KEYLOGGER FAQ'S

You’ve got questions we’ve got answers! Whether you need help with remote installation, manipulating .APK files or simply want to bind a keylogger to a Word document it’s all here.

FREQUENTLY ASKED QUESTIONS & VIDEO TUTORIALS
The Best keylogging Q & A You'll Find Anywhere!

SOFTWARE INTENDED FOR LEGAL USES ONLY. The Licensed Software is designed for use by those who have the legal right to monitor the device on which it is installed. Remotekeyloggers.net cannot provide legal advice to you regarding your use of the Licensed Software.

STEP-BY-STEP KEYLOGGING VIDEO INSTALLATION TUTORIALS

BLAZING KEYLOGGER OVERVIEW

The Basics of BLAZING Keylogger PRO
shadow

AWARD KEYLOGGER OVERVIEW

The Basics of Award Keylogger PRO
shadow

WIN-SPY KEYLOGGER INSTALLATION TUTORIAL

Advanced tutorial for Win-Spy keylogger for PC & Android.
shadow

ANDROID & IOS KEYLOGGER OVERVIEW

A look at cell phone keyloggers and their features.
shadow

BLAZING KEYLOGGER INSTALLATION TUTORIAL

A complete remote installation tutorial

Remote installing a parental monitoring application. This tutorial will guide you through the remote installation process. You can use these e-mail settings for any remote keylogger.

shadow

HOW TO REMOTE INSTALL YOUR MAC KEYLOGGER

Remote Installation for Mac - spytech

This video will show you step-by-step the remote installation process for our Mac Keylogger from Spytech. Remember that the file size is tiny, smaller than a selfie – therefore don’t over complicate it.

shadow

REMOTE KEYLOGGER OVERVIEW AND INSTRUCTION:

KEYLOGGING DEFINITIONS AND REFERENCE:

A remote keylogger is an invisible monitoring application that captures data from one computer and invisibly sends it to
another computer. The most important factors when deciding upon a remote keylogger are that it operates in absolute stealth, monitors both sides of chat conversations via instant messengers and social networks, and that no physical access to the PC is required.

Installing a keylogger is fairly simple, you can see our step-by-step video tutorial in the “FAQ’s” section. In summary however, you purchase/download the keylogger, choose the settings you want (this is called creating a capsule) and attach it to an e-mail, Skype, Dropbox or whatever delivery method you prefer.

Programs typically run as .exe files, for this reason you can re-name your file as “myfile.jpg.exe”, because only the first extention will be show, in this example it would be show up as “myfile.jpg”. For this reason many users find it useful to attach it to a picture, a PDF or other similar document. Some e-mail systems do not allow .exe files to be sent, Gmail is one such provider, infact chrome will not even allow you to download several types of .exe files. This however is easily by-passed by dragging your.exe into a notepad or .DOC (Microsoft Word) – and sending that. Most modern keyloggers do not require the computer to restart and begin reporting instantly. You can zip or rar the capsule as you like, there are also any number of free “file binders” you can use to combine two programs together (like a keylogger and a picture).

An important note when downloading a keylogger is that it may be flagged as “un-safe”. This is especially true in Google Chrome. This has nothing to do with the keylogger or what you will be sending to the computer to be monitored, this has to do with the name “keylogger”. For example, if you open notepad, type “hello world” in it and save it as “keylogger.exe” and then e-mail it to yourself – Chrome will refuse it even though it just says “hello world”; so do not consider this to be a reflection of the end-user experience.

For remote reporting most users prefer delivery via e-mail. AOL e-mail is recommended as it is the easiest for the keylogger to connect to and does not block any applications. You can see the proper AOL/POP3 settings in the video located in the FAQ’s section. You can set your keylogger to report as often as you like, however it is recommended that you have it only report 4-6 times per day; the reason being that the reports can be excessive and large and sometimes difficult to sort. For this reason it is also recommended that you set your keylogger to only report on an “active PC”, otherwise you get reports even when the PC has not been used.

Another remote reporting tip is to select “deliver in password protected ZIP file”. This will make the files tiny and by having them password protected, even if you left your computer on they would be impossible to access.

Hotkeys are another option you can select within your remote keylogger. A hotkey is any combination of keys that will bring up the keylogger dashboard. We recommend you do not select this option on remote installation, and only use this for local installation.

Run as windows is a feature available in premium keyloggers. It turns the keylogger into an invisible Windows application no different than any other windows process. This is just a second layer of stealth basically, and it excludes the keylogger from future scans or searches.

For screenshot reporting you will be asked to select the resolution of the screenshots. Always choose 80% or higher. If you go below 80% you will be able to see the screenshots, but you wont be able to read text inside of it.

All premium keyloggers come with remote uninstallation using a “keyword”, for example “bluestrawberries”, when the keylogger detects this word on the computer – it uninstalls itself. You simply need to e-mail the PC, and somewhere in the message body is the word “bluestrawberries” – the keylogger will do the rest.

This is also important as some users (myself included) like to install it on their own computer first. If you do this you do not need to worry about transferring a license or contacting support, a new installation negates an old installation. So you can transfer as you wish, but always remember to save the original download file after purchase so that way you can re-use it as much as you like. You do not need to un-install if you want to monitor a new computer, you just need to send your new capsule to the new computer. You DO NEED to uninstall if you install on your own computer as a test.

IF WE FAILED TO ANSWER YOUR QUESTION, ASK IT ANONYMOUSLY BELOW:

YOUR QUESTION:

FURTHER DETAILS: (YOUR QUESTION WILL BE ADDED TO, AND ANSWERED ON THIS PAGE)