Why should I choose ?
Unique low-level core driver captures all keystrokes
The ultimate in "Stealth" technologies
modular design enables more flexibility
Our competitors use DLL-based technology to capture
keystrokes. The technique does not work in a DOS box, nor does it
work under many Java chat rooms and it won't capture NT/2000/XP network
login. And this method is easy to detect and defeat with a
specialized software. (For example, AOL will disable most competing
keyloggers, but not our IKS.) The driver approach, however, logs every
keystrokes entered because it "sees" the keystrokes even
before Windows does!
Because IKS is a driver, it cannot be seen running from alt-ctrl-del or
anywhere else. The only thing you need to install on the target computer is the
IKS driver. And the only thing that driver generates is an encoded binary log
file. Both the driver and the binary log file can be renamed so that an
exhaustive filename hard driver search won't turn up anything. Even an registry
search won't work because there is no identifying registry strings necessary to
install the driver.
The only risk is that if someone comes up with a signature-scanning software
that exhaustively scans all files for the renamed IKS driver. We do, however,
provide a Custom Compile Edition to address this
Our competing products can be discovered very easily. They have
at least one, sometimes two or three processes running. You can easily spot
these processes by looking at the alt-ctrl-del Windows Task Manager Process
IKS core driver does just one thing, that is, recording all keystrokes
silently; and does it extremely well. The core driver that you will need to
install is less than 10K. The entire program with the automatic installer
included is less than 70K. In contrast, our competing programs are several
To view the log, you use the Datview
utility. If you want to send the log via email, use our StealthMail
utility. Both Datview and StealthMail have a command-line interface in addition to the
graphical one. So they are all fully scriptable to facilitate mass rollout
across a large corporate network.
We also provide sample scripts for you to
remotely install IKS core driver and retrieve the logs.
If you already have a Network Management or Intrusion Detection
Infrastructure in place, IKS can easily fit in by providing the keystroke
recording service into the larger picture.
Disclaimer and Privacy