About us |
Contact us |
Order Form |
Private Investigation |
Press Releases |
Terms of Sale
Spy Emporium CPU Monitoring: Hardware
CPU Monitoring /
$79.99 SALE $49.99
NEW AGE! NEW WORLD!
NEW MODERN COMPUTER SECURITY TECHNOLOGIES!
WHO IS USING KEYKatcher? :
- Concern parents
- IT Professionals
- Private Investigators
- Law Enforcement
HELP GUIDE AGAINST:
- Online Predators
- Low Productivity
- Employee Fraud
- Data loss from computer crash & power failures
KEYKatcher 64K mini Hardware Keyloggers
Ideal keylogger for monitoring your home computer activity. There is no monitoring software to install - just plug it in!
So, you know you need a keylogger...
The next step is deciding which type of keylogger is best for you: hardware or software?
In order to help you understand the benefits of hardware keyloggers we've assembled the following
"Top 10 Reasons to Choose a Hardware Keylogger". We hope that you find this information helpful in making an informed decision about your computer monitoring needs. If you are left with any questions
after reading about hardware keyloggers please don't hesitate to give us a call at 713-774-1000
TOP 10 REASONS TO CHOOSE A HARDWARE KEYLOGGER
|Features||Hardware Keyloggers||Software Programs|
| Installs in seconds, just plug it in! || Must be installed on hard drive |
| Will not reduce system performance in any way. || Software requires CPU cycles, which WILL slow your system down. Software which performs screen captures can slow your system down dramatically.|
Ease of Use
| Very easy, use in conjunction with any word processor or text editor you're already familiar with. || Requires learning a new software program. |
| Yes. Can record on one computer and read out on another. Memory remains intact even when the device is unplugged. ||In most cases software programs require that recording and viewing be done on the same computer.|
| None. All data is stored in the KEYKatcher key logger internally. || Requires use of RAM space for running the software and processing the data. |
Hard Drive Usage
| None. Uses no hard drive space. ||Software installation requires valuable hard drive space. |
Operating System Independent
| Works on all PC operating systems. (Linux, Windows, Free BSD, Dos etc.) || Usually runs on only one operating system. |
Compatibility w/ other software
| Because KEYKatcher is not software, it cannot interfere with other programs on your system. || Vulnerable to detection by anti-virus and anti-spy programs. May also cause conflicts with other programs that compete for system resources (interrupts, RAM, hard drive space). |
| Begins recording the moment your computer is turned on. Records until computer is turned off or device is unplugged. || Cannot begin recording until software is launched by the operating system. Stops recording if software is shut down or disabled or detected by an anti-virus program.|
| Simply unplug a KEYKatcher key logger to uninstall it. || It can be very difficult to remove a software program, and all its components, from your system. |
KEYKatcher Hardware Keyloggers for PS/2 Keyboards (PC)
64K KEYKatcher Mini Keylogger|
The perfect key logger for monitoring computer activity at home.
If your keyboard connector resembles this one, you'll need a KEYKatcher key logger.
TESTIMONIALS FROM PC MAGAZINE
This is the best way to know what's really going on in your home. It ended months of guesswork and bickering. In short, I suspected my live-in girlfriend was talking with another man and I was treating her poorly because of it. It wasn't until I got KEYKatcher that I realized she WAS talking to a manů.about obtaining a very delightful, well-thought gift for ME... It's the best money I've spent in years.
Buying KEYKatcher has been the best thing. I have suspected my partner of infidelity for quite some time. Thanks to this brilliant product my eyes have been opened to the person he really is (a total stranger) and how very little I mean to him. The deception is over and I will now move on to a more valued future.
Your product has saved my family.
I was able to discover a hell of a lot going on in my home, thank you.
Please tell us about your experience with KEYKatcher:
How KEYKatcher Key Loggers Work:
The KEYKatcher keystroke recorder is a powerful tool which provides valuable information about computer activities. It is very simple to install and use.
KEYKatcher key loggers resemble a standard connector but inside this key logger is a microcontroller and a FLASH memory. The microcontroller interprets the keystrokes as they are typed and stores them in the FLASH memory (for later review).
To install the KEYKatcher all you need to do is plug it in between your keyboard cable and your computer (see image). The KEYKatcher is ready to record the instant you plug it in. Heat-shrink tubing is provided with each KEYKatcher so that you may attach the unit to the keyboard cable creating a tamper-evident seal which cannot be removed without your knowledge.
When you want to see what's been recorded, simply open any word processing program (Microsoft WordPad recommended) and type in your password. As soon as your password has been correctly entered, a menu will be displayed on the screen. The menu gives you several options, including: view memory, keyword search, and NETPatrol.
Applications range from parental monitoring to business investigations to computer forensics. The KEYKatcher works with any PC operating system. Since it stores keystrokes in a FLASH memory, you can record on one computer, unplug it, then read it out on another computer. This also means that no data will be lost in the event of a power outage, which makes the KEYKatcher a great backup device. When you're ready to see what the KEYKatcher has recorded, open your word processor, type in your password, then choose the 'view memory' option. The KEYKatcher will 'play back' every keystroke that's been recorded. If you're concerned with internet usage, use the NETPatrol search function to identify all web addresses that were typed.
Frequently Asked Questions:
Won't my children/employees just unplug the device? No. Not if you have installed the tamper-proof seal (heat-shrink tubing) which is shipped with each device.
Does the KEYKatcher work on a USB keyboard? No. It only works on PS/2 keyboards. Older PC's which use the 5-pin DIN connector require an adapter set. There is no adapter set which will allow USB operation.
How can I save the information that I have read out? Once the information has been dumped into your word processor/text editor, save it as you would any other file.
Why are some characters not stored, such as Control characters? When the device is being read out, the characters are coming to the computer just as if you had typed them. If the actual control character was sent to the computer, it might trigger undesired events to occur within the host program. These characters could be sent to the computer in a different form, but would be of little use for the applications this product is designed for.
Could this device be used to restore a spreadsheet lost due to a power outage/system lock-up? No. Many characters, such as up arrow, down arrow, page up, and page down are not stored. Trying to re-play the key sequence inside of a spreadsheet would lose most of the formatting information.
Why is the device not recording? The device has the recording disabled, or the memory is full. To resolve this situation, either the recording needs to be enabled through the menu options, or the device needs to be erased through the menu options.
Why is my keyboard not working (characters do not appear on screen)?
The KEYKatcher device is not fully plugged in.
Why is nothing happening when I type the password? This could be due to many reasons. (1) The password was not typed correctly; (2) There is not a host program running (i.e. WordPad) (3) The password was not typed in sequence with no mistakes and no backspaces.
How can I type in the password if I have made a mistake? Just start typing the password in from the beginning. It is not necessary to backspace over the error. Just start typing the password again, beginning with the first character.
Will the KEYKatcher work if I plug it into the mouse port? No. The KEYKatcher will only work if it is plugged into the keyboard port. The keyboard and mouse port have the same connector, which can cause confusion. The keyboard port is generally labeled with a picture of a keyboard and/or an orange connector.
After selecting "View Memory", is there any way to stop the full memory dump from occurring? No. If you really NEED to stop the KEYKatcher from dumping its memory contents, unplug it from the back of the computer, and re-insert it. It will not continue to send characters after it is re-inserted.
What happens when the memory fills up? The KEYKatcher will stop recording. It will not begin recording again until the memory has been erased (memory is erased through menu options). If you never check the device, you are not really monitoring activity.
Why won't it work on an European (QWERTZ) keyboard? The keys are re-mapped, so you must use the default password of 'kezkatch'.
Why won't it work on a French (AZERTY) keyboard? The keys are re-mapped, so you must use the default password of 'keykqtch'.
The Original Hardware Key logger - No Software to install!
This Agreement is between Allen Concepts, Inc. ("ACI") and you, the user or installer of the KEYKatcher keystroke recording device (the "Device"). Your installation or use of the Device indicates your consent to all of the terms of this Agreement. If you do not agree to any term of this Agreement, do not install the Device. Return the bag unopened to the place of purchase for full refund.
The Device was designed and is to be used solely for parents to monitor what their children are doing on the computer and for businesses to monitor what their employees are doing on the computer (the "Permissible Uses").
The Device may not be used to violate the privacy rights of others, or to access or intercept electronic communications in violation of wiretap statutes, or to violate company regulations ("Impermissible Uses"). Impermissible Uses include, but are not limited to the following acts: retrieval of credit card information, passwords, personal and/or medical information, confidential and/or proprietary information, or trade secrets.
Privacy and wiretapping laws change from time to time and vary from state to state. It is your responsibility to ensure that you are in compliance with federal, state, and local laws.
MUST POST NOTICE of MONITORING
If anyone other than you will be using the computer on which the Device is installed, you agree to post a notice visible to each user of the computer to the effect that (i) activities on this system may be monitored and recorded and (ii) that anyone using this system expressly consents to such monitoring and is advised that if such monitoring reveals possible evidence of unauthorized or criminal activity, such evidence may be provided to company or law enforcement officials.
SERIAL NUMBER FOR INVESTIGATING ILLEGAL ACTS
A unique serial number may be electronically stored in the Device to aid company and law enforcement officials in the investigation of any unauthorized or illegal acts that may be committed with the Device. You agree to permit ACI to assist these officials by providing serial number and sales information as necessary in the course of the investigation. ACI may request the assistance of its distributors and customers in providing information relating to the serial numbers of such Device(s), and you agree to cooperate with such requests.
The Device contains software and firmware instructions (the "Program") on the internal microcontroller. The Device and Program are protected by copyright and other intellectual property laws.
ACI hereby grants you the right to: a) use the Program for the Permissible Uses in the United States for as long as you own the Device.
b) view, copy, print and distribute copies of the information provided by the Device provided (1) the information is used for informational purposes only; and
(2) any copy of the information (or portion thereof) includes the following copyright notice: (c)2000, Allen Concepts, Inc. All Rights Reserved. This license is limited to the rights above. Therefore, you are expressly prohibited from taking any other action with the Device, including but not limited to:a) modify, reverse engineer, de-compile or disassemble the Device or the Program;
b) make any attempts to defeat the code protection which is in place on the internal microcontroller;
c) make any attempts to read or copy the Program;
d) attempt to cut open the casing around the Device;
e) rent, lease, lend, or sublicense the Device to others;
f) transfer your rights to another, unless the recipient agrees to the terms of the Agreement. LIMITED WARRANTY
ACI warrants that the Device, if provided by ACI, is free from defects in material and workmanship and for ninety (30) days from the date of original purchase of the Device, provided the Device was not subject to accident, abuse, or improper use.
THIS IS A LIMITED WARRANTY AND ALL OTHER WARRANTIES ARE EXPRESSLY DISCLAIMED, INCLUDING BUT NOT LIMITED TO WARRANTIES OF TITLE, NON-INFRINGEMENT OR IMPLIED WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. ACI'S SOLE LIABILITY FOR ANY BREACH OF THIS WARRANTY SHALL BE, IN ACI'S SOLE DISCRETION: (i) TO REPAIR OR REPLACE YOUR DEVICE.
ACI will honor this warranty only if you inform ACI of your problem with the Device during the applicable warranty period and promptly provide evidence of the date the Device was originally purchased. This warranty is void if you violate the terms of this Agreement.
To invoke the warranty, complete the warranty form found in the back of the Operating Manual or at www.keykatcher.com. Send the completed warranty form, the defective device, and a copy of the purchase receipt or other evidence of the purchase date to: ACI, 1900 W. Chandler Blvd., Suite 15-264, and Chandler, AZ 85224. Include your name, address, and telephone number. ACI will repair or replace the device and return it to you. If the device is working properly and the password stored inside the Device does not match the password provided on the Warranty Form, you will be charged $10 for resetting the password. The Device will be returned to you along with the new password.
If you have forgotten your password, send the Device to: ACI, 1900 W. Chandler Blvd., Suite 15-264, Chandler, AZ 85224. Include your name, address, and telephone number. ACI will reset your password and charge you $10 for this service. The Device will be returned to you along with the new password.INDEMNIFICATION
You agree to defend, indemnify, save and hold ACI harmless from any and all claims, demands, liabilities, costs or expenses including direct, indirect, incidental or consequential damages and reasonable attorney's fees resulting from the Device, including loss of business or profit.
LIMITATION OF LIABILITY
UNDER NO CIRCUMSTANCES AND UNDER NO LEGAL THEORY, WHETHER TORT, CONTRACT, OR OTHERWISE, SHALL ACI OR ITS SUPPLIERS OR RESELLERS BE LIABLE TO YOU OR ANY OTHER PERSON FOR ANY INDIRECT, SPECIAL, INCIDENTAL, OR CONSEQUENTIAL DAMAGES OF ANY CHARACTER INCLUDING, WITHOUT LIMITATION, DAMAGES FOR VIOLATION OF THE RIGHT TO PRIVACY, VIOLATION OF WIRETAPPING STATUTES, LOSS OF GOODWILL, WORK STOPPAGE, COMPUTER FAILURE OR MALFUNCTION, OR ANY AND ALL OTHER COMMERCIAL DAMAGES OR LOSSES. IN NO EVENT WILL ACI BE LIABLE FOR ANY DAMAGES IN EXCESS OF THE PURCHASE PRICE, EVEN IF ACI SHALL HAVE BEEN INFORMED OF THE POSSIBILITY OF SUCH DAMAGES, OR FOR ANY CLAIM BY ANY THIRD PARTY.
You may not export or re-export the Device or the Program (i) into (or to a national or resident of) Cuba, Iraq, Libya, Sudan, North Korea, Iran, Syria or any other country to which the U.S. has embargoed goods; or (ii) to anyone on the U.S. Treasury Department's list of Specially Designated Nationals or the U.S. Commerce Department's Table of Denial Orders.
This Agreement shall be governed in all respects by the laws of the United States and the State of Arizona, except for conflict of laws provisions. The parties agree that for any dispute, controversy or claim arising out of or in connection with this Agreement, venue and personal jurisdiction shall be in the federal or state court with competent jurisdiction located in Maricopa Country, Arizona.SEVERABILITY
The provisions of this Agreement will be deemed severable, and the invalidity or unenforceability of any provision will not affect the validity or enforceability of another provision hereof.
This Agreement constitutes the entire agreement and understanding between the parties and may be amended only by a writing executed by both parties.
All Materials are the property of Allen Concepts, Inc Copyright 2000 Allen Concepts, Inc. All Rights Reserved.