Usage
Instructions |
KeyGhost
usage instructions from external review by evilcthul@acidhardware.com.
Read
more >> |
What
is a Hardware Keylogger?
This page will explain exactly how a KeyGhost hardware keylogger is used.
The KeyGhost is
a very simple device to connect and use.
It resembles
a standard keyboard (PS/2) connector cable but inside the KeyGhost is
a tiny computer chip and a flash memory chip (non-volatile, same as in
smart cards). The tiny computer chip captures keystrokes as they are typed
on the keyboard, and the memory chip stores all of the keystrokes.
Installation
To install the
KeyGhost, all you need to do is plug it in between your keyboard cable
and your computer. The KeyGhost is ready to record the instant you plug
it in. Tamper evident seals are provided with each KeyGhost so that no
one can remove it without your knowledge (children, employees etc). The
seals wrap easily around both plugs that attach the unit to the keyboard
cable.
BEFORE
|
AFTER
|
|
|
For security
reasons the actual look of the external (stand-alone) KeyGhost
hardware keyLogger may differ slightly from this photo.
|
Viewing keystrokes
If you want to see what has been recorded, simply open any word processing
program (We recommend WordPad) and type in your password. When your password
has been correctly entered a 'Ghost' access menu will be displayed in
wordpad your screen. The menu gives you several options, including; 1)
Entire log download, 2) Section log download, 3) Wipe log, 7) Password
change, and other options. As soon as the 'Entire log download' option
has been selected (by pressing '1' on your keyboard), every word that
has been typed on the computer will be displayed for you to see. The KeyGhost
types back every keystroke in a way that doesn't interfere or causes System
Requirements: PC compatible computer with PS/2 keyboard port.
Learn how easy it is to operate
the KeyGhost hardware keylogger.
|
KeyGhost hardware
keylogger installs in under 5 seconds, even when computer is logged out,
password protected, locked or switched off. Just plug it in! Its quite
unobtrusive. Most users go months without examining the back of their
computer. Think now ... can you picture what the back of your computer
looks like at the moment?
If you want to browse
questions other users have asked, read the FAQ.
Why
do you need a KeyGhost™?
Security tool, investigation
tool, back up tool, and deterrent. learn
more >>
Here
is the KeyGhost Security Keyboard. It contains an internal
KeyGhost hardware keylogger completely concealed from view!
It behaves exactly
like a normal keyboard in every way, except that it records all keystrokes
typed on it into memory.
Only the administrator
can access the log.
TechExtreme
Review |
'The KeyGhost
has a number of uses. Being a college student I am often writing papers
or a news updates for my website when good old Windows crashes on
me. Using the KeyGhost I lose nothing and I am able to completely
recover whatever I was working on.' -Ben Welch-Bolen.
learn
more >> |
> Learn about Security
Keyboards <
|