DigitallyYours | All softwares > Shareware > Security & Privacy > Covert Surveillance > Spytector


ObjectPublisher's description
Program description (English)Spytector is the ultimate invisible and undetectable keylogger (keystroke logger) that completely meets your PC monitoring and surveillance requirements. Spytector keylogger is running in total stealth, undetectable even for advanced users, perfect for monitoring the way your PC is used. Spytector is tracking all the activities of PC users (visited websites, all the keystrokes, both sides of chat conversations, opened windows etc.) and delivers the logs to you via Email or/and FTP. In the delivered logs are also included the local stored passwords (for FireFox, Opera, Google Chrome, Internet Explorer, Safari, Outlook, Google Talk, Windows Live Messenger etc.) and URL history (visited websites). Spytector is completely invisible on the user's desktop and cannot be seen in the task manager, it's injected into system processes on the startup and the logs are hiddenly sent through the default browser or email client (to bypass the firewalls). The keylogger is using advanced hooking and stealth techniques. The official website for Spytector keylogger: Spytector keylogger size is pretty small (about 250 KB). It doesn't need much resources, the memory requirements are low enough to run even on slow computers. Spytector keylogger is compatible with Windows 2k, XP, Vista, Windows 7, Windows 8 and Windows 10 (32-bit and 64-bit).
Report inappropriate contentDIGITAL SKILLS... DIGITALLY YOURS | Signaler un contenu inappropriƩ / Report inappropriate content
NameDIGITAL SKILLS... DIGITALLY YOURS | Spytector   Spytector
Release date2018-11-28
Size49.00 KB
System requirement256MB RAM
TypeShareware ($ 64.95)
Category / SubcategorySecurity & Privacy / Covert Surveillance
Available languagesEnglish  
ChangesStealth improvement; Antivirus bypass
Application DownloadDIGITAL SKILLS... DIGITALLY YOURS | Go to
Publisher's website         DIGITAL SKILLS... DIGITALLY YOURS | Go to     DIGITAL SKILLS... DIGITALLY YOURS | Go to
OS supportWin2000, WinXP, Win7 x32, Win7 x64, Windows 8, Windows 10, WinServer, WinOther, WinVista, WinVista x64
AuthorSpy Tector
ContactSpy Tector
Site nameSpy Tector
Site titleSpytector - The Keylogger Always Ahead
Site descriptionSpytector is the ultimate invisible keylogger used to track all PC activities. Spytector is tracking all the activities of PC users (visited websites, keystrokes, both sides of chat, opened windows etc.) and delivers the logs to you via Email or/and FTP. In the delivered logs are also included the local stored passwords (for Firefox, Opera, IE, Chrome, Safari, Outlook, GoogleTalk etc.) and URL history. Official website:
Site url
Company nameSpytector
Permission DistributionThe trial version of Spytector can be freely distributed over the internet in an unchanged form.
E.U.L.A.SPYTECTOR END-USER LICENSE AGREEMENT Copyright 2005 - 2018 All Rights Reserved ====================================================================================== Please read this document carefully before using Spytector (hereinafter 'SOFTWARE'). This END-USER LICENSE AGREEMENT (hereinafter 'EULA') is a legal agreement between you and Spytector developers (hereinafter 'AUTHOR'). By installing, copying, or otherwise using the SOFTWARE, you agree to be bound by the terms of the EULA. If you do not agree to the terms of the EULA, you must remove the SOFTWARE from your computer hard disk and cease to use it. ====================================================================================== 1. GRANT OF LICENSE The AUTHOR grants you a limited, non­exclusive license to use the full/trial version of the SOFTWARE. You are hereby licensed to use the full version of the SOFTWARE for unlimited time or the trial version for 7 (seven) days. You neither have the right to give away nor to sell the full/trial version of the SOFTWARE to third parties. 2. LEGALITIES The SOFTWARE must be used in a lawful manner. You must be the authorized system administrator, the owner of the computer to be monitored or you must have the permission from the owner of the computer to install the SOFTWARE. In the case you are not the system administrator, the owner of the computer or do not have the permission from the owner of the computer, you don't have the right to install the SOFTWARE. If you intend to monitor your employees, you could be legally obliged to inform your employees that they are being monitored. Before using the SOFTWARE, the users should know the laws and regulations in their district/country and abide by them. We will not protect or passively condone the use of our SOFTWARE for illegal or unethical purposes. We can, we must and we do cooperate with law enforcement in criminal investigations. 3. OWNERSHIP The SOFTWARE is owned and copyrighted by the AUTHOR. Your license confers no ownership of the SOFTWARE. The SOFTWARE cannot be rented, leased or transferred. 4. COPYRIGHT The SOFTWARE is protected by copyright laws and international copyright treaties, as well as other intellectual property laws and treaties. 5. LIMITATIONS You may not decompile, disassemble or otherwise reverse engineer the SOFTWARE. You may not modify, rent or resell for profit the SOFTWARE. 6. WARRANTY The SOFTWARE is provided 'AS IS', no warranty of any kind is expressed or implied. To the maximum extent permitted by the applicable law, in no event shall the AUTHOR be liable for any consequential, incidental, direct, indirect, special, punitive, or other damages whatsoever (including, without limitation, damages for loss of business profits, business interruption, loss of business information, or any other pecuniary loss) arising out of this agreement or the use of or inability to use the SOFTWARE. 7. TERMINATION The license will be terminated automatically if you fail to comply with any of the above terms and conditions.