Remote Keylogger - Monitor ANY computer through the Internet!
Remote Keylogger offers users the ability to remotely monitor
a computer via a web browser, without even having physical access
to the PC. It will allows you to remotely install the monitoring
system through an email attachment without the PC user recognizing
the installation! And you can access the activity logs
from anywhere via you favorite web browser!
No remembering long IP addresses or directly connecting to the
remote PC - all you need to do is point your browser to the
Remote Keylogger website to view logs of any machines
you deploy Remote Keylogger on! All logs are password protected
and securely stored for your eyes only - and no worrying about waiting
for the remote machine to sign-on to retrieve its IP address to
System Login Activity
Monitor a PC from Anywhere
Secure online log storage
Monitor from anywhere
Check logs at any time
Remote log deleting
How Remote Keylogger works
- Remote Keylogger comes with a configuration
program that allows you to create a remote install module
that you e-mail to the remote PC you wish to monitor. You must
attach this file you create to an email, and then send it to the
remote PC. From there the user must download and run the attached
file to install Remote Keylogger. You can choose to enable or
disable the 'alert user' option that Remote Keylogger has. Once
the user runs the file, their activities will be stored on our
servers, so you can view them from any location - securely, of
course. To aid the install process, you can give any name to the
install module you create - such as CoolPictures.exe or FunGame.exe
(it must always end with the .exe extension to run).
- Some e-mail systems may block executable attachments - do not
worry, however, as this can be avoided. To bypass executable blocking
by the remote e-mail server, you can drag and drop the Remote
Spy module into a WORDPAD or Microsoft Works document. From there
you can email this doc file with the embedded executable to the
remote user - if they open the doc, and double click the executable
- then Remote Keylogger will be installed. Zipping the file with
software like Winzip also works.
- If the remote user does not download the Remote Keylogger module
and run it, then the software will not work - you will have to
physically install the software. We are not responsible for getting
the user to execute the logging module that you send them, nor
will refunds be granted if they refuse to run it - as you can
still physically install the software.
Remote Keylogger Frequently Asked Questions
1. What versions of Windows is Remote Keylogger compatible with?
Remote Keylogger has been tested on, and is fully compatible with
Windows 95, 98, Me, NT, 2000, XP. It is recommended you have all
the latest service packs and security updates installed, however.
2. Can Remote Keylogger work if a anti-virus/anti-spyware/Firewall program is present?
Yes, unlike other products Remote Keylogger can work and deliver
reports even if a firewall is present. Remote Keylogger uses a unique
way of delivering log files and all logged information will be reported
regardless of whether the remote PC is behind a firewall or router
configuration, and RemoteSpy can work perfectly around all popular virus scanner and spyware detector programs such as Spy
Sweeper, Symantec Norton, McAfee etc, etc.
3. I configured Remote Keylogger, now how do I deploy the software
You will need to distribute the Remote Keylogger module you created
while running the Remote KeyloggerConfig.exe application. This file
you created is the file you will send and run on other PC's. For
detailed e-mail and network deployment steps please refer to your
product documentation that was installed with Remote Keylogger.
4. How long does Remote Keylogger take to download over a Network
or via Email?
Unlike other monitoring packages, Remote Keylogger is VERY
small in size (93KB) and will take only a few seconds via email(even
on dialup) and only an instant over cable/network connections to
5. Will users know Remote Keylogger is installed when they run
Yes, Realtime-Spy requires the user to run the file you send them. When they run it they will be told that monitoring software is being installed, with an option to cancel.
6. How do I view my logs?
To view your activity logs for Remote Keylogger simply point
your browser to http://www.Remote Keylogger.com/username - where
your username is replaced by the username you received after purchasing.
You will be prompted for your username and password - enter these
as given to you when you purchased Remote Keylogger.
7. Can others access my Remote Keylogger logs?
Absolutely not! Every user has their own unique username and password
that only THEY know. You must specify your username and password
to login and view activity logs for your Remote Keylogger software.
8. I tried running my Remote Spy I configured, but nothing happens.
Your antivirus software may have corrupted the file. Please ensure the file is around 100-115kb and try configuring a new monitoring file.
9. Will Remote Keylogger work with ANY and ALL Internet connections?
Absolutely. Unlike other remote monitoring products, Remote Keylogger
does not care if the monitored PC is behind a hardware firewall
or router, or if the PC is on a network, cable, or dialup connection.
You will be able to ALWAYS access your logs via your webspace. No
need for IP addresses, port numbers, or directly connecting to the
10. Can I Install Remote Keylogger with a Floppy Disk?
Yes, just copy the Remote Keylogger file you configured to a floppy.
Then copy it from the floppy to the PC you want to install it on
- then run the file.
- Windows 95,98,ME,NT4,2000,XP or Vista
- Pentium Class PC (133mhz or higher)
- 3MB Hard disk space
- Windows TCP/IP Network