PS/2 KeyLogger Wi-Fi Premium Purple Edition —- State of the art technology — This wireless keylogger is packed with State of the art electronics: two powerful processors, a full TCP/IP stack, a WLAN transceiver, a time-stamping module and 2 Gigabytes of memory. How does it work? But even so standard PS/2 keylogger functionality, it features remote access over the Internet. This wireless keylogger will connect to a local Wi-Fi Access Point, and send E-mails containing recorded keystroke data. You’ll also connect to the keylogger at any time over TCP/IP and view the captured log. – The built-in real-time clock will keep track of the time and date independent if the computer is turned on or not. The internal battery has a guaranteed lifetime of over 7 years. Time and date stamps will get inserted in the log file even as the keylogger is capturing keystrokes. All of the log file with embedded date and timestamps is then available for viewing the use of any text editor. – The KeyGrabber Wi-Fi Premium keylogger incorporates a built-in WLAN transceiver and TCP/IP stack, meaning it can connect to the Internet through a Wi-Fi Access Point. To do that, you will have to provide it some basic data, such as the Network ID and password (just like any WLAN device). Once connected to an Access Point, the keylogger will start sending E-mail reports with captured keystroke data to any recipient E-mail address you supply. This means You’ll keep track of what’s happening on the monitored computer from any place right through the world, just by checking your mailbox! – This Premium keylogger also features a TCP/IP interface, for on-demand access at any time. You’ll remotely download recorded data from the keylogger the use of special software delivered with the device. – The keep watch over software can communicate with multiple Wi-Fi hardware keyloggers, allowing to create entire networks of wireless keyloggers. This solution is particularly beneficial for monitoring several computers in a household or a office.
Background connection to the Internet over a local Access Point
Automatic E-mail reports with recorded keyboard data
On-demand access at any time through TCP/IP
No software or drivers required, Windows and Linux compatible
Transparent to computer operation, undetectable for security scanners