kslogger in a tmp directory running as a service and exclude the entire 
directory it runs from.

  ----- Original Message ----- 
  From: Jon Harris 
  To: NT System Admin Issues 
  Sent: Tuesday, August 04, 2009 10:57 AM
  Subject: Re: keylogger help


  Same here but there has to be some of the freeware stuff that will stay 
loaded>

  Jon


  On Tue, Aug 4, 2009 at 10:54 AM, Scot Parsons <[email protected]> wrote:

    I’ve tried several free ones and they all get disabled by anti-virus 
software…even when I try to exclude them. I’d like one that does a good job 
hiding from AV and will monitor facebook chat. 



    From: Jon Harris [mailto:[email protected]] 
    Sent: Tuesday, August 04, 2009 10:43 AM 


    To: NT System Admin Issues

    Subject: Re: keylogger help 




    That would be nice but I would prefer one that is free if there are any.  I 
need to monitor my daughter's computer usage.



    Jon

    On Mon, Aug 3, 2009 at 9:01 AM, Kennedy, Jim <[email protected]> 
wrote:

    I see they have two version now. We use Spector Pro. Don’t know a thing 
about the other one.





    From: Kennedy, Jim [mailto:[email protected]] 
    Sent: Monday, August 03, 2009 8:58 AM 


    To: NT System Admin Issues

    Subject: RE: keylogger help 



    This is the one we have used. It key logs, small bmp screen shots at an 
interval you set. Logs all applications and what you do with them..IM’s, 
email…and saves it to a random folder deep down inside system32.  After you set 
it up you can just connect to their c$ share and copy it back to your desktop. 
It is very stealth, I put it on a test machine and it scared the heck out of 
me…you can’t find it even in task manager. I have had some pretty savvy users 
that knew they were on ‘the list’ not see it or find it.



    And it is pretty cheap.



    http://www.spectorsoft.com/







    From: Joe Heaton [mailto:[email protected]] 
    Sent: Friday, July 31, 2009 3:57 PM
    To: NT System Admin Issues
    Subject: keylogger help



    My Legal department wants to put a keylogger on a user’s computer.  Anyone 
have a decent one that they’ve used in the past?  I’ve never used them before, 
so I am rather clueless about it, but I don’t want to end up getting something 
that sends info outside our organization.



    Joe Heaton



 

 

 



 


 






 

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~

Reply via email to