answersLogoWhite

0


Best Answer

I'm using Micro Keylogger.

It cannot be detected on your computer.

User Avatar

Wiki User

8y ago
This answer is:
User Avatar

Add your answer:

Earn +20 pts
Q: Keylogger what does the wireless keylogger look like?
Write your answer...
Submit
Still have questions?
magnify glass
imp
Related questions

Is there any keylogger software that is actually safe?

Look for Professional, I.E Commercial Keyloggers, like All In One Keylogger. Commercial keyloggers are safe.


How do you find out some Facebook user's ip if im his friend?

you can use a phisher or a keylogger but im not goin to tell you how... look it up haha


Where would I look for keyloggers in a Wichita, KS directory?

Since a keylogger is used to monitor computer keyboard use, I would start by looking under computer equipment in the Wichita directory.


How to get free runescape membership easy LOOK?

THERE IS NO WAY OF GETTING FREE MEMBERSHIP PERIOD! Anything promising free membership is a scam, and will install a keylogger (a software which monitors your keystrokes and sends them to a hacker.)


How do you make a keylogger with visual basic 6 or the c plus plus and can you embed or bind it to a picture and make it hidden?

Image files are not executable. Therefore impossible. However, the only trick is to put your executable look like image using image icon and making the extension like this Mypicture.jpg.exe


He says hes not cheating but he never want to be around you or take you anywhere anymore and you'll live together?

Nonchalantly find a way to look at the phone records, text messages, etc. Put a keylogger on his computer without him knowing it. Those two should put nail in his coffin.


How do you know what your son did on the Internet using My Computers and it is window XP?

If you want to know what your child has been doing overall on a computer, I recommend using a keylogger program. Keyloggers when active generally take screen shot pictures, take note on what was typed, and may take videos. Your children won't know when its running since most become invisible and can only pop up when you press down your setup key combination. If somehow they achieve to discover the combination, no worries. A second step of security pops up and this is where you enter the setup password you have in place to get into the keylogger's settings. Here is a quote from REFOG Personal Monitor concerning their keylogger program; "If your kids spend time chatting or playing computer games, they can be approached or threatened by the strangers. Internet has anonymity, and anonymity means impunity in the minds of molesters. The solution? Violate their anonymity by monitoring your kids' activities! REFOG Personal Monitor is designed to deal with extended families, but it fits small families just as easy. Allowing you to monitor your children activities remotely over the Internet, REFOG Personal Monitor does not even require your close presence in order to be alerted about suspicious activities of either your children or someone they chat with." REFOG is a type of keylogger and there are many others available. Personally I am not trying to sell you REFOG. Look around to see what fits your needs.


Can you put a tracker of some kind on someones computer and see what they do or look at from your computer?

Yes but it's illegal unless you have their consent. If you have physical access to their computer you could try these, which I think are legal... If you want to see what they're typing then you can put a keylogger on their computer. If you want to see what sites they've been to then you can check the history of the computer.


How can a keylogger affect your computer?

Software keyloggers are fairly easy to spot as around 80% of them do not use any form of stealth. Best place to look is in all the usual startup locations. In Windows, winlogon is a favourite hiding place. To get rid of them, boot in safe mode. Of the remaining 20%, rootkits are the predominant stealth technique, either in user mode or kernel mode. Most of these can be considered malicious keyloggers. The only way to detect these is with rootkit analysis software. If you can determine the actual source of the keylogger, removal may be possible, but the only sure-fire way to get rid of a rootkit is to backup your data, wipe the drive and start again. Run a virus checker on your data (preferably on an external system) before restoring it, though. Of course had you been running a real-time anti-virus, you would have a high likelihood of preventing a keylogger from installing in the first place since all AV products contain all known keylogger signatures. That still leave a small percentage of unknown keyloggers that might get through, however. And nothing can stop someone who has access to the machine from installing one behind the AV's back. However, a "baseline" backup is the quickest method of restoring the system, so it pays to keep one up to date while the system is known to be clean. Hardware keyloggers can be tricky to spot if you don't know what to look for. That nice new keyboard you girlfriend/boyfriend/husband/wife bought you recently? It could easily have a keylogger built-in. However unlikely it may be, it's certainly not impossible. If you suspect anything, a simple "accident" with a some orange juice will soon render it useless. Buy your own keyboard and cover all the screws with circular labels numbered with a permanent UV marker. Also check the cable and connector for any signs of tampering. If the hardware is inside the machine then it pays to have a good working knowledge of the inner workings. However it's fair to say that internal hardware keylogging is so rare you'd have to be well worth all the expense and trouble it takes.


How can you monitor what websites or instant messagers your nanny is using via your home WiFi without installing software on her personal laptop?

There is no other way to do it but to install software such as keylogger. If you are the boss of the house, you may consider installing network software on her laptop or her computer. Most of the network software gives the administrator the capacity to monitor or watch what is going on in the network. One example of network software is CCAutosoft. You can even get the screenshot of the website that your nanny is visiting. Or you can shutdown the program they are using. You can even close the site they are visiting. Keylogger however works as a spy. Other alternative is to physically open her computer and look in the temporary/internet folder. You can search the history also. Every site visited is there. Hope this helps


What does a wireless mouse receiver look like?

If you google it, you will find out


What does the assurance wireless loft phone look like?

kyocera