Key Logger

Written by Jeremy Horelick
Bookmark and Share

Many users are leery of installing key loggers on their computers or networks for fear that they (both the programs and their deployers) will be discovered. Fortunately for the purchasers of such software, application developers are a step ahead. They've anticipated this problem and, as a remedy, designed certain stealth features that let users fly well beneath the proverbial radar.

By camouflaging themselves from computer operating systems, the best key loggers run undetected by the computers themselves. You know they're on there, they know they're on there, but the computer and its user never suspect a thing. What's more, you can even choose a password that must be entered in order to disable your key logger.

The Bells and Whistles of Key Loggers

The latest key loggers come with many more convenience features than those trotted out by software engineers only a few years ago. You can choose to have your log files aggregated and sent to you at any email address you specify. If you're scanning records for a particular action among thousands and thousands (each webpage hit, graphic rendered, and email sent is a separate action), try sorting your logs by date and time, then jumping straight to the one in question.

You can also opt to start or end your tracking session on a set schedule. Perhaps you're out to nab a particular employee whom you suspect of foul play. Simply program your key logger to begin running at the start of his or her shift, then stop running at the end of that shift, and have the entire log of that four-, six-, or eight-hour block sent to your private email account where you can inspect it as closely as you choose.


Bookmark and Share