WARNING! This keylogger is no longer supported by its developers! Proceed to monitoring software review page to choose another one.
- Pleasant to look at, user friendly interface
- Multi-OS support
- Ability to copy log-files to a portable device
- Configurable self-removal
- Great file-activity monitoring
- System-inactivity time recording
- Great visual surveillance
- Weak URLs' interception
- Not enough stealthiness level
- One side interception in messengers
Installation process is very simple, the program can be installed only in stealth mode, so it doesn't ask you where and in which mode it should be installed, doesn't ask you to create a password, to choose whether to install any shortcuts, etc. What is also very important — it doesn't ask a user to reboot his PC. All this allows the keylogger to be installed in about 4 seconds, that cannot but be appreciated. After clicking "Finish" button the window asking to enter the default password appears. After typing in the word "user" appears another window giving us the information about the default hot key combination and the default password and warning us that for security reasons we will need to press the hotkey and enter the password each time we need to access the program. That's a positive point.
The interface of the keylogger is the same, as in the previous version. It is separated into two halves: the left one is smaller and is divided into sections, after clicking one of the sections its content appears in the right, bigger half of the program window.
Unfortunately program's functionality changed for the worse. Stealth Keylogger 5.5 was tested with the newest versions of MSN, ICQ, AIM and Yahoo instant messengers and with Skype. Unfortunately, the keylogger intercepts both sides of conversations made in MSN and Yahoo messengers only. What also became worse in the program is URLs interception — Stealth Keylogger 5.5 intercepts URLs visited in Internet Explorer only (the previous version also intercepted links in Safari though). The rest of the functions didn't change — "File-activity monitoring", "Log transfer options" and "Visual surveillance" features are, as before, implemented just greatly — log files can be delivered by all the means taken into consideration in our testing, other two sections would also have received maximum if the program could log the copying of files and make on-mouse screenshots. The program also has a series of rare functions such as "Configurable self-removal", "System inactivity time recording". Such functions as "Screenshots of visited web-sites" and "Logs copied to a portable device" were already mentioned, but we would like to accentuate the fact that they are difficult to find in the majority of keyloggers.
Unfortunately, despite the fact that some functions are now lost (though we hope not for a long time) nothing new is added — there is still no "Parental control" and emails' interception in Stealth Keylogger. As for the stealthiness rate — its level is still the same — the program folder can be found with the help of turning on the showing of hidden files and simple Windows search, though the program is still totally invisible in Task Manager, System Tray and Start Menu, its directory is hidden.
Summing up we can say that Stealth Keylogger will come in handy to all groups of keyloggers' users. This is still a very advanced product with both good functionality and stealthiness level. We wish Amplusnet to fix all the errors appeared in this version and improve Stealth Keylogger's results in our testing.
Monitoring Software Features