Interface Security - KeyGhost - The ultimate hardware keystroke recording tool
THAWTE AUTHENTIC SITE Secured by SSL
Ordering
Customer Support Products Company Info Links Helpdesk  
We welcome
VISA
MasterCard American Express

Home
Home
Keylogger
Keylogger
Reviews
Reviews
Demonstration
Demonstration
Testimonials
Testimonials
Photos
Photos
Specifications
Specifications
Frequently Asked Questions
FAQ
Press releases
Press releases
Download
Download
Legal Disclaimer
Legal Disclaimer
Affiliates
Affiliates
Distributors
Distributors

 

ORDER NOW!

 

 

Frequently Asked Questions

Take a quick slideshow tour of the KeyGhost features

Have a Question?
Get answers... helpdesk@keyghost.com

This page contains some of the most frequently asked questions our users have. Please email us with any more queries you may have.


Q. What is the KeyGhost?

KeyGhost™ installs even when computer is logged out, password protected, locked or switched off.
A. The KeyGhost is used to log all keystrokes on a computer. It is a tiny device that clips onto the keyboard cable. It installs in less than 12 seconds. Take a slideshow tour of how it all works. [top]

Q. How do I install the KeyGhost?
A. Here are pictures of how to install a KeyGhost device. [top]


Q. Can I record the keystrokes on one computer and retrieve them on another computer?
A. Yes, the KeyGhost device can be unplugged and moved around without any trouble. Record the keystrokes on one machine, and retrieve them on another. [top]

Q. Can I unplug the device without losing the keystrokes?

A. Yes, the KeyGhost device uses a permanent form of memory which doesn't need batteries. [top]

Q. What happens if the keystroke log fills up?
A. The most recent keystrokes are preserved, and the oldest ones are lost. For example, the KeyGhost Pro SE stores 2,000,000 keystrokes (approx. 9 - 12 months worth of typing activity). When the log is full, it will overwrite the oldest ones gradually with the newest ones. In this manner, it stores the most recent 2,000,000 keystrokes, making it possible to review over one year worth of PC activity! [top]


Q. No software to install at all? Just plug it in? But how do
I retrieve the keystrokes?

A. Its very simple and quick to retrieve keystrokes. [Top]

Q. Why do I want a KeyGhost device when I can use a key logger program available off the internet?
A. There are several reasons why a software program may not always be the best option. If the target computer is password protected, it will be almost impossible to install a software keylogger. The KeyGhost device installs in a few seconds, onto any desktop PC with any operating system. The KeyGhost device can be installed when the computer is switched off. It will also pick up passwords used to access the BIOS before boot up. [Top]

Q. Can the KeyGhost device be detected by special software?
A. No, installation of a KeyGhost device does not affect the computers operation in any way. A software program could never detect the recording of keystrokes. [Top]

Q. What if someone else types in the backdoor password by
mistake?

A. Good question. The password can be between 8-12 characters. It is suggested that common words like 'the' are not used for the password, for obvious reasons. Choose a password with no meaning such as 'kghostlogger' and everything should be fine. [Top]

Q. How do I change the password?
A. After bringing up the configuration menu, there is an option to change the password. The retrieve keystroke example shows how this is possible. [Top]


Q. There are unusual characters in the log
A. This can occur if you are using another language. Unless the local is set to 'english' the angle brackets and other formatting characters in the log may come out incorrectly. [Top]


Q. How long can the backdoor password be?

A. Up to 12 characters, made up of letters only [top]


Q. That figure of 2,000,000 keystrokes looks like a typo. Explain.
A. Yes, it can store this many characters in its memory.
(See KeyGhost II Pro SE). [top]

Q. Does the KeyGhost work on Laptops?
A. Because of the many different brands, and power specifications of laptop keyboard and docking ports, it is quite hard to predict if the KeyGhost will work favourably with your laptop.
In order for it to function you will need to use an external keyboard in the back of the laptop's PS/2 port. Any keys typed on the laptop keyboard will not be recorded, only those typed on the external keyboard will be recorded.
Some laptops do not accept keys typed at high speed on an external keyboard, so the Turbo Download Adapter is recommended for use with the laptop, otherwise the 'Keystroke Ghosting' may have to be set at a slower speed to retrieve the log. [Top]


Q. Does the KeyGhost work on a USB keyboard?
A. We have a KeyGhost USB Keylogger device available that is designed for use with USB keyboards. Note: The PS/2 models (small round plug) of KeyGhost do not work on USB (rectangular plug) keyboards. There are no adapters available to make a PS/2 version work on a USB keyboard. KeyGhost PS/2 versions only work with PS/2 keyboards (small round plug), and older DIN style keyboards (larger round plug, but requires adapters). If you are unsure which type of keyboard you have on your system, follow the lead to the back of the PC and check the shape of the plug. If it is round, then the PS/2 KeyGhost will work, if it is rectangular then the KeyGhost USB Keylogger will work.
Note. Some USB keyboards come with their own purple coloured USB to PS/2 converter, in those cases, a PS/2 KeyGhost will work when connected between the PS/2 adapter and the PC as the keyboard detects the adapter and reconfigures itself to PS/2 mode. There is no generic USB to PS/2 adapter available.
[Top]

Q. Does the KeyGhost work on Wireless keyboards?
A. Yes, a KeyGhost device should work on wireless keyboards by plugging it between the Wireless receiver and the PC PS/2 port, USB port or USB HUB. The receiver that comes with your wireless keyboard can be USB or PS/2. If it is USB (small rectangular plug) you need to choose one of the KeyGhost USB Keyloggers. If it is PS/2 (small round plug) and has two round plugs coming from the receiver (one for mouse, one for keyboard), connect a PS/2 model KeyGhost between the receiver's keyboard cable and the PC.
[top]

Q. Will KeyGhost store 'Control' characters and function keys?
A. Yes. The KeyGhost stores all keys typed on a keyboard, even key combinations. This is important, as it helps you understand exactly what happened on the PC. The keys are output as text tags into the log. E.G. When the Control and C keys are pressed in combination, the log shows <Ctrl+C>.
Even arrow keys are recorded and displayed as <LFT> (left) <RGT> (right). [top]

Q. During downloading, can I stop the memory dump from occurring?
A. Yes. Simply press any key once and the KeyGhost will return to the main menu
. [Top]

Q. Will KeyGhost work with KVM switches?
A. Yes.
KeyGhost will work with most KVM switches, however, in some cases (due to issues with some KVM switches) you will need to install KeyGhost directly to the PC you want to monitor. i.e. between the KVM switch and the PC's PS/2 socket. [Top]

Q. How to fix Microsoft Word 2000 and "double numbering" in the menu
A. Go into Tools .. Autocorrect .. Autoformat as you type .. and switch off 'automatic numbered lists'. [Top]

What are the advantages of using a KeyGhost over software keyloggers? > go read more <

Who is using the KeyGhost™? > click here to find out <

Tips for creating a keystroke monitoring notification banner.
> click here <

 

 

We respect your privacy and security. If you have any questions or comments about this site? Contact the Webmaster. Tel: +64 3 379-3883. Fax: +64 3 379-3885. Email: HelpDesk@keyghost.com. Postal Address: KeyGhost Ltd, P.O.Box 3279, Christchurch 8001, New Zealand. Physical Address: 109 Montreal Street, Christchurch, New Zealand.

© Copyright 2000 KeyGhost Ltd. All rights Reserved.