terms-of-use.php

Scoring Methodologies

Here is a list of criteria developed by our team. We have completed a list of features based on current trends and our experience and divided them into four groups. All keyloggers presented on our website were tested and rated according to implementation or absence of these criteria.

Security
  • Invisible mode
  • Invisible program folder
  • Invisible in Task Manager
  • Hidden startup
  • Password protection
  • Keyword access
  • Hotkey access
  • Pre-configured Installation
  • Remote installation
  • Configurable self-removal
  • Remote uninstall
  • Custom alerts
  • Secured emails
Monitoring
  • Password logging
  • Keystrokes logging
  • Control keys logging
  • Mouse clicks logging
  • Clipboard monitoring
  • Applications monitoring
  • Start of user activity
  • End of user activity
  • Inactivity periods
  • Printer tasks
  • Sound recording
  • Video recording
  • Webcam snapshots
  • Live broadcast of the screen
  • Live broadcast of the webcam
  • Screen recording
  • Screenshots
  • Visited websites
  • Search queries monitoring
  • Social networks
  • Instant messengers
  • Application blocker
  • Website blocker
  • Scheduler
Reports
  • Monitoring all/certain users
  • Keywords filter
  • Daily statistics
  • Custom period statistics
  • Maximum log size
  • Customizable automatic deletion of logs
Log Delivery
  • Real-time Remote Viewing
  • Online Monitoring via a secure web account
  • Logs sent via email
  • Logs sent via FTP
  • Logs sent via LAN
  • Logs sent via Google Drive
  • Logs sent via Dropbox