Windows
Mac OS
Mobile

Latest news: September 19th, 2016 - We have added new categories for monitoring products testing: Microphone and Webcam Recording etc... RSS Feed

Home>Testing and reviews>iSafeSoft Keylogger

iSafeSoft Keylogger

WARNING! This keylogger is no longer available.
Please open monitoring software review page to choose another one.

Rating: -

iSafeSoft Keylogger Box

  •  

Information

OS

Windows 8/7/Vista/XP/2003/2000

Language

English

License

Shareware

Developer

  • OS Support
  • Security
  • Monitoring
  • Online Monitoring
  • Reports
  • Other
more

iSafeSoft Keylogger Review

A keylogger with basic features. Supports lots of OS, including Windows 8. Easy to use. Recommended for home monitoring. In our testing it gets 521 of 1016 points.

New version hides itself better, makes screenshots every time a mouse button is clicked and now can be accessed by typing a pre-defined keyword!

Advantages:
  • Multi-OS support
  • Pleasant to look at, user friendly interface
  • Great URLs interception
  • Good visual surveillance
  • Sound recording

Disadvantages:
  • Available in English only
  • One side interception in messengers
  • Zero file activity monitoring
  • Not enough stealthiness level

The installation of iSafe All In One Keylogger is typical and takes very little time as we pass through very little number of windows, asking us almost no questions: Welcome → EULA → Select Destination Location → Ready to Install → Finish

After the installation is finished the keylogger automatically starts without asking us any questions. It then shows "iSafe Tips" window, informing us about the default hotkey combination, password and email address of technical support. Then it hides leaving only its icon in System Tray. We can't say the keylogger performs weird actions, yet creating a "Start iSafe All In One Keylogger Now" checkbox in "Finish" window of the installer is necessary in order for the user not to be surprised.

So we press the hotkey combination, put in the default password and see the configuration tool of iSafe All In One Keylogger. The information is grouped into sections, each of them having a corresponding tab in the left side of the window. The information itself is shown in the right part of keylogger's window. Data within the tabs is also grouped into categories, leaving the impression that the developers of iSafe All In One Keylogger worked hard to structure it. For example, the "Status" tab contains the information about the types of events that were logged, grouped into boxes; clicking any of the boxes opens the Log Manager where the information can be viewed.

Log Manager of iSafe All In One Keylogger has a ribbon interface, and two columns. All the reports' control and filtering options are located in the ribbon, all the groups of intercepted information are shown in the left narrow column, the information itself is shown in the main part of the window. The interfaces of both configuration tool and Log Manager are smart and well thought.

All the operating systems available in our testing are fully supported by iSafe All In One Keylogger.

Unfortunately, the situation with security of iSafe All In One Keylogger is almost opposite. The keylogger is password-protected and can be accessed by pressing a hotkey combination Its folder is hidden and the program can be accessed by typing a pre-defined keyword. What iSafe All In One can't do is to be installed remotely. It also can't be configured to warn the users about the fact they are being monitored or to be removed on a pre-specified date.

Everything is not so clear in "Monitoring" section, as iSafe All In One Keylogger not only can record pressed keys, capture clipboard content, log printed documents and started applications, but also provides its users with almost all of the options for configuring the visual surveillance, records mouse clicks and sounds that very little number of keyloggers can do. Unfortunately, it neither logs the log on/off time, nor the logon password. It also doesn't monitor the system inactivity time and file-activities.

Logging URLs is definitely one of the strong points of iSafe All In One Keylogger — it logs all the URLs visited in all the browsers taking part in our testing and also makes a screenshot every time a new site is visited. Unfortunately, it fails to cope with the rest of the tasks present in "Online Monitoring" section. It neither logs sent emails, nor received and intercepts only one side of chat conversations made in all the messengers that are present in our testing.

As for "Reports" section, iSafe All In One Keylogger can be configured to monitor only a pre-specified list of users, clear the log-files automatically and limit their size. It also allows you to perform a search in the log files. By the way, in current version you not only can send the log-files by email, but also upload them to FTP server. As for the other means of logs' delivery — they are absent in iSafe All In One Keylogger. The keylogger also can't be configured to monitor only the programs from a pre-specified list.

The list of features present in "Other" section is small, so only one of them is present in iSafe All In One Keylogger. It can react to a pre-specified list of keywords. Unfortunately, it can't block programs and websites, monitor on schedule and is available in English only.

Summing up we can say that a flexible functionality of iSafe All In One Keylogger and its well-thought interface make it an easy-to-use keylogger for monitoring in various situations.

Supported Features

Monitoring this group analyzes what monitoring functions the products has, such as keystroke, clipboard, file-activity, etc monitoring.

No

Yes

Yes

No

No

No

No

No

Yes

Yes

No

No

Yes

Yes

Yes

No

Yes

Yes

Yes

Yes

Yes

No

No

Online Monitoring the group that reflects the availability of the functions to monitor users’ online activity, such as URLs visited, 2-side chat conversations interception and emails sent/received.

Yes

Yes

Yes

Yes

Yes

No

Yes

No

No

No

No

Security this group shows how hidden the product is and what self-protection mechanisms it has.

Yes

Yes

Yes

Yes

No

No

Yes

Yes

No

No

Reports the group that basically analyzes the convenience of the intercepted information reading, including not only the ways to filter and show it, but also to deliver it remotely.

Yes

No

No

Yes

Yes

Yes

Yes

No

No

Yes

Yes

Other other functions that cannot be part of any of the other groups listed, though a still very important such as parental control functions, languages, reactions to specific keywords, etc.

Yes

No

No

No

No

No

No

No

OS Support this group reflect the number and quality of the operation systems supported by the products.

Yes

Yes

Yes

Yes

Yes

Yes

No

User reviews and comments

"iSafe keylogger really powerful and cost effective"

Posted by bosch on May 7, 2013
Version under review: iSafe AllInOne Keylogger 2013 Pro 6.2.0
User Rating
  • 1
  • 2
  • 3
  • 4
  • 5

Pros

It's really a mavelous keylogger I have ever seen.
Completely undetectable keylogger! (invisible/secretly mode)
Monitor Facebook,Chat/IM, password,websites,email,keystrokes
Send logs remotely and stealthily in background

Cons

Kind of expensive in fact
 

Add your review

Your Name:
Your E-mail:
Rate this product:
Title: 50 characters max
Pros: 10 to 1000 characters
Cons: 10 to 1000 characters
Summary (optional): 5000 characters max
Verification code: Captcha Captcha update
Add your review
Home>Testing and reviews>iSafeSoft Keylogger
IMPORTANT! Installing computer monitoring tools on computers you do not own or do not have permission to monitor may violate local, state or federal law.