usage instructions from external review by firstname.lastname@example.org.
is a Hardware Keylogger?
This page will explain exactly how a KeyGhost hardware keylogger is used.
The KeyGhost is
a very simple device to connect and use.
a standard keyboard (PS/2) connector cable but inside the KeyGhost is
a tiny computer chip and a flash memory chip (non-volatile, same as in
smart cards). The tiny computer chip captures keystrokes as they are typed
on the keyboard, and the memory chip stores all of the keystrokes.
To install the
KeyGhost, all you need to do is plug it in between your keyboard cable
and your computer. The KeyGhost is ready to record the instant you plug
it in. Tamper evident seals are provided with each KeyGhost so that no
one can remove it without your knowledge (children, employees etc). The
seals wrap easily around both plugs that attach the unit to the keyboard
reasons the actual look of the external (stand-alone) KeyGhost
hardware keyLogger may differ slightly from this photo.
If you want to see what has been recorded, simply open any word processing
program (We recommend WordPad) and type in your password. When your password
has been correctly entered a 'Ghost' access menu will be displayed in
wordpad your screen. The menu gives you several options, including; 1)
Entire log download, 2) Section log download, 3) Wipe log, 7) Password
change, and other options. As soon as the 'Entire log download' option
has been selected (by pressing '1' on your keyboard), every word that
has been typed on the computer will be displayed for you to see. The KeyGhost
types back every keystroke in a way that doesn't interfere or causes System
Requirements: PC compatible computer with PS/2 keyboard port.
Learn how easy it is to operate
the KeyGhost hardware keylogger.
keylogger installs in under 5 seconds, even when computer is logged out,
password protected, locked or switched off. Just plug it in! Its quite
unobtrusive. Most users go months without examining the back of their
computer. Think now ... can you picture what the back of your computer
looks like at the moment?
If you want to browse
questions other users have asked, read the FAQ.
do you need a KeyGhost™?
Security tool, investigation
tool, back up tool, and deterrent. learn
is the KeyGhost Security Keyboard. It contains an internal
KeyGhost hardware keylogger completely concealed from view!
It behaves exactly
like a normal keyboard in every way, except that it records all keystrokes
typed on it into memory.
Only the administrator
can access the log.
has a number of uses. Being a college student I am often writing papers
or a news updates for my website when good old Windows crashes on
me. Using the KeyGhost I lose nothing and I am able to completely
recover whatever I was working on.' -Ben Welch-Bolen.
> Learn about Security