malware can call home for instructions -- it may be told to sit quietly, checking back at regular intervals, & you've just become a number in someone's bot-net. Or it may be told to download & run other malicious software, e.g. a keylogger, saving captured data & sending it home periodically.

At any rate the point I'd make is that users & administrators play an active role in most every security breach, by running malicious apps or scripts, &/or by failing to follow best practice security-related guidelines, &/or by paying too little attention to what's going on with their PCs/servers/networks. Some hacker working on their own or for some gov is not going to magically infiltrate your systems like in a movie. Even the US gov it seems, who gave cybercriminals a great tutorial with the Very sophisticated Stuxnet, relies on someone somewhere unlocking the doors, can't just gain access from outside a network -- if they could do it all on their own, if it was that easy, why would they risk the sort of public outrage & scandal they're facing now, after revelations that all these big companies have been giving them access.

Parents regularly try to make sure their kids aren't doing something they shouldn't, just like employers watch their employees -- in many [most?] places both have some legal obligation to prevent those under their authority from doing something bad. Ultimate Keylogger is just one of many methods &/or tools that they might use. On its own a keylogger isn't any more malicious than the Very popular TeamViewer -- both are commonly [mis]used for criminal purposes -- and for those without an IT staff that can provide more sophisticated monitoring, a keylogger might help stop an employee from infecting the network &/or stealing IP, just like it might help a parent keep their PCs uninfected, by keeping an eye on what their kids are doing, &/or may even help save their kid's life [kids have been *mislead* by many a predator on-line].

Reply   |   Comment by mike  –  10 years ago  –  Did you find this comment useful? yes | no (+12)
#84

#6: ""“Ultimate Keylogger (…) monitors all activities (…) including (…) passwords” and “is completely undetectable. (…) it will not be listed in the task manager.”
If it’s true, how can you offer such a dangerous program? Could someone tell me how to defend myself against such programs? Is it truly undetectable?"


In a word, No.

To remain truly invisible requires a rootkit, which is why so many dred those... in a nutshell a rootkit modifies your system so certain files are literally invisible -- Windows will not see them. Otherwise apps/processes can hide to some extend, though apps like Sysinternals Process Explorer [free from microsoft.com] will show them running -- in fact the bad guys know & fear these Sysinternals apps enough that their malware is sometimes designed to prevent them from running. Malware processes also often try to disquise themselves by using the same names as legitimate Windows app/processes, or using names that sound like they belong to Windows -- that makes it harder for users to spot them. For the average user however good security software should spot a keylogger, if by heuristics [behavior patterns] if by not matching the pattern itself -- I would suspect that to use something like this you'd have to set that security software to ignore it, then perhaps password protect your security apps to prevent someone seeing & changing that.

* * *

#10: " For ultimate protection, install a virtual machine and do your surfing from there."

Good protection in many cases, yes, but VMs aren't bulletproof by any means, e.g. if your VM gets infected, malware *may* be able to spread to other systems via the same network connection that allowed them to get on-line. It is possible to isolate a VM pretty well, but I wouldn't want anyone to think that installing a VM is all they need to do to be perfectly safe.

* * *

#26: "What would be useful is if I had a text file log all the programs running in my computer or the internet activity so I know if someone i trying o hack into my computer."

Check out Process Monitor from Sysinternals at microsoft.com. The hard part is there's so much going on just running Windows that even with filtering you're talking loads & loads of data. As far as network activity, there are several apps that monitor & log that stuff for you, & many security apps [e.g. McAfee] can log every app that asks for outside access as well as log any attempts to connect to your PC/laptop. You are right, logging that stuff is helpful when/if tracking down malware or misbehaving software, but it can be enough work, going through the logs carefully, that unless you know you have a problem most won't bother with it.

* * *

#27: "Does anyone know if it’s possible the company or some other party could intercept the log files this program generates? I feel scared to install it because I don’t know if there is a way the information could be apprehended by others."

Set your firewall to block any of the app's files/processes from connecting to your network -- then either look at the logs yourself on the monitored system, or use a trusted app to sync files with a folder on your system via the network etc. Someone with access to the monitored PC, either physical or remote could access anything stored, so if the system were compromised then yes, they could get those files too.

Reply   |   Comment by mike  –  10 years ago  –  Did you find this comment useful? yes | no (+10)
#83

I want my boss to put this on my work computer so he can see how hard I focus on work every moment of the the day! Too bad giveaways are for "strictly personal use." As a business tool, this would give managers something more to do. Think of all the new reports!!! I'll propose that the company purchases this at my next review so that our managers can help micromanage us toward ultimate productivity. Why haven't they thought of this already? Uhhh..have they? Ooops! Gotta get pack to work!

Reply   |   Comment by David H.  –  10 years ago  –  Did you find this comment useful? yes | no (0)
#82

This is not a remote keylogger which means you need to have physical access to the computer it's installed on.

Reply   |   Comment by Derek  –  10 years ago  –  Did you find this comment useful? yes | no (+3)
#81

@45...you probably didn't install this, Stop Spamming!

Reply   |   Comment by Terry Z  –  10 years ago  –  Did you find this comment useful? yes | no (0)
#80

This program, and programs like it, are primarily tools for amateur or wannabe hackers, used for the main purpose of trying to log keystrokes that might reveal private information or logins to websites, some of which might provide access to your financial information. Those keystrokes are then packaged into a file and sent (usually via email or FTP) to some ne'r-do-well to be analysed.

If you just want to monitor your kids' or employees' computer usage, there are far less sinister programs that let you do that. If you're an employer, you need do no more than tell your employees that their computer use is being monitored and use a program more suited to that purpose; no need to be so draconian about it as to be all sneaky.

This program is easily killed by locating its process in the Task Manager (wmpusrvc) and ending the process. It's also easily thrawted by a software firewall that detects and prevents outgoing connections to the Internet without your permission and prevents a program from using your email client to send email. In that sense, it's worthless.

Finally, you're a fool if you install this on your own computer! For all you know, it's sitting there happily logging YOUR keystrokes and sending them off to KRyLack!

Reply   |   Comment by Nefthestical  –  10 years ago  –  Did you find this comment useful? yes | no (-5)
#79

"If I’m not mistaken, it is illegal to do this unless they’re your minor children" You are mistaken. There are no laws prohibiting the installation of software on computers.

Reply   |   Comment by Par Anoid  –  10 years ago  –  Did you find this comment useful? yes | no (-1)
#78

43:

I hesitate to ask what you do for a living.

Reply   |   Comment by olrowdy01  –  10 years ago  –  Did you find this comment useful? yes | no (-2)
#77

For all of those who say that this is just a tool, then so is an AK47.... Should we give them away as well?

Some tools have multiple uses, good & bad, this tool only has bad.

# 44.... If you want a bit of software to monitor yourself then get one that is open & doesn't hide itself.

& for those who want to monitor your kids, once again, doesn't need to be hidden (that's spying), just password protected to deactivate.

Reply   |   Comment by Alrock  –  10 years ago  –  Did you find this comment useful? yes | no (-5)
#76

Everyone crying and complaining that your Anti-virus reports this as being a keylogger.............learn to READ considering the program name states it's a keylogger. This is a tool to use on systems to monitor your kids (or if you don't trust your spouse). Get over yourselves with the whole "it's immoral" speeches. Nobody is forcing it on you are they? No. Bunch of politically correct idiots.

Reply   |   Comment by Azrael  –  10 years ago  –  Did you find this comment useful? yes | no (+6)
#75

Install without too much problem on [Win7 32bit Home Premium]

Once installed, AVG Free detected is was harmful (As to be acceptable due to the nature of the program itself being a keylogger), but added it to exceptions without any further problems.
Also added the program to my firewall block list, just to be on the safe side.
You can find out how to do this too (if you don't already know) Here at howtogeek.com
Honestly, I find this program very useful to see who is doing what on my computer when I let people borrow it. It's not "spying" if you are using this program on your own computer. It's up to others on how it's used. When someone asked in the Share your ideas to make this program "portable," it's clear he/she has intentions on mis-using the program.

Now for the price:
$29.95 is a little on the expensive side, but then again would you resort to a freeware keylogger program? I know I wouldn't.
I think taking off $10 would make this program sell more copies. Let's face it, you have no freeware competition and only a $20 price tag is asking for very little for a great program.

Reply   |   Comment by XKJGX  –  10 years ago  –  Did you find this comment useful? yes | no (+5)
#74

Yes, people, this is a keylogger. It uses rootkit technologies to hide itself from the computer user. When someone uses this sort of thing against you, on your computer, without your permission, it is a BAD THING. When you use it on your own computer, it might be a GOOD THING, or at least somewhat tolerable.

In particular, if you buy a computer and install this sort of software on it and then hire someone to use the computer to do some work, it is definitely not illegal or immoral to use this sort of software to monitor what the worker is doing (or not doing), especially if, as a condition of employment, the worker agrees to this sort of monitoring. Whether it leads to good employee moral, or improves productivity, is another matter altogether.

The same applies to putting it on your own computer and using it to monitor what other people do with it. If you take the position that you own the computers of all the others in your household, you're entitled to do it to all of them. (You'll probably need multiple licenses.)

This company has been around for a while. As far as I know their software has generally done what they claim, and doesn't do other stuff you aren't expecting ... assuming you "expect" it to do the things it lists in its feature list.

Since your kids probably use their smartphones for most everything, this software probably won't be as effective as it might have been several years ago.

Reply   |   Comment by Terry  –  10 years ago  –  Did you find this comment useful? yes | no (+7)
#73

Even though I do some I.T. work for small companies I have never had the need for a program like this, but it's good to know they are available, who knows, some day I may need to use one. An employer has every right to check on how his computers are being used. Even if I had guest in my house for a couple days (my kids bring friends over all the time), if one came who I was uneasy about I won't hesitate to use this.
Thx GOTD for the making me aware of these programs so that I could source them if needed

Reply   |   Comment by GarryS  –  10 years ago  –  Did you find this comment useful? yes | no (+3)
#72

@30 - Check out Zemana Anti-Keylogger. It works well. I've got no use for today's offering. Spying is spying no matter how it is rationalized, and if you need to use a program like this against family members then you have greater problems that should be solved by other means. For those of you planning to use it against employees, unless you have a written security policy in place regarding the presumption of no online privacy by your employees, then you are opening yourself up to a lawsuit if you fire them because of what this software may reveal.

Reply   |   Comment by DownTheShore  –  10 years ago  –  Did you find this comment useful? yes | no (+2)
#71

I don't need this on my PC.

How do you know that the software is not secretly sending what it has keylogged to some other place?

You don't.

So don't pretend to be a know-it-all and criticise those who doubt this software.

Reply   |   Comment by ric  –  10 years ago  –  Did you find this comment useful? yes | no (-1)
#70

BTW: http://www.cnsnews.com/blog/angelo-codevilla/government-data-mining-threatens-our-citizens-not-our-enemies

Reply   |   Comment by Software Babe  –  10 years ago  –  Did you find this comment useful? yes | no (0)
#69

I can see some valid use of this software such as monitoring children or employees (businesses are partially legally responsible for activities of their employees), but one should be careful to know whether the software is legal in their country. It constitutes spying and may break some laws.

Reply   |   Comment by M.I. Summerset  –  10 years ago  –  Did you find this comment useful? yes | no (+2)
#68

Sorry, I meant to say that the new data mining facility is in UTAH, not Colorado.

Reply   |   Comment by Software Babe  –  10 years ago  –  Did you find this comment useful? yes | no (-2)
#67

@Par Anoid: In answer to your question - JUST DOWNLOAD AND INSTALL THE FREEWARE, REVO UNINSTALLER. It will remove EVERYTHING, every crumb, track, path, file, folder, etc. for any program.

I NEVER INSTALL TRACKERS because they do leave crumbs behind and you do not know WHAT the software is doing when it isn't tracking, especially if you use the same PC to do banking and other secure transactions. Just put the dang PC in a visible room (if there is a child involved) and TIME their access to the computer. KNOW WHAT YOUR KIDS ARE DOING AT ALL TIMES, or you WILL regret it.

Besides, NOW that Uncle Same has their new data mining facility built in Colorada, it won't make much difference, will it? IT WILL ALL COME BACK TO HAUNT YOU EVENTUALLY.......BIG BROTHER IS WATCHING YOU NOW. believe it. I am a retired Software Developer and my expertise was in security-related tools. I SHOULD KNOW as I spent my entire life in this field.

Reply   |   Comment by Software Babe  –  10 years ago  –  Did you find this comment useful? yes | no (0)
#66

To the person who posted where this software is stored I say thank you! Thank you! My boyfriend installed this on my computers. I was suspicious and now I have absolute proof. I found C:\ProgramData\uklpr\ on both my desktop and laptop. Now I'm going to uninstall it from both computers and throw him out. Thank you again!

Reply   |   Comment by Sherry  –  10 years ago  –  Did you find this comment useful? yes | no (+2)
Add a comment

iPhone app giveaways »

Bug Bomber Giveaway
Bug Bomber is a classic action puzzle game.
$0.99 ➞ free today
Block Drop Duel Giveaway
Block Drop Duel is a classic action puzzle game.
$0.99 ➞ free today
Guru Granth Sahib Jii Giveaway
Experience the Sacred Guru Granth Sahib Ji.
$4.99 ➞ free today
Glazba – Music Player Giveaway
Listen music from your favourite cloud storage service, download tracks for offline access.
$0.99 ➞ free today
Vostok — Story & Collage Maker Giveaway
Create stunning stories for your business, brand or blog.
$0.29 ➞ free today

Android app giveaways »

Shadow Survival: Offline Games Giveaway
Whether you're a fan of io games, survival games, or just looking for a fun new game to play, this one is for you!
$0.99 ➞ free today
Black Army Omni - Icon Pack - Fresh dashboard Giveaway
A collection of icons based on the well-known candy bar.
$0.99 ➞ free today
ID Photo & Passport Portrait Giveaway
Make an ID photo easily just with this professional Nuts ID photo app.
$5.99 ➞ free today
WSticky - Sticky Note Widget Giveaway
WSticky is sticky notes widget for home screen use.
$0.99 ➞ free today
Bubbles Battery Indicator - Charging animation Giveaway
A nice-looking and beautiful battery charging animation app.
$1.49 ➞ free today