| 
         
          | Usage 
            Instructions |   
          | KeyGhost 
            usage instructions from external review by evilcthul@acidhardware.com. 
             Read 
            more >> |    What 
        is a Hardware Keylogger?  
 This page will explain exactly how a KeyGhost hardware keylogger is used.
 The KeyGhost is 
        a very simple device to connect and use. It resembles 
        a standard keyboard (PS/2) connector cable but inside the KeyGhost is 
        a tiny computer chip and a flash memory chip (non-volatile, same as in 
        smart cards). The tiny computer chip captures keystrokes as they are typed 
        on the keyboard, and the memory chip stores all of the keystrokes.
 InstallationTo install the 
        KeyGhost, all you need to do is plug it in between your keyboard cable 
        and your computer. The KeyGhost is ready to record the instant you plug 
        it in. Tamper evident seals are provided with each KeyGhost so that no 
        one can remove it without your knowledge (children, employees etc). The 
        seals wrap easily around both plugs that attach the unit to the keyboard 
        cable.
 
         
          | BEFORE | AFTER |   
          |  |  |   
          |  For security 
              reasons the actual look of the external (stand-alone) KeyGhost 
              hardware keyLogger may differ slightly from this photo. |     Viewing keystrokesIf you want to see what has been recorded, simply open any word processing 
        program (We recommend WordPad) and type in your password. When your password 
        has been correctly entered a 'Ghost' access menu will be displayed in 
        wordpad your screen. The menu gives you several options, including; 1) 
        Entire log download, 2) Section log download, 3) Wipe log, 7) Password 
        change, and other options. As soon as the 'Entire log download' option 
        has been selected (by pressing '1' on your keyboard), every word that 
        has been typed on the computer will be displayed for you to see. The KeyGhost 
        types back every keystroke in a way that doesn't interfere or causes System 
        Requirements: PC compatible computer with PS/2 keyboard port.
 Learn how easy it is to operate 
        the KeyGhost hardware keylogger.
   
         
          |   |  KeyGhost hardware 
        keylogger installs in under 5 seconds, even when computer is logged out, 
        password protected, locked or switched off. Just plug it in! Its quite 
        unobtrusive. Most users go months without examining the back of their 
        computer. Think now ... can you picture what the back of your computer 
        looks like at the moment? If you want to browse 
        questions other users have asked, read the FAQ. 
         Why 
        do you need a KeyGhost™? Security tool, investigation 
        tool, back up tool, and deterrent. learn 
        more >>  Here 
        is the KeyGhost Security Keyboard. It contains an internal 
        KeyGhost hardware keylogger completely concealed from view!
  It behaves exactly 
        like a normal keyboard in every way, except that it records all keystrokes 
        typed on it into memory.  Only the administrator 
        can access the log. 
         
          | TechExtreme 
            Review |   
          | 'The KeyGhost 
            has a number of uses. Being a college student I am often writing papers 
            or a news updates for my website when good old Windows crashes on 
            me. Using the KeyGhost I lose nothing and I am able to completely 
            recover whatever I was working on.' -Ben Welch-Bolen. 
            learn 
            more >> |   > Learn about Security 
        Keyboards <
         |