Download all programs used by the KGB. Review of KGB Spy - a program for logging user actions. Full multi-user support

Our library of examples of detecting and neutralizing spyware has already accumulated quite a lot of articles, and we decided to classify this material.
The classification is based on the subjective assessment of technical specialists from our test laboratory. Since we plan to continue testing popular spyware programs, we believe that this classification will help users of the COVERT disguiser and visitors to our website better understand the place of each spyware in the mosaic of modern threats.

We give each spy three ratings:
The first is design and functionality.. The higher the score, the more opportunities the program provides for data theft and user tracking.
The second is secrecy within the system. How difficult can it be to detect on a computer. The higher the score, the better program hides himself.
Third - evaluates the spy’s protection from anti-spyware and the difficulty of neutralizing it. The higher the score, the more diligently the program clings to its existence on the computer and the more steps need to be taken to achieve it. complete removal. Some programs cannot be removed by simply erasing the file folder from the disk.

— RLM: 5 / 5 / 4

VkurSe spy for secretly monitoring all user actions on the computer and sending the collected data to a special server. Provides the ability to covertly monitor a computer online, create screenshots, intercept keyboard input, clipboard, and much more.

— RLM: 1 / 1 / 0

Windows Spy Keylogger is a fairly classic example of a keylogger - it takes all input from the keyboard and saves it in log files. It has an invisible mode, consumes virtually no operating system resources, is easy to install and can be installed on a computer without administrator rights.

— RLM: 3 / 6 / 1

Spytector works secretly on your computer, saving passwords entered in browsers and instant messengers Internet Explorer, Google Chrome, Opera, FireFox, Safari, Outlook, GoogleTalk, Windows Live Messenger and other applications. The keylogger can intercept entire chats in popular instant messengers - MSN Messenger, Yahoo Messenger, ICQ, AIM. Spytector Keylogger encrypts the intercepted information and sends it via e-mail or at FTP server.

— RLM: 8 / 3 / 2

JETLOGGER allows you to monitor user activity at the computer, collects information about running programs ah, sites visited and key combinations used, structures the received data and displays them in the form of charts and graphs. You can enable automatic creation of screenshots at certain intervals. Hides the fact that information about activity on the device is collected.

— RLM: 4 / 0 / 1

Yaware.TimeTracker is a system for recording working hours and assessing the efficiency of employees at the computer.

— RLM: 5 / 2 / 3

Award Keylogger is a fairly popular spyware program that is described on many sites as a powerful real-time tracking tool with rich functionality. But we were not able to see all the listed functionality, although we tested the latest fully functional version. The program turned out to be not much better than the average spy.

— RLM: 5 / 0 / 0

Real Spy Monitor is designed to monitor activity on a computer and allows you to save information about launched programs, opened files and windows, take screenshots, monitor which sites users visit, intercept and save keyboard input.

— RLM: 5 / 1 / 1

LightLogger has a fairly standard set of functions: it tracks visited websites, takes screenshots at a given frequency, intercepts keyboard input in applications, browsers and email, remembers all running programs, and copies the contents of the system buffer.

— RLM: 7 / 1 / 0

REFOG Personal Monitor will provide full control over the system, recording any keystrokes in a log. In addition, he periodically takes screenshots so that the observer has a complete picture of what is happening on the computer. All reports are sent to the specified email. The spy's work is invisible on the computer: it does not reveal itself in any way and consumes very few system resources.

— RLM: 5 / 3 / 3

TheRat can be installed on a computer using social engineering. In addition to traditional keylogger functions, the program can monitor actions in application windows and respond to words, as well as take screenshots of the screen every time you press the Enter key. A special feature of the keylogger is that it works on the principle of incorporeal viruses.

— RLM: 6 / 2 / 1

Snitch collects data about user activity and transmits it to its server, from which it is sent to the control module and displayed in its interface.

— RLM: 2 / 0 / 0

Hide Trace is a typical screenshotter that monitors user actions, creating a detailed report. open windows by taking screenshots.

— RLM: 6 / 8 / 6

WebWatcher records all activity occurring on the PC: emails, instant messenger messages, information about visited sites, activity on Facebook/MySpace networks and everything that the user types in real time. Takes screenshots and tracks everything search queries. All collected information is sent to special servers, where the observer can view the results of surveillance remotely.

— RLM: 6 / 0 / 2

DameWare Mini Remote Control Server allows you to connect and control remote machines via the Internet or local network. Can secretly, unnoticed by the observed, control all his actions.

RLM: 7 / 2 / 2

Kickidler - The program has good functionality, but is easy to detect and remove. There is a function for blocking entry into the COVERT secure platform, which can easily be bypassed using a masker.

— RLM: 3 / 1 / 0

Total Spy - the interface is extremely simple, the program is small in size and does not affect system performance. But the functionality in the program is only basic.

— RLM: 7 / 8 / 5

PC Pandora— hides in the system and controls the entire computer and Internet traffic. Takes screenshots, receives keyboard input, actions on visited websites, email, instant messengers and collects much other information about the user’s work. The program does not have a folder in which it stores its data. Everything is loaded into operating system, and each new installation to the same or another computer will be made with new file names.

— RLM: 5 / 7 / 4

Micro Keylogger is a well-hidden spyware program that is not visible in the Start menu, taskbar, control-programs panel, process list, Msconfig startup list, and other places on the computer where it is possible to monitor running applications. It shows no signs of presence and does not affect system performance; it secretly sends a report to email or an FTP server. Its activity is carried out through DLLs.

— RLM: 4 / 0 / 0

Expert Home- a multifunctional program for covert surveillance and detailed recording of all actions performed on a computer with a remote tracking function, which allows you to view reports and screenshots anywhere, from any device, as long as you have Internet access.

— RLM: 7/ 0 / 0

Monitors a remote computer in real time, takes pictures of the user from the computer’s webcam, records sounds in the room where the computer is installed, views file system, remotely downloads files, views and deletes system processes, and other functions standard for spyware.

— RLM: 5 / 1 / 1

System Surveillance Pro provides everything you need to monitor your PC in stealth mode. The utility records text input, instant messages, applications used and sites visited, and also takes screenshots at a specified time interval or by event.

RLM: 3 / 0 / 0

KidLogger PRO, this is a keylogger with open source code, which can record sound from a microphone and take screenshots. Delivery of logs/screenshots is possible by email or to the manufacturer’s website, where they can already be viewed. It can also simply store logs with screenshots locally.

— RLM: 7 / 0 / 0

Remote Manipulator System - remote monitoring and control, allows you to connect to a remote computer and control it as if you were sitting directly in front of its screen.

— RLM: 6 / 2 / 1

NeoSpy spy is a computer tracking program that allows you to conduct hidden monitoring of the system. Tracks all actions performed by users on the monitor screen via the Internet from a computer, smartphone and tablet.

— RLM: 6/5/3

SoftActivity Keylogger tracks and records all user actions on the computer.
It works secretly and unnoticed even by savvy users; not a single process in the task manager, no files can be seen in the system.
The configuration utility and uninstallation option are password protected.

— RLM: 4 / 1 / 0

Snooper is an audio spy designed to record sounds that are picked up by a microphone connected to the computer; in recording mode it is not displayed in the tray, and is not visible in the list of processes in the Windows task manager. As long as the microphone does not detect sounds, the spy remains in sleep mode.

— RLM 5/0/0

The Best KeyLogger is a program that allows you to always have full control over your computer.
The program allows you to read the entire history of actions on your computer in your absence.
Using this program, you can view chat logs, as well as mail, and see which sites the user has visited.

— RLM: 5 / 1 / 1

SpyAgent is a program for complete control over user actions. Monitors system performance, including recording keystrokes, programs launched, files opened, and much more. Allows you to record all online activity - FTP, HTTP, POP3, Chat and other TCP/UDP communications, including visited websites. Takes screenshots, sends the collected data to the specified e-mail, it is possible remote control program.

— RLM: 6 / 2 / 0

Ardamax Keylogger - takes screenshots, intercepts clipboards and keystrokes on the keyboard. Spy has a hidden mode and is not visible in the task manager. The program creates a log of all actions for subsequent analysis.

— RLM: 8 / 1 / 0

Spyrix Personal Monitor allows you to conduct hidden control over any activity on your computer - in in social networks(VKontakte, Odnoklassniki, Facebook, etc.), chatting and email communication, visiting websites and making inquiries search engines(Yandex, Google). Spyrix Personal Monitor is designed for centralized monitoring of all user activities.

— RLM: 2 / 6 / 6

All In One Keylogger logs all keystrokes, including language specific characters, conversations and conversation messages, passwords, email, clipboard information, microphone sounds, screenshots, Internet activities. The spyware does not appear in running processes.

— RLM: 8 / 6 / 7

Mipko Personal Monitor - monitors activity on your computer, monitors which sites are visited on the Internet, saves HDD all user actions - keys pressed, sites visited, application launches, screenshots. When working in hidden mode, it is not visible by standard system tools and is not displayed in the list of processes. It works absolutely unnoticed, like an invisible person, works well with antiviruses and remains undetected in 95% of cases.

— RLM: 3 / 1 / 0

Free Keylogger Remote is capable of intercepting keystrokes and copied text from any application. It can also record names running applications, visited websites, take screenshots after a specified period of time. The spy operates in invisible mode and cannot be accessed. There is a function for remote monitoring and sending daily reports by email.

— RLM: 7 / 1 / 0

SpyGo - software package for hidden monitoring and tracking of user activity on the computer. It is controlled remotely and allows for real-time monitoring. It works in stealth mode and remains invisible during monitoring.

— RLM: 3 / 1 / 0

The hidden agent Actual Spy is capable of monitoring all events occurring in the system: intercepting all keystrokes, detecting case and Russian layout, taking screenshots (screenshots), remembering the launch and closing of programs, monitoring the contents of the clipboard, recording Internet connections, register visited sites and much more.

— RLM: 5 / 1 / 1

Elite Keylogger is designed to secretly monitor all types of user activity. The keylogger's capabilities include tracking all types of correspondence from ICQ to e-mail, websites visited by users, passwords typed and programs used. The spy generates snapshots of the user's desktop screen. Can send a report on user activities to email after a certain fixed period of time.

— RLM: 6 / 0 / 2

By using Power utilities Spy can take screenshots from the screen at certain intervals, record keyboard strokes, and Internet pages visited. You can also view email messages that you have read using Microsoft Outlook and Microsoft Outlook Express and documents opened in Word and Notepad. Program for given parameters sends the report by E-mail or writes it to a hidden log file.

— RLM: 6 / 5 / 5

The STAKH@NOVETS software package is designed to monitor computer network enterprises. It provides complete information about each employee. Surveillance of company personnel can be carried out in a completely hidden mode.

— RLM: 6 / 0 / 3

StaffCop monitors running programs, applications and websites on work PCs. Intercepts messages in ICQ, Skype, e-mail and other instant messengers. Takes screenshots of the monitor screen, records keystrokes and much more that is part of the concept of “computer control”.

(KGB) - RLM: 7 / 1 / 0

KGB SPY is one of the most popular programs designed to spy on users personal computers. It intercepts and stores a detailed log of user actions on the hard drive, takes screenshots, records software launches, etc.

— RLM: 1 / 1 / 0

Punto Switcher, designed to change keyboard layouts in automatic mode on the computer. At the same time, it can be used as a keylogger if you make certain settings changes.

How to protect your personal information using COVERT program from one of the most popular keyloggers - KGB Spy program.

How can a computer user who does not have knowledge in the field information security, detect a spy hidden in your system, and protect yourself from surveillance without removing the keylogger from your computer in order to mislead the one who is spying on you? And how to remove Kgb Spy if you decide to do so? Let's consider the situation using the example of the common keylogger KGB spy and the COVERT program, which creates a secure platform for the user.

After launching the COVERT program, click the "System Processes" button.

In the system processes window, you can see all running processes, except hidden ones.

To see if you have programs on your computer that are hiding themselves, click the “Hidden Processes” button.

In the hidden processes window, scroll the slider to the very bottom. All hiding programs (rootkits) will be highlighted in red.

In the picture above we see a spy program called KGB spy. This keylogger is configured to hide its actions and monitor the user.

If you want to remove Kgb Spy, select “Open application folder” from the context menu.

In the window that opens, run the uninstallation of the program and the spy will be removed.

If you just want to hide your actions from the keylogger and thereby mislead the one who is watching you, then enter the platform by clicking the button with the name of the program, as shown in the figure above.

Inside the protection platform, those programs that hide themselves from the user (rootkits) can be seen simply in the process window.

The COVERT program creates a safe environment in which you can do everything, but the user's behavior becomes uncontrollable for spyware.

Spies will not be able to see your actions performed on a protected platform, which means they will also not be able to transmit information about them to their owners. COVERT protects against recording video from the monitor screen, against taking screenshots, and does not allow receiving data from the keyboard and clipboard. In addition, it hides the websites you have visited and other information about your activities.

If you find a spy that your wife or your husband (or your boss at work) assigned to you, do not rush to remove it. Think: perhaps it is better for them to think that you are not doing anything unknown to them on the computer, since the spy will be clean. In the meantime, you can do whatever you want in the COVERT platform.

In the picture below we see that the KGB spy, after performing actions in the COVERT cloaking platform, was unable to record anything. The masking program hides the user's actions from all existing this moment spies. With its help, you can detect and destroy computer spies that work at the level of system kernel drivers and are invisible to antivirus programs.

Personal Monitor
YOUR CHOICE
For parental controls

Discount for those who remember. On the checkout page, use coupon KGBSPY and get 70% off!

ATTENTION! The program is now called Mipko Personal Monitor!

Today it is almost impossible to find a computer that only one person has access to. Moreover, this applies not only to office, educational machines, etc., but also to the most common home PCs. After all, the whole family uses them. Of course, spying on your wife/husband is probably not very ethical. However, in some cases this is acceptable, for example, when your significant other is addicted to traveling to dubious sites, thereby jeopardizing the security of the PC. But there are still children.

Protection for your child

personal monitor for windows

Free version
for 3 days


Today, schoolchildren often surpass their parents in computer literacy. And therefore, it is quite difficult to control their work with the PC, and even more so to limit it. Meanwhile, sometimes it is simply necessary. How else will parents be able to find out what exactly their child was doing at the computer during the day: conscientiously writing an essay, reading jokes in Global network or played? The same question probably worries company leaders. What do employees do when their actions cannot be controlled? Are reports and contracts valid? The KGB Spy program will help you find the answer to all such questions and dispel any last doubts.

Very interesting program, I started using KGB Spy. Useful to use and necessary both at work and outside of it.


At its core, the KGB Spy program is keylogger. It intercepts and saves a detailed log of user actions on the hard drive, takes screenshots, records the launch of various software etc. Therefore, when installing and using it, the antivirus installed on your PC may issue a corresponding warning. However, there is no need to be afraid of this. In reality, KGB Spy is not malicious software and does not steal information. However, just in case, the user can prevent this utility from accessing the Internet, allowing it only to collect data (by appropriately configuring the PC security system). In this case, he can be confident in the security of his passwords and other confidential information. The main feature of the KGB Spy program, which immediately catches your eye when you first launch it, is its extremely simple and very convenient interface.

Almost all work with this utility is carried out in one window, divided into two parts. On the left there are links to access the information collected by the program and all the settings for the monitoring process. All of them are grouped in the form of a tree, which provides convenient access to any section the user needs. The right side of the window is used directly to view logs and configure monitoring. In addition, a detailed hint is displayed directly in it while setting parameters. This solution looks quite successful, since it greatly facilitates the development of the program. And finally, it is worth noting that the KGB Spy interface is multilingual: the user can independently select English, German or Russian.>

Now we can move on to consider functionality KGB Spy. And we will start, of course, with what types of monitoring are implemented in this program. There are six of them in total, and each of them can be turned on and off independently of the others. The first is the registration of user keystrokes. Moreover, the program can also record the use of function keys (F1-F12, all kinds of combinations with the Alt and Ctrl buttons). In addition, in addition to the clicks themselves, the logs record their time, the program in which they were made, and the title of the active window. All this allows you to find out not only what exactly the user entered, but also in what software, in what open file he did it. The second type of monitoring is taking screenshots of the screen. They are necessary in order to clearly see what the user was doing in the absence of the PC owner. The program can take screenshots either on a timer (after a certain number of minutes) or when opening each new window. In addition, the administrator can specify what kind of pictures he needs (the entire screen or just the active window) and what quality they should be.

The next type of monitoring that KGB Spy can perform is monitoring software activity. When using it, the utility in question will save all running and closed software in the log. Thus, the PC owner will always know what programs were used in his absence. The fourth type of monitoring is tracking what information was saved to the clipboard.

Go ahead. The fifth type of information that the utility in question can save in logs is the addresses of visited web pages. This is very important because control over Internet use is very important. Visiting some sites can not only distract employees from work and affect the child’s psyche, but also seriously threaten the security of the computer. Therefore, control in this area is simply necessary. And finally, the last type of monitoring allows you to track the processes of turning on, shutting down and rebooting your computer. An important feature of the KGB Spy program is the hidden function, when activated, you can detect the utility using standard means OS is impossible. Moreover, interestingly, the user can either enable or disable it. In the first case, surveillance will be carried out secretly. And in the second, users will know that the PC owner controls their actions. This will be fair to them and will prevent attempts to misuse the computer. However, it is necessary to understand that visible work only makes sense if access to the settings of the program in question and the logs it saves is limited using the built-in password protection.

Another interesting feature of the KGB Spy product is selective monitoring. Firstly, the computer owner can enable or disable for each user different kinds control up to the complete refusal to monitor the actions of some people. This approach allows you to flexibly configure the control system and minimize the size of recorded logs. This function can be very useful, for example, at home. Parents can create special accounts for their children (which, in fact, is normal practice) and include only them in monitoring. Secondly, the KGB Spy program allows you to specify a list of software that will be monitored or, conversely, will not be monitored. Using this feature will help reduce the size of logs without reducing their information content.

By the way, the size of the logs that KGB Spy saves can be controlled. The PC owner has the opportunity to install maximum size log for each user and enable automatic deletion of information if the limit is reached. This prevents overflow hard drive and slowdown of the computer due to excessively large logs of the utility in question.

Another useful feature implemented in the KGB Spy program is the possibility of remote control. To use it, the user must configure it: set access parameters to the FTP server or enter his email address. After this, the utility in question will independently send the collected information at a set time interval. Moreover, the PC owner has the opportunity to choose the type of this report (in HTML format or as a ZIP archive), as well as the data that will be included in it (for example, everything except screenshots, only pressed buttons, etc.). The emergency alarm system deserves special mention. The essence of this function is as follows. First, the PC owner must specify a list of unwanted words. In the future, if a controlled user enters any of them, a corresponding notification and, if necessary, a saved log will be immediately sent to the email specified in the settings. , prevent leakage of confidential information, etc.

We also cannot help but talk about viewing the information collected by the KGB Spy program. We need to start with the fact that data can be presented in two forms. The first one is a table. In it, the computer owner can quickly view all records and their main characteristics: time, window title, event type, etc. (each type of monitoring has its own set of characteristics). For its convenience, the utility in question has the ability to sort the list by any field, as well as use filters (for example, view keys pressed only in Internet browser Explorer). The second type of information presentation is a report. It is designed to print out collected information, for example to present it as evidence of incorrect employee performance. Additionally, in the log viewing section there is a time filter, thanks to which you can view only unread entries or entries made in an arbitrary period of time. This is very convenient, since during active work the logs can reach significant sizes.


Today it is almost impossible to find a computer that only one person has access to. Moreover, this applies not only to office, educational machines, etc., but also to the most common home PCs. After all, the whole family uses them. Of course, spying on your wife/husband is probably not very ethical. However, in some cases this is acceptable, for example, when your significant other is addicted to traveling to dubious sites, thereby jeopardizing the security of the PC. But there are still children. Today, schoolchildren often surpass their parents in computer literacy. And therefore, it is quite difficult to control their work with the PC, and even more so to limit it. Meanwhile, sometimes it is simply necessary. How else will parents be able to find out what exactly their child was doing at the computer during the day: conscientiously writing an essay, reading jokes on the World Wide Web, or playing? The same question probably worries company leaders. What do employees do when their actions cannot be controlled? Are reports and contracts valid? The KGB Spy program will help you find the answer to all such questions and dispel any last doubts.

At its core, KGB Spy is a keylogger. It intercepts and stores on the hard drive a detailed log of user actions, takes screenshots, records the launch of various software, etc. Therefore, when installing and using it, the antivirus installed on the PC may issue a corresponding warning. However, there is no need to be afraid of this. In reality, KGB Spy is not malicious software and does not steal information. However, just in case, the user can prevent this utility from accessing the Internet, allowing it only to collect data (by appropriately configuring the PC security system). In this case, he can be confident in the security of his passwords and other confidential information.

The main feature of the KGB Spy program, which immediately catches your eye when you first launch it, is its extremely simple and very convenient interface. Almost all work with this utility is carried out in one window, divided into two parts. On the left there are links to access the information collected by the program and all the settings for the monitoring process. All of them are grouped in the form of a tree, which provides convenient access to any section the user needs. The right side of the window is used directly to view logs and configure monitoring. In addition, a detailed hint is displayed directly in it while setting parameters. This solution looks quite successful, since it greatly facilitates the development of the program. And finally, it is worth noting that the KGB Spy interface is multilingual: the user can independently select English, German or Russian.

Now we can move on to reviewing the functionality of KGB Spy. And we will start, of course, with what types of monitoring are implemented in this program. There are six of them in total, and each of them can be turned on and off independently of the others. The first is the registration of user keystrokes. Moreover, the program can also record the use of function keys (F1-F12, all kinds of combinations with the Alt and Ctrl buttons). In addition, in addition to the clicks themselves, the logs record their time, the program in which they were made, and the title of the active window. All this allows you to find out not only what exactly the user entered, but also in what software, in what open file he did it.

The second type of monitoring is taking screenshots of the screen. They are necessary in order to clearly see what the user was doing in the absence of the PC owner. The program can take screenshots either on a timer (after a certain number of minutes) or when opening each new window. In addition, the administrator can specify what kind of pictures he needs (the entire screen or just the active window) and what quality they should be.

The next type of monitoring that KGB Spy can perform is monitoring software activity. When using it, the utility in question will save all running and closed software in the log. Thus, the PC owner will always know what programs were used in his absence. The fourth type of monitoring is tracking what information was saved to the clipboard.

Go ahead. The fifth type of information that the utility in question can save in logs is the addresses of visited web pages. This is very important because control over Internet use is very important. Visiting some sites can not only distract employees from work and affect the child’s psyche, but also seriously threaten the security of the computer. Therefore, control in this area is simply necessary. And finally, the last type of monitoring allows you to track the processes of turning on, shutting down and rebooting your computer.

An important feature of the KGB Spy program is its hidden function, when activated, it is impossible to detect the utility using standard OS tools. Moreover, interestingly, the user can either enable or disable it. In the first case, surveillance will be carried out secretly. And in the second, users will know that the PC owner controls their actions. This will be fair to them and will prevent attempts to misuse the computer. However, it is necessary to understand that visible work only makes sense if access to the settings of the program in question and the logs it saves is limited using built-in password protection.

Another interesting feature of the KGB Spy product is selective monitoring. Firstly, the computer owner can enable or disable various types of control for each user, up to a complete refusal to monitor the actions of some people. This approach allows you to flexibly configure the control system and minimize the size of recorded logs. This function can be very useful, for example, at home. Parents can create special accounts for their children (which, in fact, is normal practice) and include only them in monitoring. Secondly, the KGB Spy program allows you to specify a list of software that will be monitored or, conversely, will not be monitored. Using this feature will help reduce the size of logs without reducing their information content.

By the way, the size of the logs that KGB Spy saves can be controlled. The PC owner has the opportunity to set the maximum log size for each user and enable automatic deletion of information if the limit is reached. This allows you to prevent your hard drive from filling up and your computer from slowing down due to excessively large logs of the utility in question.

Another useful feature implemented in the KGB Spy program is the possibility of remote control. To use it, the user must configure it: set access parameters to the FTP server or enter his email address. After this, the utility in question will independently send the collected information at a set time interval. Moreover, the PC owner has the opportunity to choose the type of this report (in HTML format or as a ZIP archive), as well as the data that will be included in it (for example, everything except screenshots, only pressed buttons, etc.).

The emergency alarm system deserves special mention. The essence of this function is as follows. First, the PC owner must specify a list of unwanted words. In the future, if a controlled user enters any of them, a corresponding notification and, if necessary, a saved log will be immediately sent to the email specified in the settings. This can help parents protect their children from unpleasant situations, prevent leakage of confidential information, etc.

We also cannot help but talk about viewing the information collected by the KGB Spy program. We need to start with the fact that data can be presented in two forms. The first one is a table. In it, the computer owner can quickly view all records and their main characteristics: time, window title, event type, etc. (each type of monitoring has its own set of characteristics). For its convenience, the utility in question provides the ability to sort the list by any field, as well as use filters (for example, view keys pressed only in the Internet Explorer browser). The second type of information presentation is a report. It is intended for printing the collected information, for example, to present it as evidence of incorrect work by an employee. Additionally, in the log viewing section there is a time filter, thanks to which you can view only unread entries or entries made in an arbitrary period of time. This is very convenient, since during active work the logs can reach significant sizes.

Well, now all that remains is to summarize. The KGB Spy product is a real spy that monitors the work of users. But this spy, unlike malware, is useful. Of course, its use is not always ethical. However, in many cases the use of such tools is not only justified, but also necessary.

KGB Spy is a keyboard spy. Working in invisible mode, the program does not show its presence, and accordingly, the secret of surveillance is maintained at a high level. It will record information that was entered from the keyboard, copy information from the clipboard, and keep track of which Internet sites were visited while using a personal computer.

The application will save the information collected during monitoring in a database, which can only be accessed by the user who installed it. You can configure sending a report on user actions by email. The report displays the most detailed information. The product is able to “remember” screenshots taken. On Mailbox a signal will be sent if one of the users has typed a prohibited word, as well as notifications for other reasons.

Download the full Russian version of KGB Spy for free from the official website without registration and SMS.

System requirements

  • Supported OS: Windows 7, 10, 8.1, 8, Vista, XP
  • Bit depth: 32 bit, x86, 64 bit



Top