New version hides itself better, makes screenshots every time a mouse button is clicked and now can be accessed by typing a pre-defined keyword!
- Multi-OS support
- Pleasant to look at, user friendly interface
- Great URLs interception
- Good visual surveillance
- Sound recording
- Available in English only
- One side interception in messengers
- Zero file activity monitoring
- Not enough stealthiness level
The installation of iSafe All In One Keylogger is typical and takes very little time as we pass through very little number of windows, asking us almost no questions: Welcome → EULA → Select Destination Location → Ready to Install → Finish
After the installation is finished the keylogger automatically starts without asking us any questions. It then shows "iSafe Tips" window, informing us about the default hotkey combination, password and email address of technical support. Then it hides leaving only its icon in System Tray. We can't say the keylogger performs weird actions, yet creating a "Start iSafe All In One Keylogger Now" checkbox in "Finish" window of the installer is necessary in order for the user not to be surprised.
So we press the hotkey combination, put in the default password and see the configuration tool of iSafe All In One Keylogger. The information is grouped into sections, each of them having a corresponding tab in the left side of the window. The information itself is shown in the right part of keylogger's window. Data within the tabs is also grouped into categories, leaving the impression that the developers of iSafe All In One Keylogger worked hard to structure it. For example, the "Status" tab contains the information about the types of events that were logged, grouped into boxes; clicking any of the boxes opens the Log Manager where the information can be viewed.
Log Manager of iSafe All In One Keylogger has a ribbon interface, and two columns. All the reports' control and filtering options are located in the ribbon, all the groups of intercepted information are shown in the left narrow column, the information itself is shown in the main part of the window. The interfaces of both configuration tool and Log Manager are smart and well thought.
All the operating systems available in our testing are fully supported by iSafe All In One Keylogger.
Unfortunately, the situation with security of iSafe All In One Keylogger is almost opposite. The keylogger is password-protected and can be accessed by pressing a hotkey combination Its folder is hidden and the program can be accessed by typing a pre-defined keyword. What iSafe All In One can't do is to be installed remotely. It also can't be configured to warn the users about the fact they are being monitored or to be removed on a pre-specified date.
Everything is not so clear in "Monitoring" section, as iSafe All In One Keylogger not only can record pressed keys, capture clipboard content, log printed documents and started applications, but also provides its users with almost all of the options for configuring the visual surveillance, records mouse clicks and sounds that very little number of keyloggers can do. Unfortunately, it neither logs the log on/off time, nor the logon password. It also doesn't monitor the system inactivity time and file-activities.
Logging URLs is definitely one of the strong points of iSafe All In One Keylogger — it logs all the URLs visited in all the browsers taking part in our testing and also makes a screenshot every time a new site is visited. Unfortunately, it fails to cope with the rest of the tasks present in "Online Monitoring" section. It neither logs sent emails, nor received and intercepts only one side of chat conversations made in all the messengers that are present in our testing.
As for "Reports" section, iSafe All In One Keylogger can be configured to monitor only a pre-specified list of users, clear the log-files automatically and limit their size. It also allows you to perform a search in the log files. By the way, in current version you not only can send the log-files by email, but also upload them to FTP server. As for the other means of logs' delivery — they are absent in iSafe All In One Keylogger. The keylogger also can't be configured to monitor only the programs from a pre-specified list.
The list of features present in "Other" section is small, so only one of them is present in iSafe All In One Keylogger. It can react to a pre-specified list of keywords. Unfortunately, it can't block programs and websites, monitor on schedule and is available in English only.
Summing up we can say that a flexible functionality of iSafe All In One Keylogger and its well-thought interface make it an easy-to-use keylogger for monitoring in various situations.
Monitoring Software Features
"iSafe keylogger really powerful and cost effective"
ProsIt's really a mavelous keylogger I have ever seen.
Completely undetectable keylogger! (invisible/secretly mode)
Monitor Facebook,Chat/IM, password,websites,email,keystrokes
Send logs remotely and stealthily in background