Tip & How-To about Computers & Internet
Introduction to software
Actual Spy or keylogger allows you to find out what other users do on your computer in your absence. It is designed for the hidden computer monitoring and the monitoring of the computer activity. Keylogger Actual Spy is capable of catching all keystrokes, capturing the screen, logging the programs being run and closed, monitoring the clipboard contents.
• Logs all keystrokes, is case sensitive (keystroke logger).
• Makes screenshots within the specified time interval.
• Saves the applications’ running and closing.
• Watches clipboard contents.
• Records all print activity.
• Records disk changes.
• Records internet connections.
• Records all websites visited.
• Records startup/shutdown.
• All the information is stored in the encrypted log file.
• Convenient interface of the log and screenshot view.
• Generates the report in the text and html format.
• Sends the report to the specified email, via FTP or local area network.
• Works in the standard and hidden mode.
• In the hidden mode it is invisible in all operating systems (in Windows NT/2000/XP/Vista processes as well).
• Provides the opportunity to protect keylogger with the password, so that nobody except you could view the logs.
• Actual Spy Software is not detected by antivirus software.
• Fast installation, convenient and understandable interface, various set of features, flexible configuration system.
Use Of Software
I have just taken the features from their site and as you can see that probably they made this product to monitor the activity by administrators or the one having previllages. I believe correct use is
by office administrators to check whether employees are using the computer correctly or just missusing the resources.Same thing is for college students.
Now this is the biggest issue.
threat comes from use of this software for stealing login id & passwords.
threat does not even limit to privacy but extends to hacking of bank accounts , credt card details and the list continues......
the makers probably won't have thought of this.
Beware Of Wrong Advices
i will come up with the gem of a trick to fool the keylogger.but before that i like to discard some wrong/irrelavant advices given by experts.
1.Use on-screen password while typing passwords (wrong advice and i will prove it later)
2.other irrelavant advice is to check startup programs , logs . processes but what to do when there are no administer previllages.
ok you can check processes but what is the guarantee that a keylogger is running i mean there can be many softwares with different names.
this is what it looks like.
you can see the keystroke recorded below.
i tested it myself. it recorded my e mail id and password.
i used on screen keyboard and it recorded again , applications recorded onscreen keyboard. i was shocked at this and my brain came up with a brilliant idea.
How To Fool Keylogger.
i just used common sence .
i opened mosilla and before filling username i just clicked outside and the cursor from typing area was gone.you know the typing will not take place in the username .now uust type rubbish and keylogger will collect it , again take the cursor to the type area , type 2 or 3 words and again type rubbish.do same thing for password in a similar.it will be practically impossible for anyone to now figure out your password , card no. etc.
can u figure out that my password is avrlsaxena08 and password is 45e9_e9w1i
from this nonsence which the keylogger collected this time.
Smart, Isn't it
Posted by Aviral... on
Nov 03, 2013 | Mach7 Remote Spy KeyLogger SoftWare Mach7...
Feb 19, 2011 | Computers & Internet
Mar 31, 2010 | Yahoo Mail
220 people viewed this tip
Usually answered in minutes!