Biyernes, Marso 16, 2012

Working KGB Spy Keylogger 4.2 with Serial

KGB KEY LOGGER


The main window of Refog enables users to select the accounts that they want to monitor.

This image has been resized. Click this bar to view the full image. The original image is sized 827x603.

The Logging tab allows you adjust logging settings for each user

This image has been resized. Click this bar to view the full image. The original image is sized 827x603.

You can use the Log Size tab to select the drive that you want to use for the log.

This image has been resized. Click this bar to view the full image. The original image is sized 827x603.


allow you to adjust visibility settings
This image has been resized. Click this bar to view the full image. The original image is sized 827x603.

Password Setting

This image has been resized. Click this bar to view the full image. The original image is sized 827x603.






What can KGB Keylogger do?

Quote:
KGB Keylogger offers you several integrated tools to monitor user activities. Each tool keeps track of a different activity. You can use it not only to log key strokes, but also to record clipboard entries and web sites. All activities are logged into a file, and supported with snapshots.

Every log entry has a time stamp, the name of application and the caption of the window where the activity took place. When you put it all together, you'll have the whole picture of user activities minute by minute. As well as what was typed, you will also see when and where it was typed.

If you have an interest in a particular application, say, a web browser or an email client, you can log only the activities of that particular application. You can make a list of applications that need monitoring. When recording selected activities, it may also be useful to take snapshots at every mouse click. You will get an as-good-as-being-there-yourself picture of user activities. Because the program makes a screenshot on each click, no action can skip its attention.

The log of network activities can also be used for blocking access to sites. We recommend using a dedicated firewall because it creates a much stronger protection than built-in blocks. Alternatively, you can add the sites to the list of restricted sites from Internet Properties.
The one thing that makes KGB Keylogger truly special is its autonomous work in the system. After you install it and switch to the stealth mode, it starts logging all user activities. The program can neither be traced in the process list nor accessed from shortcuts. Wherever the call of duty sends you, KGB Keylogger will keep an eye on those in your care.



Viewing log data by activity
All log records are grouped by users' activities:

Keystrokes Typed - displays words and phrases typed by user during session.
Screenshots - displays what has appeared on user's screen during monitored session.
Web Sites Visited - displays the list of websites visited by user during monitored session.
Program Activity - displays programs run and closed by user during monitored session.
Clipboard - displays clipboard content for different time spans during monitored session.
Computer Activity - displays times when the computer was started, shut down, suspended, rebooted, etc.

Note: You can customize logging settings in the Settings section.

To view logged data for selected activity:



Click image for larger version

Name: DOnt Forget to say thanks.gif
Views: 12
Size: 103.3 KB
ID: 385494

DOWNLOAD LINK

http://www.mediafire.com/?6k6x8xyvwubpl60




Walang komento:

Mag-post ng isang Komento