• Hidden program for tracking your computer. Spyware on your computer. How to detect and remove spyware

    Our library of examples of detecting and neutralizing spyware has already accumulated quite a lot of articles, and we decided to classify this material.
    The classification is based on the subjective assessment of technical specialists from our test laboratory. Since we plan to continue testing popular spyware, we believe that this classification will help users of the COVERT disguiser and visitors to our website better understand the place of each spyware in the mosaic of modern threats.

    We give each spy three ratings:
    The first is design and functionality.. The higher the score, the more opportunities the program provides for data theft and user tracking.
    The second is secrecy within the system. How difficult can it be to detect on a computer. The higher the score, the better program hides himself.
    Third - evaluates the spy’s protection from anti-spyware and the difficulty of neutralizing it. The higher the score, the more diligently the program clings to its existence on the computer and the more steps need to be taken to achieve it. complete removal. Some programs cannot be removed by simply erasing the file folder from the disk.

    — RLM: 8 / 3 / 2

    JETLOGGER allows you to monitor user activity at the computer, collects information about running programs ah, sites visited and key combinations used, structures the received data and displays them in the form of charts and graphs. You can enable automatic creation of screenshots at certain intervals. Hides the fact that information about activity on the device is collected.

    — RLM: 4 / 0 / 1

    Yaware.TimeTracker is a system for recording working hours and assessing the efficiency of employees at the computer.

    — RLM: 5 / 2 / 3

    Award Keylogger is a fairly popular spyware program that is described on many sites as powerful tool Real-time tracking with rich functionality. But we were not able to see all the listed functionality, although we tested the latest fully functional version. The program turned out to be not much better than the average spy.

    — RLM: 5 / 0 / 0

    Real Spy Monitor is designed to monitor activity on a computer and allows you to save information about launched programs, opened files and windows, take screenshots, monitor which sites users visit, intercept and save keyboard input.

    — RLM: 5 / 1 / 1

    LightLogger has a fairly standard set of functions: it tracks visited websites, takes screenshots at a given frequency, intercepts keyboard input in applications, browsers and email, remembers all running programs, and copies the contents of the system buffer.

    — RLM: 7 / 1 / 0

    REFOG Personal Monitor will provide full control over the system, recording any keystrokes in a log. In addition, he periodically takes screenshots so that the observer has a complete picture of what is happening on the computer. All reports are sent to the specified email. The spy's work is invisible on the computer: it does not reveal itself in any way and consumes very few system resources.

    — RLM: 5 / 3 / 3

    TheRat can be installed on your computer using social engineering. In addition to traditional keylogger functions, the program can monitor actions in application windows and respond to words, as well as take screenshots of the screen every time you press the Enter key. A special feature of the keylogger is that it works on the principle of incorporeal viruses.

    — RLM: 6 / 2 / 1

    Snitch collects data about user activity and transmits it to its server, from which it is sent to the control module and displayed in its interface.

    — RLM: 2 / 0 / 0

    Hide Trace is a typical screenshotter that monitors user actions, creating detailed report open windows by taking screenshots.

    — RLM: 6 / 8 / 6

    WebWatcher records all activity occurring on the PC: emails, instant messenger messages, information about visited sites, activity on Facebook/MySpace networks and everything that the user types in real time. Takes screenshots and tracks all search queries. All collected information is sent to special servers, where the observer can view the results of surveillance remotely.

    — RLM: 6 / 0 / 2

    DameWare Mini Remote Control Server allows you to connect and control remote machines via the Internet or local network. Can secretly, unnoticed by the observed, control all his actions.

    RLM: 7 / 2 / 2

    Kickidler - The program has good functionality, but is easy to detect and remove. There is a function for blocking entry into the COVERT secure platform, which can easily be bypassed using a masker.

    — RLM: 3 / 1 / 0

    Total Spy - the interface is extremely simple, the program is small in size and does not affect system performance. But the functionality in the program is only basic.

    — RLM: 7 / 8 / 5

    PC Pandora— hides in the system and controls the entire computer and Internet traffic. Takes screenshots, receives keyboard input, actions on visited websites, email, instant messengers and collects much other information about the user’s work. The program does not have a folder in which it stores its data. Everything is loaded into the operating system, and each new installation on the same or another computer is made with new file names.

    — RLM: 5 / 7 / 4

    Micro Keylogger- a well-hidden spyware that is not visible in the Start menu, taskbar, control panel-programs, process list, list launch Msconfig and in other places on the computer where it is possible to monitor running applications. It does not show signs of presence and does not affect system performance; it secretly sends a report by email or FTP server. Its activity is carried out through DLLs.

    — RLM: 4 / 0 / 0

    Expert Home— multifunctional program for covert surveillance and detailed recording of all actions performed on a computer with a remote tracking function, which allows you to view reports and screenshots anywhere, from any device, as long as you have Internet access.

    — RLM: 7/ 0 / 0

    Monitors a remote computer in real time, takes pictures of the user from the computer's webcam, records sounds in the room where the computer is installed, scans the file system, remotely downloads files, views and deletes system processes, and other functions standard for a spy program.

    — RLM: 5 / 1 / 1

    System Surveillance Pro provides everything you need to monitor your PC in hidden mode. The utility records text input, instant messages, applications used and sites visited, and also takes screenshots at a specified time interval or by event.

    RLM: 3 / 0 / 0

    KidLogger PRO, this is a keylogger with open source code, which can record sound from a microphone and take screenshots. Delivery of logs/screenshots is possible by email or to the manufacturer’s website, where they can already be viewed. It can also simply store logs with screenshots locally.

    — RLM: 7 / 0 / 0

    Remote Manipulator System - remote monitoring and control, allows you to connect to remote computer and control it as if you were sitting directly in front of its screen.

    — RLM: 6 / 2 / 1

    NeoSpy spy is a computer tracking program that allows you to conduct hidden monitoring of the system. Tracks all actions performed by users on the monitor screen via the Internet from a computer, smartphone and tablet.

    — RLM: 6/5/3

    SoftActivity Keylogger tracks and records all user actions on the computer.
    It works secretly and unnoticed even by savvy users; not a single process in the task manager, no files can be seen in the system.
    The configuration utility and uninstallation option are password protected.

    — RLM: 4 / 1 / 0

    Snooper is an audio spy designed to record sounds that are picked up by a microphone connected to the computer; in recording mode it is not displayed in the tray, and is not visible in the list of processes in the manager Windows tasks. As long as the microphone does not detect sounds, the spy remains in sleep mode.

    — RLM 5/0/0

    The Best KeyLogger is a program that allows you to always have full control over your computer.
    The program allows you to read the entire history of actions on your computer in your absence.
    With this program, you can view chat logs, as well as mail, and see which sites the user has visited.

    — RLM: 5 / 1 / 1

    SpyAgent is a program for complete control over user actions. Monitors system performance, including recording keystrokes, programs launched, files opened, and more. Allows you to record all online activity - FTP, HTTP, POP3, Chat and other TCP/UDP communications, including visited websites. Takes screenshots, sends collected data to the specified e-mail, it is possible remote control program.

    — RLM: 6 / 2 / 0

    Ardamax Keylogger - takes screenshots, intercepts clipboards and keystrokes on the keyboard. Spy has a hidden mode and is not visible in the task manager. The program creates a log of all actions for subsequent analysis.

    — RLM: 8 / 1 / 0

    Spyrix Personal Monitor allows you to conduct hidden control over any activity on your computer - in social networks(VKontakte, Odnoklassniki, Facebook, etc.), communication in chats and email, visiting websites and requests via search engines(Yandex, Google). Spyrix Personal Monitor is designed for centralized monitoring of all user activities.

    — RLM: 2 / 6 / 6

    All In One Keylogger logs all keystrokes, including language specific characters, conversations and conversation messages, passwords, email, clipboard information, microphone sounds, screenshots, Internet activities. The spyware does not appear in running processes.

    — RLM: 8 / 6 / 7

    Mipko Personal Monitor - monitors activity on your computer, monitors which sites are visited on the Internet, saves hard drive all user actions - keys pressed, sites visited, application launches, screenshots. When working in hidden mode, it is not visible by standard system tools and is not displayed in the list of processes. It works absolutely unnoticed, like an invisible person, works well with antiviruses and remains undetected in 95% of cases.

    — RLM: 3 / 1 / 0

    Free Keylogger Remote is capable of intercepting keystrokes and copied text from any application. It can also record names running applications, visited websites, take screenshots after a specified period of time. The spy operates in invisible mode and cannot be accessed. There is a function remote monitoring and sending daily reports by email.

    — RLM: 7 / 1 / 0

    SpyGo is a software package for covert monitoring and tracking of user activity on a computer. It is controlled remotely and allows for real-time monitoring. It works in stealth mode and remains invisible during monitoring.

    — RLM: 3 / 1 / 0

    The hidden agent Actual Spy is capable of monitoring all events occurring in the system: intercepting all keystrokes, detecting case and Russian layout, taking screenshots (screenshots), remembering the launch and closing of programs, monitoring the contents of the clipboard, recording Internet connections, register visited sites and much more.

    — RLM: 5 / 1 / 1

    Elite Keylogger— designed for secret monitoring of all types of user activity. The keylogger's capabilities include tracking all types of correspondence from ICQ to e-mail, websites visited by users, passwords typed and programs used. The spy generates snapshots of the user's desktop screen. Can send a report on user actions to an email after a certain fixed period of time.

    — RLM: 6 / 0 / 2

    Using the Power Spy utility, you can take screenshots from the screen at certain intervals, record keyboard strokes, and Internet pages visited. You can also view email messages that you have read using Microsoft Outlook and Microsoft Outlook Express and documents opened in Word and Notepad. Program for given parameters sends the report by E-mail or writes it to a hidden log file.

    — RLM: 6 / 5 / 5

    The STAKH@NOVETS software package is designed to monitor computer network enterprises. She gives full information about each employee. Surveillance of company personnel can be carried out in a completely hidden mode.

    — RLM: 6 / 0 / 3

    StaffCop monitors running programs, applications and websites on work PCs. Intercepts messages in ICQ, Skype, e-mail and other instant messengers. Takes pictures of the monitor screen, records keystrokes and much more that is part of the concept of “computer control”.

    (KGB) - RLM: 7 / 1 / 0

    KGB SPY is one of the most popular programs designed to spy on users personal computers. It intercepts and stores a detailed log of user actions on the hard drive, takes screenshots, records software launches, etc.

    — RLM: 1 / 1 / 0

    Punto Switcher, designed to change keyboard layouts in automatic mode on the computer. At the same time, it can be used as a keylogger if you make certain settings changes.

    You've probably heard about spyware. Yes, they exist. Many people confuse such programs with viruses, but this is not so. Spyware does not have harmful code; its function is different - to find out what you are doing on the computer and transfer it “where it is needed.” Basically, such programs can be used in business. For example, a company's security service may well install such programs on employees' computers in order to know what they are doing during working hours. Spyware has great functionality. They not only tell the “owner” what applications the employee opened, but also record all keystrokes, keep a list of files used, a list of Internet addresses visited, and even take screenshots of the desktop at a given time interval. Those. All entered logins and passwords, correspondence in QIP, Skype and other instant messengers, as well as time spent on Internet sites become available.

    If an employer installs similar programs on his company’s computers to protect commercial information and protect against fraud (with informing employees, of course), then this is quite understandable, but what about the protection of personal information? After all, such a program can be installed on your home computer, and you won’t even know about it (until your accounts on social networks are blocked, for example). Unfortunately, spyware is made in such a way that the user does not know anything about it. The tray icon does not hang, warnings do not appear, and, besides, processes do not hang. These programs are usually called only by pressing special hot keys.

    Let's look at several spyware programs.

    Real Spy Monitor

    This program is perfect for several people to work on one computer with operating system WindowsXP. A person who has installed RealSpyMonitor under his own account will always be aware of what other users were doing on this computer. Time and list of launched files, open windows, actions and visited pages on the Internet. You can also set up taking screenshots at a certain time interval.

    This program is ideal for home use, in order to protect children from visiting sites specified by the “owner” or launching files. The program is in English.

    Snitch

    Snitch is an easy-to-use software package that collects information about the user’s actions at the computer for the purpose of its subsequent analysis.

    Almost any spy program provides collected information in a form that is inconvenient for analysis, as a result of which most users use it only as a keylogger (Russian keylogger). Snitch offers convenient access to the collected data, providing limitless opportunities for studying the nature and efficiency of spending time of the user of the computer on which the Snitch tracking module is installed.

    Installing the Snitch client module is extremely simple and does not cause difficulties, and its operation on the computer does not have a significant impact on its performance, unlike other programs that monitor the computer. As a result, hidden monitoring of the computer takes place without any negative consequences that reduce the level of comfort of working in the applications used.

    Mipko

    This company has several products for different tasks: PersonalMonitor, EmployeeMonitor and TerminalMonitor. Accordingly, for home computer, to control the computers of company employees and to control the actions of employees on the terminal server.

    List functionality in general, standard, but there is one useful function - alarm mode. Its action is as follows: the administrator enters words into the program database that will be tracked by the keylogger. If a user whose computer is being monitored types one of the prohibited words, MipkoEmployeeMonitor immediately records this and notifies the administrator by email or other means. This function is useful, for example, to prevent leakage of confidential data.

    (Visited 2,806 times, 1 visits today)

    Greetings!
    Surprisingly, I see that there is genuine interest in the question, how to monitor your phone husband or wife - apparently, the topic of infidelity these days is more relevant than ever, and to address it we will continue to look for various opportunities to monitor a person through a phone - for example, a child - or your apartment - today there will be a slight development of the topic of the spy service from Google. "Visiting" us special program spy for phone, associated with the use of an existing Google account, which all smartphone users have on Android based.

    In general, I found two such programs - WardenCam and TrackView. The advantage of the first is that you can also connect your account to it Dropbox service and save videos from your phone to it. But from experience, it is not supported by all gadgets; in particular, my Nexus 7 did not want to work with it. Therefore, I will show in detail only the second one - TrackView.

    This is not just a program for organizing video surveillance through mobile phone— with its help you can create a full-fledged spy phone, with which you can track its location, watch the picture from the camera, listen to sound and even give commands into the device’s microphone. Many may say that following a person through a phone is unethical. Agree! But it can also be used for good purposes - for example, put it in your car while you go shopping for bread and, in case of theft, quickly track its location using GPS. Or turn on your child’s phone and be aware of where he is given time is located, or again, left in your apartment and used as a surveillance camera. Moreover, you can use this program as a free walkie-talkie - talk through the microphone with other phones connected to your account.


    So, first of all you need to download from Play Market free TrackView spy program and install it on all Android devices that we will monitor - it could be a smartphone, tablet or even a TV set-top box - then you can monitor the apartment even using it, if, of course, a webcam is attached to it . There is also a version for installation on Apple products or on a computer running Windows management. They can be downloaded from the official website of the program.

    The second condition is that the same Google account, which you registered in order to use the services of this corporation - Play Market, Youtube, Gmail etc. - any will do.

    And finally, thirdly, for all gadgets to work, the Internet must be working - WiFi or mobile does not matter, the main thing is that it is always on.

    Launch the application and log into your account on all devices.


    After adding each phone or computer, it will begin to appear in the general list. I added mine to the system samsung phone and a Nexus tablet.

    Opposite each of them is a control panel with three functions - viewing images from the camera, viewing geolocation data and controlling the microphone.

    1. Camera

    Here we find ourselves in the window for viewing the image transmitted by the built-in camera of the corresponding device. There is also the opportunity to call up another control panel - to change the camera, record video, or activate a microphone on the device for transmission to it voice messages.


    2. Geolocation

    Go back and click on the pointer icon - a page with Google maps will open, which will display the current geographical location of this object, which is determined either on the Internet or by GPS module, depending on what is activated on that phone.

    3. Sound signal

    By clicking this button we will create on another gadget beep call.

    Now let's go through the menu in the top panel of the program. In the second tab with the “Play” icon, you can view and play files recorded in memory.


    Under the next icon - exclamation mark— there is a message filter setting where you can configure the ability to receive notifications from a particular device.

    In the fourth point, you can enable motion detectors - if this function is activated, then with any detected movement in the field of view of the camera, an alert signal will be sent to other devices. Here you can configure so that this signal does not sound.

    Phone tracking via SMS

    There are other interesting and more universal software solutions to organize surveillance of a child’s phone, including via CMC. One of them is the SMS Mobile Spy program. Given mobile spy Built exclusively for parental management needs. To install on Android you need to download it from Play Store. When you first log in, you will be required to enter your Email and password.

    After this, you will not only have access to a map of the phone owner’s movements, but you will also be able to read messages sent from it.

    Another similar program for the phone is Spy To Mobile. Its job is to intercept incoming and outgoing SMS, contact lists and call history, which it sends to your Personal Account on the SpyToMobile.com server. To download intercepted data, the mobile phone must also be connected to the Internet via GPRS or Wi-Fi. However, the advantage is that Internet access may not be constant, and data will be transferred as the smartphone goes online. I provide demo videos that show the installation process and the user account on their website.

    These are some interesting programs with the help of which all computers, laptops and phones can be combined via the Internet into one tracking system - use it!

    Who among us hasn’t wanted to feel like a cool hacker at least once and break at least something? :) Even if not, then let’s talk about how great it would be to get a password from your mail/social network. the network of a friend, wife/husband, roommate thought at least once by everyone. :) Yes, and you have to start somewhere, after all! A significant part of attacks (hacking) involves infecting the victim’s computer with so-called keyloggers (spyware).

    So, in today’s article we’ll talk about what are free programs for monitoring computers on windows based , where you can download their full versions, how to infect a victim’s computer with them, and what are the features of their use.

    But first, a little introduction.

    What are keyloggers and why are they needed?

    I think you yourself have guessed what it is. As a rule, they are a kind of program that is hidden (although this is not always the case) installed on the victim’s computer, after which it records absolutely all keystrokes on this node. Moreover, in addition to the clicks themselves, the following is usually recorded: the date and time of the click (action) and the program in which these actions were performed (browser, including the website address (hurray, we immediately see what the passwords are for!); local application; system services (including Windows login passwords), etc.).

    From here one of the problems is immediately visible: I got access to my neighbor’s computer for a couple of minutes and I want to get her password from VK! I installed the miracle program and returned the computer. How can I look up passwords later? Looking for a way to take the computer from her again? The good news is: usually not. Most keyloggers are capable of not only storing the entire accumulated database of actions locally, but also sending it remotely. There are many options for sending logs:

    • A fixed email (there may be several) is the most convenient option;
    • FTP server (who has it);
    • SMB server (exotic, and not very convenient).
    • A fixed flash drive (you insert it into the USB port of the victim’s computer, and all logs are copied there automatically in invisible mode!).

    Why is all this needed? I think the answer is obvious. In addition to the banal stealing of passwords, some keyloggers can do a number of other nice things:

    • Logging correspondence in specified social networks. networks or instant messengers (for example, Skype).
    • Taking screenshots of the screen.
    • View/capture webcam data (which can be very interesting).

    How to use keyloggers?

    And this is a difficult question. You need to understand that just finding a convenient, functional, good keylogger is not enough.

    So, what is needed for a spy program to work successfully?:

    • Administrator access to a remote computer.
      Moreover, this does not necessarily mean physical access. You can easily access it via RDP (Remote Desktop Service); TeamViewer; AmmyAdmin, etc.
      As a rule, the greatest difficulties are associated with this point. However, I recently wrote an article about how to get administrator rights in Windows.
    • Anonymous e-mail / ftp (by which you will not be identified).
      Of course, if you are breaking Aunt Shura for your neighbor, this point can be safely omitted. As is the case if you always have the victim’s computer at hand (ala, find out your brother/sister’s passwords).
    • Lack of working antiviruses / internal Windows protection systems.
      Most public keyloggers (which will be discussed below) are known to the vast majority of antivirus software (although there are logger viruses that are built into the OS kernel or system driver, and antiviruses can no longer detect or destroy them, even if they have detected them). Due to the above, anti-virus software, if any, will have to be mercilessly destroyed. In addition to antiviruses, systems like Windows Defender(these first appeared in Windows 7 onwards). They detect suspicious activity in software running on a computer. You can easily find information on how to get rid of them on Google.

    These, perhaps, are all the necessary and sufficient conditions for your success in the field of stealing other people’s passwords / correspondence / photos or whatever else you want to encroach on.

    What types of spyware are there and where can I download them?

    So, let's begin the review of the main keyloggers that I used in my daily practice with links to free download their full versions(i.e. all versions are the latest at the moment (for which it is possible to find a cure) and with already working and tested cracks).

    0. The Rat!

    Ratings (out of 10):

    • Stealth: 10
    • Convenience/usability: 9
    • Functionality: 8

    It's just a bomb, not a keylogger! In working condition it takes 15-20 KB. Why be surprised: it is written entirely in assembly language (veteran programmers shed tears) and written mostly by enthusiastic hackers, due to which the level of its secrecy is simply amazing: it works at the OS kernel level!

    In addition, the package includes FileConnector - a mini-program that allows you to connect this keylogger with absolutely any program. As a result, you get a new exe of almost the same size, and when launched, it works exactly like the program with which you glued it together! But after the first launch, your keylogger will be automatically installed in invisible mode with the parameters for sending logs that you have previously specified. Convenient, isn't it?

    An excellent opportunity for social engineering (bring a game file/presentation to a friend on a flash drive, or even just a Word document (I’ll tell you how to create an exe file that launches a specific word/excel file in one of my next articles), launch, everything is fine and wonderful, but the friend is already invisibly infected!). Or just send this file to a friend by mail ( better link to download it, because modern mail servers prohibit sending exe files). Of course, there is still a risk from antivirus software during installation (but it will not exist after installation).

    By the way, using some other techniques you can glue any distribution together hidden installation(these are available in The Rat! and Elite keylogger) not only with exe files (which still raise suspicion among more or less advanced users), but also with ordinary word / excel and even pdf files! No one will ever think anything about a simple pdf, but that’s not the case! :) How this is done is the topic of a whole separate article. Those who are especially zealous can write me questions through the feedback form. ;)

    Overall, The Rat! can be described for a very long time and a lot. This was done much better than me. There is also a download link there.

    1. Elite keylogger

    Ratings (out of 10):

    • Stealth: 10
    • Convenience/usability: 9
    • Functionality: 8

    Perhaps one of the best keyloggers ever created. Its capabilities, in addition to the standard set (interception of all clicks in the context of applications / windows / sites), include interception of instant messenger messages, pictures from a webcam, and also - which is VERY important! - interception of WinLogon service passwords. In other words, it intercepts Windows login passwords (including domain ones!). This became possible thanks to his work at the level system driver and launch it while the OS is loading. Due to this same feature, this program remains completely invisible to both Kasperosky and all other anti-malware software. Frankly, I have not met a single keylogger capable of this.

    However, you shouldn’t delude yourself too much. The installer itself is recognized by antiviruses very easily and to install it you will need administrator rights and disabling all antivirus services. After installation, everything will work perfectly in any case.

    In addition, the described feature (working at the OS kernel level) introduces requirements for the OS version on which the keyloggers will work. Version 5-5.3 (links to which are given below) supports everything up to and including Windows 7. Win 8/10 as well windows family server (2003 / 2008 / 2012) are no longer supported. There is version 6, which functions perfectly, incl. on win 8 and 10, however, it is currently not possible to find a cracked version. It will probably appear in the future. In the meantime, you can download Elite keylogger 5.3 from the link above.

    No mode networking, therefore, it is not suitable for use by employers (to monitor the computers of their employees) or an entire group of people.

    An important point is the ability to create an installation distribution with predefined settings (for example, with a specified email address where logs will need to be sent). At the same time, at the end you get a distribution kit that, when launched, does not display absolutely any warnings or windows, and after installation it can even destroy itself (if you check the appropriate option).

    Several screenshots of version 5 (to show how beautiful and convenient everything is):

    2. All-in-one keylogger.

    Ratings (out of 10):

    • Stealth: 3
    • Convenience/usability: 9
    • Functionality: 8

    It is also a very, very convenient thing. The functionality is quite at the level of Elite keylogger. Things are worse with secrecy. Winlogon passwords are no longer intercepted, it is not a driver, and is not built into the kernel. However, it is installed in system and hidden AppData directories, which are not so easy to reach to unauthorized users(not to those on whose behalf it was installed). Nevertheless, antiviruses sooner or later successfully do this, which makes this thing not particularly reliable and safe when used, for example, at work to spy on your own superiors. ;) Gluing it to something or encrypting the code to hide it from antiviruses will not work.

    Works on any version of Win OS (which is nice and practical).

    As for the rest, everything is fine: it logs everything (except Windows login passwords), sends it anywhere (including e-mail, ftp, fixed flash drive). In terms of convenience, everything is also excellent.

    3. Spytech SpyAgent.

    Ratings (out of 10):

    • Stealth: 4
    • Convenience/usability: 8
    • Functionality: 10

    Also a good keylogger, although with dubious secrecy. Supported OS versions are also all possible. The functionality is similar to previous options. There is an interesting self-destruct function after a specified period of time (or upon reaching a predetermined date).

    In addition, it is possible to record video from a webcam and sound from a microphone, which can also be very popular and which the previous two representatives do not have.

    Eat network mode work, which is convenient for monitoring a whole network computers. By the way, StaffCop has it (it is not included in the review due to its uselessness for one user - an individual). Perhaps this program is ideal for employers to spy on their employees (although the leaders in this field are unconditionally StaffCop and LanAgent - if you are a legal entity, be sure to look in their direction). Or to keep track of your offspring who love to sit and watch “adult sites”. Those. where what is needed is not concealment, but convenience (including a bunch of beautiful log reports, etc.) and functionality for blocking specified sites/programs (SpyAgent also has it).

    4. Spyrix Personal monitor.

    Ratings (out of 10):

    • Stealth: 4
    • Convenience/usability: 6
    • Functionality: 10

    The functionality is at the level of the previous candidate, but the same problems with secrecy. In addition, the functionality includes an interesting thing: copying files from USB drives inserted into the computer, as well as remote viewing of logs through a web account on the Spyrix website (but we are going to download a cracked version, so it will not work for us).

    5. Spyrix Personal monitor.

    Ratings (out of 10):

    • Stealth: 3
    • Convenience/usability: 6
    • Functionality: 8

    I won’t describe it in detail, because... this instance does not have anything that one of the previous spies did not have, however, someone may like this keylogger (at least for its interface).

    What do we end up with?

    The issue of using a keylogger is more ethical than technical, and it greatly depends on your goals.

    If you are an employer who wants to control your employees, feel free to set up StaffCop, collect written permission from all employees for such actions (otherwise you may be seriously charged for such things) and the job is in the bag. Although I personally know more effective ways increasing the performance of its employees.

    If you are a novice IT specialist who just wants to experience what it’s like to break someone - and how this thing works in general, then arm yourself with social engineering methods and conduct tests on your friends, using any of the examples given. However, remember: the detection of such activity by victims does not contribute to friendship and longevity. ;) And you definitely shouldn’t test this at your work. Mark my words: I have experience with this. ;)

    If your goal is to spy on your friend, husband, neighbor, or maybe you even do it regularly and for money, think carefully about whether it’s worth it. After all, sooner or later they may attract. And it’s not worth it: “rummaging through someone else’s dirty laundry is not a pleasant pleasure.” If you still need to (or maybe you work in the field of investigating computer crimes and such tasks are part of your professional responsibilities), then there are only two options: The Rat! and Elite Keylogger. In the mode of hidden installation distributions, glued with word / excel / pdf. And it’s better, if possible, encrypted with a fresh cryptor. Only in this case can we guarantee safer activities and real success.

    But in any case, it is worth remembering that the competent use of keyloggers is only one small link in achieving the goal (including even a simple attack). You don’t always have admin rights, you don’t always have physical access, and not all users will open, read, and even more so download your attachments/links (hello social engineering), the antivirus won’t always be disabled/your keylogger/cryptor won’t always be unknown to them . All these and many untold problems can be solved, but their solution is the topic of a whole series of separate articles.

    In short, you have just begun to dive into the complex, dangerous, but incredibly interesting world of information security. :)

    Sincerely,Lysyak A.S.

    If you are already interested in spyware and are monitoring this market, then your situation is favorable, all that remains is to choose a program and find out the truth. But for many users, the problem arises precisely in the choice - who to believe, what really works, and how much it costs best quality? If you're at a crossroads, then this spy review best programs on the market for you...

    Thanks to my ex-wife, I became a pro at spying capabilities. So, I found out that various bugs, cameras and other attributes are of little use for catching an unfaithful spouse, since the main activity is usually carried out on social networks and chat messages. Therefore, only a wiretapping program can give a complete picture. But which program should you choose?


    First of all, you must clearly understand that when Google is such a service, in the Internet search results you will receive a lot of offers from detective agencies to magical ways of reading any information over the air. Therefore, to save your time on searching, I give you a clear schedule right here and now:

    — Only airborne infections are transmitted through the air!!! Remember this!
    — Detective agencies are expensive!
    — The wiretapping program should not cost more than $500! Because for this money she should not only transfer data to me, but also cook borscht and feed the cat. Spy technology doesn't cost that much.
    — There are a lot of spyware sellers on the Internet, and only a few manufacturers. Vendors buy software from manufacturers and resell it to you and the walrus. Therefore, it is always more profitable to buy from the factory.

    Separating sellers from manufacturers is easy if you understand it. The location, IP, links and the brand itself are all googled at once. Therefore, I present to your attention the TOP 3 spy software manufacturers from which you can choose:


    Manufacturer: Flexispy Ltd., USA Website: https://www.flexispy.com/ru/

    First of all, I would like to mention the FlexiSPY product. Its manufacturers spare no expense on new developments, product safety and customer support in their native language. For this, respect and first place to them!

    Advantages over competitors by points:

    — Invisibility
    For me, the most important thing is my safety, the program should not give away its work, because there is always a chance to improve the relationship... For almost a year of testing, FlexiSPY has never shown a single unmasking sign!

    — The widest functionality
    Basic functions such as interception SMS, calls, tracking by GPS And internet activity FlexiSPY clicks like a nut.

    The most popular functions are interception of messengers, FlexiSPY also has the widest range of functions - 18 current ones and they are not going to stop - WhatsApp, Facebook, Viber, LINE, Skype, WeChat, iMessage, BBM, Blackberry PIN, Yahoo, Snapchat, Hangouts, KIK, Telegram, Tinder, Instagram, QQ

    Let's move on to the advanced features - access to the camera and microphone is offered in complete package Extreme - recording telephone conversations subscriber camera pictures And environment recording phone via microphone.

    I can’t help but note the unique features of FlexiSPY – call interception And wiretapping the environment in real time. Today, due to legal nuances, these functions have been canceled for all other programs.

    When my wife went to a bar with her ‘colleagues’, I heard a lot of interesting things right here and now, and not later in the recording, so sometimes these functions are simply vital...

    - Price
    The product has a golden mean in this regard too. Quality costs money, but reasonable ones. Therefore, the cost of programs starts from 68 USD per month, which is quite acceptable. You can upgrade to the advanced version by paying the difference at any time. There is no need to reinstall anything!


    — Russian support
    The product has instructions and support in Russian. When I installed the program, I received advice about rooting and jailbreaking, including in Russian. This is very helpful for unsure users.

    — Stability
    Many competitors - Shadow copy, StealthGenie, SpyBubble and others have been forced to close in recent years due to legal issues that are very controversial in this business. Of course, no one returned anything to the users, so you need to choose a stable service.
    The product has existed since 2005, those 10 years, and this is more than stable for the spy business!

    Flaws
    Unfortunately, the developers never released a Russified version of the personal account, citing the fact that they have users all over the world. However, a very important part has been translated into Russian - this is the installation and configuration section of the program.

    mSpy

    Manufacturer: Bitex Group LTD., England Website: https://www.mspy.com

    The next winner of the rating is a manufacturer called mSpy. I can’t help but note that these developers also know their stuff and produce cool software. But there is one feature for the Russian-speaking audience - they do not have a Russian version of the site. Therefore, if your English is not very good, then read above about the competitor, and if this is not a problem for you, then below is my review of mSpy.


    Advantages of mSpy over competitors by points:

    - Price
    The cost of the standard mSpy package starts from 29.99 USD, which is undoubtedly lower than its main competitors and this is the main advantage. For this money you will get the basic functions of spy software - SMS, MMS, call history, contacts, email, photos and videos, Internet activity, calendar, notes, applications, GPS tracking, as well as complete service.


    - Solution without jailbreak
    Here you can give a standing ovation! Of course, anyone forced to spy on someone wants to do it without access to the device... but the reality is that this is impossible. However, the mSpy developers offer one solution, which I cannot call an alternative, but it may suit a certain category of users - pumping data to personal account from iCloud.

    This solution is only available for iOS devices, only if you know the username and password for account iCloud, and only if data synchronization with the cloud is enabled on the device.
    The available functionality in this case is Whatsapp, iMessage, SMS, MMS, call history, contacts, internet activity, calendar, notes, applications for 69.99 USD per month.



    These are unique features of mSpy; no other competitor has them.
    If you control your child, then blocking applications and sites is a very important function, you will agree. The child will not be able to open and view what you do not want, but cannot forbid him.

    In the case of spouse control, a situation may likely arise where you do not want any subscriber to get through. But don't forget about alternative ways communications.


    — Skype for support
    Customer support is important for every client, especially when you are not buying Russian software and speak only your native language. In this case, of course, you need to choose a program that is supported in Russian. However, large corporations cannot approach each client individually, and they use special websites to support their clients; this is not entirely convenient for users who are accustomed to simple methods communication. In this case, the advantage of mSpy is obvious - customer support via regular Skype at any time!


    Flaws
    Like FlexiSPY, mSpy has not translated its personal account into any other language from English. This is a drawback to using the program for many users.

    TalkLog

    Manufacturer: Talklog.Net

    The third place in the ranking is very interesting software TalkLog, but it only works on the Android platform. It is interesting because it is sold by the manufacturer, and it is completely Russian-language.
    This is a huge advantage, you might think, but this application has very little functionality.


    In details:

    Russian-language software
    The entire program is in Russian, including installation file. I tested it myself on my phone, and I must note that the installation takes no more than five minutes, everything is very simple and understandable to the most dense user. However, I recommend reading this post to the end.


    In connection with this easy installation TalkLog cannot be considered as a full-fledged tracking program, but rather as lightweight application monitoring of some phone functions - calls, audio control, SMS, MMC, media, location, Internet activity, applications and the ability to turn the device off and on.

    Built-in chats are completely absent; who uses SMS these days? The cost of the program corresponds to the functionality.


    Since the program is installed without , it remains in the list of applications and can always be detected by the user, but this is the difference between downloading a powerful tracking program to the root folder of the phone and installing simple application in 2 clicks - remember this!


    I can briefly summarize this long post like this - if you are looking for value for money, are worried about not being found out and want to know everything, then your choice. If you're on a budget or looking for some way to read information via iCloud without access to your phone, definitely choose mSpy. Well, if you need a solution for Android, but you do not want to use customer support and want to see only the general activity of the subscriber without details and at a very low cost, then TalkLog should suit you!

    If you have questions or suggestions, I will always comment!