New version of Perfect Keylogger can be configured to uninstall itself on a pre-specified date, yet doesn't log both sides of chat conversations in AIM.
- Multi-OS support
- Grouping of the intercepted information into categories
- Mouse-clicks recording
- Multi-language interface
- Both sides interception in almost all of the messengers
- Good visual surveillance
- Good URLs' interception
- Not enough stealthiness level
- A bulk of steps to follow during the pre-installation
- Zero file activity monitoring
The process of Perfect Keylogger's installation is simple, but has a lot of steps to follow: welcome screen, EULA, the screen asking us to create a keyword, using which all the executable files will be renamed, the next one, asking to select the folder where we want the program to be installed to and to choose the installation type (Regular or Stealth) and the last one, where we should decide whether we want to create the folder with shortcuts in "Programs" menu and make it visible for all PC users or not. After the program is installed we mark the item "Launch installed program now" and click "Finish" — installation part is now complete.
We right-click the Perfect Keylogger's icon, appeared in System Tray and choose "Options…" — "Perfect Keylogger Options" interface opens. Its screen is divided into two parts: the left one that has the list of the groups which all the configuration options are divided into, and the right one that shows us the content of each of the groups. Everything is simple, clear and user-friendly. The intercepted information is viewed in the Log Viewer — separate window that is also accessed from System Tray. It is also divided into two parts: the top one has the calendar and 5 buttons ("Open log…", "Save log as…", "Find…", "Delete these records…" and "Close") and 4 buttons, each of which switches the main part of the Log Viewer to show a specific group of the information intercepted, namely: "Keystrokes", "Chats", "Screenshots" and "Websites". Everything is also very simple and clear.
As for the functionality, the strongest points of Perfect Keylogger are as follows: interception of both sides of all the messengers listed in our testing including Skype, great visual surveillance (all the functions available in our testing, except the "Screenshots of visited web-sites" are implemented) and good, though not perfect, interception of URLs (URLs made in Safari are not intercepted). What is also good in Perfect Keylogger is its availability on the languages different from English, what is bad — its interface isn't multi-language, so you will need to download and install the version translated to your language as the language can't be switched from inside Perfect Keylogger's window.
The weaknesses of Perfect Keylogger are its inability to log any file-activity, system log on/off time, intercept outgoing and incoming emails, total absence of any parental control functions and low filtering options (it is impossible to set up the maximum log-file size or configure their automated clearance). Its stealthiness level also needs upgrading — unfortunately, the product is very easy to find.
Summing up we can say that Perfect Keylogger will come in handy for all the groups of users that value simplicity and quality, but pay less attention to stealthiness and availability to filter the intercepted information.