Hardware keylogger with time and date stamping.KeyGhost SX TimeDate - 1MB
Supervise PC activity and productivity at work. Powerful and easy to use workplace security and audit tool. $349 USD

“Customer satisfaction guaranteed”
KeyGhost SX Home Support Products Latest reviews Helpdesk Order online
Web site navigation

>> New Products
>> Demonstration
>> Specifications
>> F.A.Q.
>> Order Online

More information
>> Company Information
>> Legal Disclaimer
>> Patent Information
>> KeyGhost Homepage

Order KeyGhost SX Online
Speedy FedEx delivery

Speedy delivery with FedEx International Priority
Delivered in 2-5 days international priority.

 

FACT:
Software computer monitoring products are extremely difficult to use.
KeyGhost provides very easy installation and operation.

 

“Analyst firms suggest that as many as 70% to 90% of security breaches come from the inside”

 

“KeyGhost Ltd’s market-leading keystroke monitoring security solutions are in place at more than 100 Fortune 1000 companies and government entities.”

Why?

Productivity, Resource Conservation, Security, Liability, Intellectual Property Incidents.

 

Read what the technology press is saying about KeyGhost

“I was surprised how easy KeyGhost was to install. The very epitome of plug and play.”
Computer Active

“KeyGhost excels in every department.”
Acid Hardware

“We were unable to defeat the KeyGhost… we tried everything… KeyGhost amazed us.”
Mostly Creative Workshop

“What do I think of this thing? Well, let's put it this way. If you want it, you'll have to pry it from my cold, dead fingers.”
Dan’s Data

 

User Comments

“KeyGhost just reduced my stress almost 100%!”
Baron R. K. Von Wolfsheild
(Appeared in Time magazine, 15 years experience in games design, responsible for such classic games as Galactic Invasion and Firepower)

New Product!
KEYGHOST ADDS VALUABLE TIMEDATE STAMP INFORMATION TO THE LOG OF RECORDED KEYSTROKES.

Are you losing productivity because you can't keep track of PC usage?

Do you really know how long your employees spend on-task?

Can your business afford to fund non-productive hours?

Are you effectively harnessing the huge potential of your work force?

If you don't keep track of PC usage, alot of your business could be walking out the door. And you may not even realise it!


Keylogger discreetly records and TimeDate stamps everything typed, including emails, chatroom activity, instant messages, website addresses, internet searches and more...

Keep track of PC usage and monitor your sensitive PCs and data entry terminals for backup and to detect unauthorized activity.

Order a KeyGhost Keylogger Pinpoint computer misuse, lost productivity and fraud.

Cannot be detected or disabled with software scanners.

Can be unplugged and information retrieved on another PC.

TimeDate KeyGhost is the fastest way to monitor your company PCs!
No software installation is necessary to record or retrieve keystrokes.
Patent Pending built-in access menu for high-speed transfers.


KEYLOGGER INSTALLS IN UNDER 5 SECONDS!

Spyware scanners cannot detect KeyGhost SX Keylogger

KeyGhost Time and Date keylogger plugs in between your keyboard and Desktop PC.
Tamper evident seals - included - help detect unauthorized removal of KeyGhost.

TimeDate KeyGhost SX is injection moulded inside solid black plastic so it looks exactly like an ordinary adapter plug.


PROTECT YOUR ORGANISATION

If you don't keep track of PC usage, alot of your business could be walking out the door. And you may not even realise it!

Here is your opportunity to see every keystroke that is typed on your company PCs, and find out what is going on inside your company. Then you can use this information, to keep your business running smoothly and on-track!

Once installed, KeyGhost keylogger discreetly captures and records all keystrokes typed, including chat conversations, email, word processor, or even activity within an accounting or specialist system.

KeyGhost is completely undetectable by software scanners and provides you with one of the most powerful stealth surveillance applications offered anywhere.

Unlike software keyloggers that can be switched off or have their stored keystroke data modified, stolen or erased, KeyGhost is an unobtrusive hardware device and only you can read the data inside.

Because KeyGhost uses STRONG 128-Bit encryption to store the recorded data in it’s own internal memory (not on the hard drive), it is impossible for a network intruder to gain access to any sensitive data stored within the device.


PATENTS PENDING

TimeDate KeyGhost SX uses a Patent Pending method to enable the highest speed transfer currently achievable - over 450 characters per second - without the need for special adapters, or even to unplug the device. This is 3 times faster than the 'KeyGhost' and 'KeyGhost II' models.*

TimeDate KeyGhost SX features Patent Pending dual-mode time and date stamping allowing maximum flexibility when configuring the recording of time and date information along with the stored keystrokes. This improves memory efficiency and reduces the time it takes to read and understand the recorded keystroke log.

Order a KeyloggerKeylogger


RELIABLE + PORTABLE + SECURE

TimeDate KeyGhost’s built-in ‘Ghost menu’ system allows you to search, retrieve and privately view what has been recorded using any standard text editor (e.g NotePad, WordPad...etc).

Retrieve the recorded keystrokes by simply typing your chosen password into any text editor. KeyGhost will recognise your password and the 'Ghost menu' will appear as below:

KeyGhost SX: Built-in access menu

Flexible settings to configure allow you to tweak the TimeDate KeyGhost SX device to your required specifications.
Below is an example of the Timestamping sub-menu, where you can configure the 2 modes of time and date stamping. ('Interval' - a regular pulse, and 'Session timeout' - grouping periods of keystrokes activity):
Patents Pending

Search quickly through the log with the Download Constraints menu. You can use this menu to quickly search through the log by instance of keyword (search phrase), or between periods of time (to the closest hour):

Finding powerup and logon activity is a breeze. Just select option 2 of the Download constraints menu, press enter, and return to the main menu to quickly isolate and download the relevant user information:




KEY BENEFITS

Easy to install in a few seconds! Simply plug it in and record everything that is typed on the PC. One of the most powerful keyloggers available.

No new software to install or learn.

Keystrokes can be retrieved on the spot – or unit can be unplugged for retrieval on another computer. (Portable hardware keylogger)

Impossible to detect or disable using spyware and software scanners (SpyCop, Who’s Watching Me...etc).

Stores many months worth of keystrokes in non-volatile flash memory (same as in smart cards) that doesn't need batteries to retain storage.

Works on all desktop PCs & all PC-compatible operating systems (Windows, Linux, Dos...etc).

Uses no system resources. Keylogger will not slow down or affect the PC.


Order a KeyGhost WHO IS USING KEYGHOST?

As a security tool for computer fraud investigations.

As a monitoring device for detecting unauthorised access.

As a deterrent, to prevent unacceptable use of company resources.

As a back up tool which creates a log of all keystrokes typed on a keyboard.

Read more
GO


KEYGHOST SX: REVIEWS

RoboPimp Hardware Review: KeyGhost SX 512KB
by Tom on April 1, 2004

World Class Security and Audit Tool...

The first thing you'll notice is that it's tiny. After it's plugged in, you can hardly tell it's there. Spy enthusiasts will love its discrete profile, and all users will appreciate its unobtrusiveness.

All in all, the KeyGhost SX is easily one of the best security tools in any users arsenal.

The ease of use, compatibility, security, and practicality of the KeyGhost SX make for an amazing and essential product for anyone...

Review Score: 9.5/10

Read more KeyGhost SX Keylogger Reviews GO

 

Kit Includes: KeyGhost SX Keylogger. Instruction sheet. Warranty card. Tamper evident seal.
Example notification banner as recommended by U.S. Department of Justice.

PS/2 plug PS/2 KEYBOARDS ONLY
System Requirements:
Desktop IBM PC compatible. PS/2 (small round plug) keyboard.
KeyGhost SX works on ALL PC operating systems (Windows 95,98,ME,NT,XP,2000 Linux, Beos, OS/2, Dos, Sun Solaris).

* Patent Pending high-speed transfer mode - 'KeyStream'™ - will work with most modern Desktop PCs.

> PLEASE NOTE: For USB keyboards (small rectangular plug) please choose KeyGhost USB Keylogger.

We respect your privacy and security. Please contact us if you have any questions or comments.
Tel: +64 3 379-3883. Fax: +64 3 379-3885. Email: HelpDesk@keyghost.com.
Postal Address: KeyGhost LTD, P.O.Box 3279, Christchurch 8001, New Zealand.
Physical Address: 109 Montreal Street, Christchurch, New Zealand.

NATO Classification Information
KeyGhost LTD (NATO supplier) NCAGE Code E1969

'KeyGhost' is a Registered Trademark of KeyGhost Ltd. 'KeyStream' and 'KeyGhost SX' are Trademarks of KeyGhost Ltd - Patents Pending.
KeyGhost is a hardware-based keylogger.
© Copyright 2000 KeyGhost Ltd. All rights Reserved.