POWERFUL INTERNAL SECURITY AND AUDIT TOOL
Discreetly record and retrieve everything typed, including emails,
chatroom activity, instant messages, website addresses, internet
searches and more...
Monitor your sensitive PCs and data entry terminals for backup and
to detect unauthorized activity.
Pinpoint computer misuse and fraud.
Cannot be detected or disabled with software scanners.
Can be unplugged and information retrieved on another PC.
is the fastest way to monitor your PC!
software installation is necessary to record or retrieve keystrokes.
Pending built-in access menu for high-speed transfers.
INSTALLS IN UNDER 5 SECONDS!
in between your keyboard and Desktop PC.
Tamper evident seals - included
- help detect unauthorized removal of KeyGhost.
PROTECT YOUR SENSITIVE PCs.
tools allow you to easily monitor anyone's computer activities.
Once installed, KeyGhost discreetly captures and records all keystrokes
typed, including chat conversations, email, word processor, or even
activity within an accounting or specialist system.
KeyGhost is completely undetectable by software scanners and provides
you with one of the most powerful stealth surveillance applications
Unlike software keyloggers that can be switched off or have their
stored keystroke data modified, stolen or erased, KeyGhost is an
unobtrusive hardware device and only you can read the data inside.
Because KeyGhost uses STRONG 128-Bit encryption to store the recorded
data in it’s own internal memory (not on the hard drive), it is
impossible for a network intruder to gain access to any sensitive
data stored within the device.
SX uses a Patent Pending method
to enable the highest speed transfer currently achievable - over
450 characters per second - without the need for special
adapters, or even to unplug the device. This is 3 times faster than
the 'KeyGhost' and 'KeyGhost II' models.*
RELIABLE + PORTABLE + SECURE
built-in ‘Ghost menu’ system
allows you to retrieve and privately view what has been recorded
using any standard text editor (e.g NotePad, WordPad...etc).
Easy to install in a few seconds! Simply plug it in and record everything
that is typed on the PC. One of the most powerful security tools
No new software to install or learn.
Keystrokes can be retrieved on the spot – or unit can be unplugged
for retrieval on another computer.
Impossible to detect or disable using software scanners (SpyCop,
Who’s Watching Me...etc).
Stores many months worth of keystrokes in non-volatile flash memory
(same as in smart cards) that doesn't need batteries to retain storage.
Works on all desktop PCs & all PC-compatible operating systems (Windows,
Uses no system resources. Will not slow down or affect the PC.
WHO IS USING KEYGHOST?
As a security tool for computer fraud investigations.
As a monitoring device for detecting unauthorised access.
As a deterrent, to prevent unacceptable use of company resources.
As a back up tool which creates a log of all keystrokes typed on
Ltd is an award winning technology company.
KeyGhost Ltd - Winner
Champion Technology 2004
KeyGhost SX. Instruction sheet. Warranty card. Tamper evident seal.
Example notification banner as recommended by U.S. Department of
PS/2 KEYBOARDS ONLY
System Requirements: Desktop IBM PC compatible. PS/2 (small
round plug) keyboard.
SX works on ALL PC operating systems (Windows 95,98,ME,NT,XP,2000
Linux, Beos, OS/2, Dos, Sun Solaris).
* Patent Pending
high-speed transfer mode - 'KeyStream' - will work with most
modern Desktop PCs.
NOTE: USB keyboards (small rectangular plug) are not currently supported.
We are based in Christchurch, New Zealand, but can provide products
and services Nationwide. Wellington, Auckland.