Spytector is the most undetectable keylogger available on the market! Windows 8 Compatible! FUD Keylogger! Free Trial Download!

Frequently Asked Questions
What is Spytector?

Spytector is an award winning undetectable and invisible keylogger (monitoring and spy software), the most advanced and in the same time easiest to use application of its kind.


Spytector keylogger is tracking all the activities of PC users (visited websites, all the keystrokes, opened windows, applications etc.) and delivers the logs to you via Email or/and FTP. In the delivered logs are also included the locally stored passwords for newest versions of FireFox, Opera, Google Chrome, Internet Explorer, Safari, GoogleTalk, Outlook, Windows Live Messenger etc. and URL history (visited websites).

Spytector "server" allows you not only to monitor applications ran and websites visited but to restrict the access to them. It's possible to create filters and the specified applications and websites will be completely blocked.

The keylogger is absolutely invisible and undetectable on the user's desktop and cannot be seen in the task manager. More than that, by using advanced hooking and stealth techniques, Spytector keylogger can be used in the same time with most firewalls and antiviruses installed on your computer.

Also, Spytector keylogger successfully bypasses Windows Defender (preinstalled on all new systems).


<< back to top
What can I use it for?
There are various reasons to use an undetected keylogger (monitoring software): you need to know what are your employees doing at work, you suspect someone may be misusing your PC, you need to know with who is your spouse chating online, you need to know what websites are your kids visiting etc. Spytector keylogger is the best application for these purposes, it runs completely invisible and undetectable, so no one except you will know it's running on the computer.

<< back to top
How do I start monitoring?
In few words, the main idea is this: from the main Spytector application you have to build a "server" (there is a big "Build Server" button) with the settings you want (log size, email delivery etc.) and that "server" must be run/doubleclicked on all your computers you want to monitor. The "server" (the actual keylogger) built from Spytector main application runs totally hidden. All the settings are explained in the User Manual, please read it. The logs can be retrieved either from the main application (see "Retrieve Local Log" button) or they can be sent to your email/ftp address.

<< back to top
Can I use the same Spytector server (keylogger) on more computers?
Yes, in the case you own more computers you can install the keylogger on all of them.

<< back to top
Is Spytector keylogger remotely deployable?
Yes. If you want to install the keylogger on another computer of yours, you can do the following: build the "server" on your main computer, copy the "server" on a USB stick, then use the USB stick on your 2nd computer and run run the "server" there. Or you can send the "server" attached by email from an account of yours to another (by example from your office computer to your home computer) and when you're on the other PC just download the attachment and run (doubleclick) the "server". Please note that few email providers have restrictions and not all the file types can be attached. One email provider that allows Spytector keylogger attached is Yahoo.

<< back to top
Is Spytector keylogger slowing down my computer?
Not at all, the memory requirements are low. Spytector can flawlessly run even on older computers.

<< back to top
How come nothing happens when I run the server?
Spytector keylogger "server" is running in silent mode (stealth, invisible, undetectable), you don't have to notice it.

<< back to top
Can I install more "servers" on the same computer?
Yes, but only one "server" is allowed on a user account.

In the case the existing running "server" was built with the "overwriting" option (see Server Options panel), the new "server" which is ran will uninstall the old "server" and install itself.

<< back to top
How do I uninstall the keylogger (server)?
When you build the "server", you have 3 uninstall options. The "server" can uninstall itself after a specific number of sent logs, when a hotkey is used on the monitored computer (the default hotkey is CTRL+SHIFT+F1) or when a specific file is found on a website.

<< back to top
Is the keylogger running on limited accounts?
Yes, unlike other applications, Spytector keylogger can run smoothly even on Windows 2k/XP/Vista/Windows 7/Windows 8 limited accounts.

Spytector keylogger is installing silently on Windows 8, there is no problem with UAC (no prompt on the "server" execution).

<< back to top
Why am I not receiving the logs anymore?
In the trial version you cannot receive more than 3 logs. The "server" is automatically uninstalled after 3 logs are sent.

<< back to top
Is Spytector detected by antivirus applications?
Spytector shouldn't be detected by antivirus programs. Spytector is a commercial legitimate keylogger (spy software) and our customers should be able to use it on their computers in the same time with other security applications.

The full version of Spytector will be undetected when scanned (RightClick -> Scan) with the following antiviruses: Norton AV, Kaspersky AV, McAfee, Panda, AVG, Avast, TrendMicro.

<< back to top
Can I use Spytector in the same time with my firewall?
Yes, usually the logs are sent to your email or FTP address even if on that PC is running a firewall. By using advanced hooking techniques, the keylogger is undetectable for most of the existing firewalls. Also, Spytector is working well with the protection system implemented in Windows VISTA, Windows 7 and Windows 8.

<< back to top
Can I use Spytector for hacking?
Absolutely not! Please note, per our License Agreement we ask that only use our software on a computer you have an active ownership stake in, or permission to record. Spytector cannot be used illegally. Installing computer monitoring tools on computers you do not own or do not have permission to monitor may violate local, state or federal law. We will not protect or passively condone illegal activities in violation of state or federal law.

<< back to top